SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 7, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1402
Abstract— Vehicular Ad Hoc Networks (VANET)
belong to a subclass of Mobile ad hoc networks .
VANET provides a distinguished approach for Intelligent
Transport System (ITS). VANET has become an active area
of research and development since it has tremendous
potential to improve vehicle and road safety, traffic
efficiency, and convenience as well as comfort to both
drivers and passengers. In this paper we discuss the
characteristics and architecture of VANET. Further we
provide an overview of Greedy Perimeter Stateless Routing
Protocol. Efficient routing protocols are essential for smart
ITS.
INTRODUCTIONI.
Ad hoc networks are comprised of a group of
workstations or other wireless devices which
communicate directly with each other to exchange
information. A Vehicular Ad-Hoc Network is a
technology that uses moving cars as nodes in a
network to create a mobile network . VANET is used to
build an Ad-Hoc network between mobile vehicles and
each other, and also between mobile vehicles and roadside
units. VANET allows cars to connect 100 to 300 meters to
each other in order to create a wide range network. The
primary job for vehicular ad hoc networks (VANETs)
includes the timely exchange of data by vehicles to facilitate
road safety, e-commerce applications etc. To enhance the
safety of drivers and provide the comfortable driving
environment, messages for different purposes need to be
sent to vehicles through this inter-vehicle communications.
Increased number of vehicles nowadays is equipped with
wireless transceivers to communicate with other vehicles.
As mobile wireless devices and networks become
increasingly important, the demand for Vehicle-to-Vehicle
(V2V) and Vehicle-to-Roadside (VRC) or Vehicle-to-
Infrastructure (V2I) Communication will continue to grow.
Fig. 1VANET communication
VANET ARCHTECTUREII.
System architectures [1] can be divided into different forms
according different perspective in VANETs. From the
perspective of network architecture, the VANETs system
architecture is divided into five layers: Physical Layer,
MAC Layer, Network Layer, Transport Layer, and
Application Layer.
From the network perspective the architecture of VANET is
divided into 3 categories: pure cellular/WLAN, pure ad hoc,
and hybrid.
A. Pure cellular/WLAN architecture
In pure cellular/WLAN architecture, the network uses
cellular gateways and WLAN access points to connect to the
Internet and facilitate vehicular applications. Vehicles
communicate with the Internet by driving by either a cellular
tower or a wireless access point.
B. Ad-hoc architecture
Information collected from sensors on a vehicle is essential
in informing other vehicles about traffic condition and
safety related information. This infrastructure-less network
architecture is in the pure ad hoc category where nodes
perform vehicle-to-vehicle communication with each other.
There are roadside communication units such as a cellular
tower and an access point and vehicles are equipped with
wireless networking devices, vehicles can take advantage of
the infrastructure in communicating with each other.
The hybrid architecture of cellular/WLAN and ad hoc
approaches provides greater flexibility.
Fig. 2: VANET network architecture types
Fig. 3: System architecture
VANET CHARACTERISTICSIII.
Few VANET characteristics are [2].:
A. Very High mobility and changing topology
Since vehicles are moving at high speed, the topology
formed by VANETs is always changing. They stay in the
Understanding Vehicular Ad-hoc Networks and Use of Greedy
Routing Protocol
Stavan Karia1
Nikita Keswaney2
Nikhil Keswaney3
1
Dept. of Information and Technology, Nirma University, Ahmedabad
2,3
Dept. of Computer Engineering, Thadomal Shahani Engineering College, Mumbai, India
Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol
(IJSRD/Vol. 1/Issue 7/2013/0008)
All rights reserved by www.ijsrd.com 1403
communication range of each other just for few seconds,
and links are established and broken rapidly. When the
density of traffic is low or present routes terminate before
constructing new ones, it has higher probability that the
vehicular networks are disconnected.
B. On board sensors
Vehicles can be equipped with highly accurate positioning
systems integrated by electronic maps which can be used for
routing. For example, GPS receivers can be used to enhance
routing decisions.
C. Mobility modelling
Vehicles thus moving along pre-defined paths provide an
opportunity to predict how long routes would last compared
to arbitrary motion patterns.
D. Frequently disconnected network
The highly dynamic topology results in frequently
disconnected network. This problem is also caused by
changing node density.
E. No power constraint
Since nodes of the network are cars instead of small
handheld devices, power constraint can be neglected due to
rechargeable batteries.
F. Security
It is also one of the major characteristics in VANET.
Cooperation among inter-vehicular networks and sensor
networks placed within the vehicles or along the road need
to be further investigated and analyzed.As the number of
vehicles grows the trust between them should also be
maintained for the smooth communication.
G. Safety
VANET security should satisfy four goals : It should
ensure that the information received is correct, the
source is who he claims to be , the node sending the
message cannot be identified and tracked and the system is
robust. Attacks can be cheating with position information,
tracking a location of a vehicle, jamming the channel for
Denial of Service and pretending to be another vehicle.
GREEDY PERIMETER STATELESS ROUTINGIV.
(GPSR)
Greedy Perimeter Stateless Routing[3] is a Position
Based Routing Protocol used for Wireless Networks that
uses the position of routers. With the use of closest
neighbour information of destination GPSR makes greedy
forwarding decision.
In Greedy Perimeter Stateless Routing (GPSR), a node
forwards a packet to an immediate neighbour which is
geographically closer to the destination node. This mode of
forwarding is termed greedy mode. When a packet reaches a
local maximum, a recovery mode is used to forward a
packet to a node that is closer to the destination than the
node where the packet encountered the local maximum [4].
The packet resumes forwarding in greedy mode when it
reaches a node whose distance to the destination is closer
than the node at the local maximum to the destination. When
a packet reaches a region where greedy forwarding is
impossible, the algorithm recovers by routing around the
perimeter of the region. GPSR uses greedy forwarding to
forward packets to nodes that are always progressively
closer to the destination. This process repeats at each
intermediate node until the intended destination of the
packet is reached. It goes back to greedy forwarding as
soon as it overcomes local maxima. Since GPSR only
maintains location information of all of its 1-hop
neighbours, it is nearly stateless and leads to better
scalability in a per router state than shortest-path ad hoc
routing protocols. but packet loss and delay time may
occur because the number of hops increases in
perimeter mode forwarding. These characteristics of
greedy forwarding decrease VANET reliability.
Fig. 4: Types of GPSR protocols
A. Greedy Forwarding
When a node forwards a packet that is nearest to the
destination of the packet, then such a forwarding is
called greedy forwarding[3] .Without prior knowledge of
the topology, this decision cannot be made. When
forwarding node does not receive beacon message from
bordering node within a specific time, the router assumes
that the connection has failed and deletes the neighbour
from its table. The key benefit of Greedy Forwarding is
that it holds current physical position of forwarding node,
and hence using this strategy complete distance to
destination is reduced and packets are transferred in a
relatively shorter time. The algorithm looks at the distances
from each to the packet destination and selects the one with
smallest distance [9]. After finding the closest neighbour the
packet is forwards to that network. But, if none of the
neighbours are closer to packet destination than it, then the
algorithm returns failure. This is the main drawback of
Greedy Forwarding.
Fig.5 Greedy forwarding example: y is x’s closest neighbour
B. Perimeter Forwarding
In a network when the greedy forwarding fails
Perimeter forwarding[3] is used i.e. GPSR recovers by
forwarding in perimeter mode within which a packet
navigates successively closer faces of a planar sub graph
of a network connectivity graph, till the time a node
nearer to the destination is found and greedy resumes.
Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol
(IJSRD/Vol. 1/Issue 7/2013/0008)
All rights reserved by www.ijsrd.com 1404
Fig. 6: Perimeter forwarding
The packets will be routed according to the Right Hand Rule
[5]. The perimeter mode is made up of 2 elements:
1. A distributed planarized algorithm, and
2. An online routing algorithm for planar graphs.
The connectivity graph is converted into a planar graph by
planarization algorithm by eliminating the redundant edges
existing in the network.
Fig. 7: Right hand rule
C. Packet format
Fig. 8: Packet format
GPSR which is a combination of greedy forwarding and
perimeter forwarding, provides better routing decision on
full and planarized network where greedy forwarding is
not possible.
Each node maintains a neighbour table which stores the
address and location of their net dingle hop neighbour.
GPSR makes use of a packet header in perimeter forwarding
to indicate whether a packet is in greedy mode or perimeter
mode a flag is used. Packet sources include the geographic
location of the destination packet. The source sets the
location of the destination field initially and it remains
constant till the packet reaches the destination. When a
greedy mode packet for forwarding is received a node
searches its neighbour table for the neighbour nearest to
the packet’s destination. If there is a neighbour near the
destination then the node forwards packets to that
neighbour. If no neighbour is nearer, packet enters
perimeter mode.
GEOGRAPHIC SOURCE ROUTING (GSR)V.
Geographic source routing (GSR) [6] is the first protocol to
use a map of the streets, and is mainly proposed for urban
environments to avoid the problem of GPSR. Using a
static street map and location information about each node,
GSR computes a route to a destination by forwarding
messages along streets In GSR, a source node computes the
shortest path to an intended destination using Dijkstra’s
algorithm based on the distance metric.
The computed path consists of a sequence of junction IDs
known as anchor points (AP), along which packets should
be forwarded to reach the destination. These anchors,
obtained from street maps, reflect the underlying road
topology and usually represent the road intersections where
decisions are made. The list of junctions is then inserted into
the header of each data packet sent by the source. The
packets are forwarded over the selected path from one AP to
the next AP using the greedy forwarding scheme.
Moreover, it is important to note that the authors make use
of a reactive location service to retrieve the current position
of a desired destination. The connectivity of the shortest
path is not realistic since it does not consider situations
where there is no sufficient number of vehicles on the
road between two involved junctions to ensure road
connectivity. That is, the packets are directly discarded if
they face a local maximum situation along one road
segment that prevents them from progressing towards
the next AP, even though an alternative longer path may
exist.
SPATIALLY AWARE PACKET ROUTING (SAR)VI.
SAR has two pre-requisites
1. Location awareness requires the positioning ability and
a location service.
2. Spatial-model awareness requires a node to possess the
model information of the geographic space wherein it is
located.
Spatially aware packet routing (SAR) [7] attempts to
overcome some of the weaknesses of the recovery strategy
used by GPSR. SAR algorithms consist of GSR and the
GSR-based packet forwarding. As shown in Figure 10,
the source vehicle S can map itself and the destination
vehicle D into the spatial model, and calculate the
shortest path to the destination with a shortest path
algorithm such as the Dijkstra algorithm. All data packets
are marked by source nodes with their destinations’
locations. The source node sets the shortest path from its
current location to the destination along the spatial graph
edges as the geographic source route (GSR) in the packet
header and switches the packet into SAR mode. The GSR is
based on a list of intermediate vertices along the geographic
path in graph, i.e. that GSR is based on locations instead of
hops. Instead of forwarding packets to the neighbour which
is geographically closest to the destination, in SAR each
forwarding vehicle maps the positions of its neighbours into
the graph model and chooses the neighbour with the shortest
path along the GSR to the destination as the next hop. After
a vertex in the GSR is reached (i.e. the forwarding vehicle
finds the vertex to be located within its radio range), this
vertex will be removed from the GSR and the packet will be
forwarded to the next vertex of the GSR. With this
approach, a packet will move successively closer to the
destination along the GSR from one vertex to the next.
However, there is a main drawback of SAR: since GSR is
based on static geographic locations instead of existing
Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol
(IJSRD/Vol. 1/Issue 7/2013/0008)
All rights reserved by www.ijsrd.com 1405
links, there is no guarantee that a forwarding vehicle can
always find a suitable neighbour on the GSR.
Fig. 9: Geometric view of network
Fig. 10: Topological View of network
ANCHOR BASED STRRET AND TRAFFICVII.
AWARE
Anchor-based street and traffic aware routing (A-STAR)
[8] is designed for V2V. A-STAR also aims to
improve the problem where the perimeter mode of
GPSR utilizes next-neighbour hops along a street
instead of selecting the farthest neighbour along a street
for the next hop. The anchors in the A-STAR are both
geographic forwarding points to route packets and
junctions that a packet must pass through to reach its
destination. The A-STAR involves inserting a sequence of
anchors into a packet, through which the packet must travel
on its route to the destination.
SPATIAL AND TRAFFIC AWARE ROUTINGVIII.
STAR [9] is quite different from other position-based
routing algorithms, and is designed to fix the drawbacks of
the SAR algorithm. SAR has the advantage of its
underlying spatial model, allowing it to forward packets
along streets. STAR able to exploit both street topology
information achieved from geographic information systems
and information about vehicular traffic in order to perform
accurate routing decisions, as shown in Figure 11. STAR
overcomes the local maximum problem of SAR in that it has
no knowledge of where any vehicles are currently
positioned along the streets it selects. In STAR, the
monitoring and propagation of vehicular traffic conditions
are performed through the exchange of network-level
beacons, carrying observations of node neighbourhoods.
The observations are maintained in data structures managed
by the traffic monitoring module. A node maintains the
position of its neighbours in the neighbour’s table. The
node neighbourhood is discovered via the beacons. Each
node periodically broadcasts a beacon to its neighbours that
contains sender identifier information, sender coordinates,
and the vehicular traffic conditions it has in its traffic table.
Dijkstra’s algorithm is applied to the obtained graph in order
to find the shortest route. APs are computed along the streets
belonging to the route. The packet header includes the
destination identifier, the destination position, and a limited
number of APs. In case of routing failure, the recovery
procedure adopted by STAR consists in computing a new
route from the current node, exploiting updated traffic
information.
Fig. 11: Routing using STAR
GREEDY PERIMETER COORDINATOR ROUTINGIX.
(GPCR)
This algorithm improves upon GSR by eliminating the
requirement of an external static street map for its operation.
In GPCR [4], the typical destination-based greedy
forwarding strategy is modified such that it only routes
messages along streets. In this way, routing decisions are
only made at street intersections. As such, the goal is to
forward messages to nodes at an intersection, rather than
forwarding them to a node that is already past the
intersection. These nodes that are located within the area of
an intersection are called “coordinators”. A coordinator
periodically broadcasts its role along with its position
information, and nodes can determine whether they are
coordinators. Once a packet reaches a coordinator a decision
has to be made about the street that the packet should
follow. This is done in a greedy fashion: the neighbouring
node with the largest progress towards the destination is
chosen. As a consequence, the repair strategy of GPCR
consists of two parts:
(1) On each junction it has to be decided which street the
packet should follow next, and
(2) In between junctions a special form of greedy
forwarding is used to forward the packet towards the
next junction.
Given that no external map is available, the key challenges
are to identify nodes that are on a junction and to avoid
missing junctions while greedy forwarding is used.
Therefore, the basic behaviour of GPCR is similar to GPSR,
but it selects a relay node after considering information
about the road structure. GPCR makes routing decisions on
the basis of streets and junctions instead of individual nodes
Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol
(IJSRD/Vol. 1/Issue 7/2013/0008)
All rights reserved by www.ijsrd.com 1406
and their connectivity. However if the density of nodes
is low or there is no connectivity to the destination, then
the delay time increases and the local maximum problem
goes unresolved.
Fig. 12: Working of GPCR
CONCLUSIONX.
In this paper we have provided an overview of the research
for vehicular networks. Further we have reviewed greedy
perimeter stateless routing protocols. Although many
problems are not yet solved, the general feeling is that
vehicles could benefit from spontaneous wireless
communications in a near future.
REFERENCES
[1] Rakesh Kumar, Mayank Dave, A Comparative Study
of Various Routing Protocols in VANET, IJCSI
International Journal of Computer Science Issues,
Vol. 8, Issue 4, No 1, July 2011
[2] Yue Liu, Jun Bi, Ju Yang , Research on Vehicular Ad
Hoc Networks, IEEE 2009
[3] B. Karp, H.T. Kung, “GPSR: Greedy perimeter
stateless routing for wireless networks,” in Proc.
International Conference on Mobile Computing and
Networking (MobiCom), pp. 243-254, 2000. Article
(CrossRefLink)
[4] C. Lochert, M. Mauve, H. Fler, H. Hartenstein.
“Geographic routing in city scenarios,” ACM
Mobile Computing and Communications Review,
vol. 9, no. 1, pp. 69-72, 2005. Article (CrossRefLink)
[5] G. Liu, B. -S. Lee, B -C. Seet, C.H. Foh, K.J
metropolis vehicular communications,” in Proc. of
the International Conference on Information
Networking (ICOIN), pp. 134-143, 2004.
[6] 21 C. Lochert, H. Hartenstein, J.Tian, H. Füßler,
D. Hermann, M. Mauve, “A routing strategy for
vehicular ad hoc networks in city environments,”
in Proc. of the IEEE Intelligent Vehicles
Symposium, pp. 156-161, Jun 2003. Article
(CrossRefLink)
[7] J.Tian, L.Han, K. Rothermel, C.Cseh, “Spatially
aware packet routing for mobile ad hoc inter-
vehicle radio networks,” in Proc. of the IEEE
Intelligent Transportation Systems, pp. 1546-
1551, Oct. 2003. Article (CrossRefLink)
[8] B.-C. Seet, G. Liu, B.-S. Lee, C.-F. Foh, K.-J.
Routing strategy for metropolis vehicular
communications,” in Proc. Of the 3rd International
IFIP-TC6 Networking Conference (Networking), pp.
989-999, May 9-14, 2004.
[9] F. Giudici, E. Pagani, “Spatial and traffic-aware
routing (star) for vehicular systems,” in Proc. Of
International Conference on High Performance
Computing and Communications, pp. 77-86, Sep.
2005. [10] C. Lochert, M. Mauve, H. Fler, H.
Hartenstein. “Geographic routing in city scenarios,”
ACM Mobile Computing and Communications
Review, vol. 9, no. 1, pp. 69-72, 2005. Article
(CrossRefLink)

More Related Content

What's hot

VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol tojpstudcorner
 
Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Mumbai Academisc
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase thePvrtechnologies Nellore
 
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSA SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSAAKASH S
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...Pvrtechnologies Nellore
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTAAKASH S
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 

What's hot (17)

VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSA SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPT
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 

Viewers also liked

Development and theoretical analysis of mathematical expressions for change o...
Development and theoretical analysis of mathematical expressions for change o...Development and theoretical analysis of mathematical expressions for change o...
Development and theoretical analysis of mathematical expressions for change o...ijsrd.com
 
Optimal Spinning Reserve Capacity in Power Market
Optimal Spinning Reserve Capacity in Power MarketOptimal Spinning Reserve Capacity in Power Market
Optimal Spinning Reserve Capacity in Power Marketijsrd.com
 
Single Phase Online UPS Employing ACT with Power Factor Corrected Rectifier
Single Phase Online UPS Employing ACT with Power Factor Corrected RectifierSingle Phase Online UPS Employing ACT with Power Factor Corrected Rectifier
Single Phase Online UPS Employing ACT with Power Factor Corrected Rectifierijsrd.com
 
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...ijsrd.com
 
Ijsrdv1 i7021
Ijsrdv1 i7021Ijsrdv1 i7021
Ijsrdv1 i7021ijsrd.com
 
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMA
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMAAnalysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMA
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMAijsrd.com
 
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...ijsrd.com
 
Grid computing: An Emerging Technology
Grid computing: An Emerging TechnologyGrid computing: An Emerging Technology
Grid computing: An Emerging Technologyijsrd.com
 
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...ijsrd.com
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...ijsrd.com
 
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply System
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply SystemOptimization Approach of Vehicle Routing By a Milk-Run Material Supply System
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply Systemijsrd.com
 
OBD I & II (On Board Diagnostic)
OBD I & II (On Board Diagnostic)OBD I & II (On Board Diagnostic)
OBD I & II (On Board Diagnostic)ijsrd.com
 
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLSComparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLSijsrd.com
 
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...ijsrd.com
 
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...ijsrd.com
 

Viewers also liked (16)

Development and theoretical analysis of mathematical expressions for change o...
Development and theoretical analysis of mathematical expressions for change o...Development and theoretical analysis of mathematical expressions for change o...
Development and theoretical analysis of mathematical expressions for change o...
 
Optimal Spinning Reserve Capacity in Power Market
Optimal Spinning Reserve Capacity in Power MarketOptimal Spinning Reserve Capacity in Power Market
Optimal Spinning Reserve Capacity in Power Market
 
Single Phase Online UPS Employing ACT with Power Factor Corrected Rectifier
Single Phase Online UPS Employing ACT with Power Factor Corrected RectifierSingle Phase Online UPS Employing ACT with Power Factor Corrected Rectifier
Single Phase Online UPS Employing ACT with Power Factor Corrected Rectifier
 
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
 
Ijsrdv1 i7021
Ijsrdv1 i7021Ijsrdv1 i7021
Ijsrdv1 i7021
 
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMA
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMAAnalysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMA
Analysis of Simulation Parameters of Pulse Shaping FIR Filter for WCDMA
 
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pas...
 
Grid computing: An Emerging Technology
Grid computing: An Emerging TechnologyGrid computing: An Emerging Technology
Grid computing: An Emerging Technology
 
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...
New Image Steganography by Secret Fragment Visible Mosaic Image for Secret Im...
 
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply System
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply SystemOptimization Approach of Vehicle Routing By a Milk-Run Material Supply System
Optimization Approach of Vehicle Routing By a Milk-Run Material Supply System
 
OBD I & II (On Board Diagnostic)
OBD I & II (On Board Diagnostic)OBD I & II (On Board Diagnostic)
OBD I & II (On Board Diagnostic)
 
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLSComparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
 
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect...
 
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...
Classification and Segmentation of Glaucomatous Image Using Probabilistic Neu...
 

Similar to Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsIOSR Journals
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONRK CONSULTANCY SERVICES
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Augastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxAugastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxKNaveenKumarECE
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Global mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetGlobal mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetjosephjonse
 
Global mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanetGlobal mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanetijngnjournal
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 

Similar to Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol (20)

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation Tools
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
I021201059064
I021201059064I021201059064
I021201059064
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Augastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxAugastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptx
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Global mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetGlobal mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanet
 
Global mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanetGlobal mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanet
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 7, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1402 Abstract— Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS. INTRODUCTIONI. Ad hoc networks are comprised of a group of workstations or other wireless devices which communicate directly with each other to exchange information. A Vehicular Ad-Hoc Network is a technology that uses moving cars as nodes in a network to create a mobile network . VANET is used to build an Ad-Hoc network between mobile vehicles and each other, and also between mobile vehicles and roadside units. VANET allows cars to connect 100 to 300 meters to each other in order to create a wide range network. The primary job for vehicular ad hoc networks (VANETs) includes the timely exchange of data by vehicles to facilitate road safety, e-commerce applications etc. To enhance the safety of drivers and provide the comfortable driving environment, messages for different purposes need to be sent to vehicles through this inter-vehicle communications. Increased number of vehicles nowadays is equipped with wireless transceivers to communicate with other vehicles. As mobile wireless devices and networks become increasingly important, the demand for Vehicle-to-Vehicle (V2V) and Vehicle-to-Roadside (VRC) or Vehicle-to- Infrastructure (V2I) Communication will continue to grow. Fig. 1VANET communication VANET ARCHTECTUREII. System architectures [1] can be divided into different forms according different perspective in VANETs. From the perspective of network architecture, the VANETs system architecture is divided into five layers: Physical Layer, MAC Layer, Network Layer, Transport Layer, and Application Layer. From the network perspective the architecture of VANET is divided into 3 categories: pure cellular/WLAN, pure ad hoc, and hybrid. A. Pure cellular/WLAN architecture In pure cellular/WLAN architecture, the network uses cellular gateways and WLAN access points to connect to the Internet and facilitate vehicular applications. Vehicles communicate with the Internet by driving by either a cellular tower or a wireless access point. B. Ad-hoc architecture Information collected from sensors on a vehicle is essential in informing other vehicles about traffic condition and safety related information. This infrastructure-less network architecture is in the pure ad hoc category where nodes perform vehicle-to-vehicle communication with each other. There are roadside communication units such as a cellular tower and an access point and vehicles are equipped with wireless networking devices, vehicles can take advantage of the infrastructure in communicating with each other. The hybrid architecture of cellular/WLAN and ad hoc approaches provides greater flexibility. Fig. 2: VANET network architecture types Fig. 3: System architecture VANET CHARACTERISTICSIII. Few VANET characteristics are [2].: A. Very High mobility and changing topology Since vehicles are moving at high speed, the topology formed by VANETs is always changing. They stay in the Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia1 Nikita Keswaney2 Nikhil Keswaney3 1 Dept. of Information and Technology, Nirma University, Ahmedabad 2,3 Dept. of Computer Engineering, Thadomal Shahani Engineering College, Mumbai, India
  • 2. Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol (IJSRD/Vol. 1/Issue 7/2013/0008) All rights reserved by www.ijsrd.com 1403 communication range of each other just for few seconds, and links are established and broken rapidly. When the density of traffic is low or present routes terminate before constructing new ones, it has higher probability that the vehicular networks are disconnected. B. On board sensors Vehicles can be equipped with highly accurate positioning systems integrated by electronic maps which can be used for routing. For example, GPS receivers can be used to enhance routing decisions. C. Mobility modelling Vehicles thus moving along pre-defined paths provide an opportunity to predict how long routes would last compared to arbitrary motion patterns. D. Frequently disconnected network The highly dynamic topology results in frequently disconnected network. This problem is also caused by changing node density. E. No power constraint Since nodes of the network are cars instead of small handheld devices, power constraint can be neglected due to rechargeable batteries. F. Security It is also one of the major characteristics in VANET. Cooperation among inter-vehicular networks and sensor networks placed within the vehicles or along the road need to be further investigated and analyzed.As the number of vehicles grows the trust between them should also be maintained for the smooth communication. G. Safety VANET security should satisfy four goals : It should ensure that the information received is correct, the source is who he claims to be , the node sending the message cannot be identified and tracked and the system is robust. Attacks can be cheating with position information, tracking a location of a vehicle, jamming the channel for Denial of Service and pretending to be another vehicle. GREEDY PERIMETER STATELESS ROUTINGIV. (GPSR) Greedy Perimeter Stateless Routing[3] is a Position Based Routing Protocol used for Wireless Networks that uses the position of routers. With the use of closest neighbour information of destination GPSR makes greedy forwarding decision. In Greedy Perimeter Stateless Routing (GPSR), a node forwards a packet to an immediate neighbour which is geographically closer to the destination node. This mode of forwarding is termed greedy mode. When a packet reaches a local maximum, a recovery mode is used to forward a packet to a node that is closer to the destination than the node where the packet encountered the local maximum [4]. The packet resumes forwarding in greedy mode when it reaches a node whose distance to the destination is closer than the node at the local maximum to the destination. When a packet reaches a region where greedy forwarding is impossible, the algorithm recovers by routing around the perimeter of the region. GPSR uses greedy forwarding to forward packets to nodes that are always progressively closer to the destination. This process repeats at each intermediate node until the intended destination of the packet is reached. It goes back to greedy forwarding as soon as it overcomes local maxima. Since GPSR only maintains location information of all of its 1-hop neighbours, it is nearly stateless and leads to better scalability in a per router state than shortest-path ad hoc routing protocols. but packet loss and delay time may occur because the number of hops increases in perimeter mode forwarding. These characteristics of greedy forwarding decrease VANET reliability. Fig. 4: Types of GPSR protocols A. Greedy Forwarding When a node forwards a packet that is nearest to the destination of the packet, then such a forwarding is called greedy forwarding[3] .Without prior knowledge of the topology, this decision cannot be made. When forwarding node does not receive beacon message from bordering node within a specific time, the router assumes that the connection has failed and deletes the neighbour from its table. The key benefit of Greedy Forwarding is that it holds current physical position of forwarding node, and hence using this strategy complete distance to destination is reduced and packets are transferred in a relatively shorter time. The algorithm looks at the distances from each to the packet destination and selects the one with smallest distance [9]. After finding the closest neighbour the packet is forwards to that network. But, if none of the neighbours are closer to packet destination than it, then the algorithm returns failure. This is the main drawback of Greedy Forwarding. Fig.5 Greedy forwarding example: y is x’s closest neighbour B. Perimeter Forwarding In a network when the greedy forwarding fails Perimeter forwarding[3] is used i.e. GPSR recovers by forwarding in perimeter mode within which a packet navigates successively closer faces of a planar sub graph of a network connectivity graph, till the time a node nearer to the destination is found and greedy resumes.
  • 3. Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol (IJSRD/Vol. 1/Issue 7/2013/0008) All rights reserved by www.ijsrd.com 1404 Fig. 6: Perimeter forwarding The packets will be routed according to the Right Hand Rule [5]. The perimeter mode is made up of 2 elements: 1. A distributed planarized algorithm, and 2. An online routing algorithm for planar graphs. The connectivity graph is converted into a planar graph by planarization algorithm by eliminating the redundant edges existing in the network. Fig. 7: Right hand rule C. Packet format Fig. 8: Packet format GPSR which is a combination of greedy forwarding and perimeter forwarding, provides better routing decision on full and planarized network where greedy forwarding is not possible. Each node maintains a neighbour table which stores the address and location of their net dingle hop neighbour. GPSR makes use of a packet header in perimeter forwarding to indicate whether a packet is in greedy mode or perimeter mode a flag is used. Packet sources include the geographic location of the destination packet. The source sets the location of the destination field initially and it remains constant till the packet reaches the destination. When a greedy mode packet for forwarding is received a node searches its neighbour table for the neighbour nearest to the packet’s destination. If there is a neighbour near the destination then the node forwards packets to that neighbour. If no neighbour is nearer, packet enters perimeter mode. GEOGRAPHIC SOURCE ROUTING (GSR)V. Geographic source routing (GSR) [6] is the first protocol to use a map of the streets, and is mainly proposed for urban environments to avoid the problem of GPSR. Using a static street map and location information about each node, GSR computes a route to a destination by forwarding messages along streets In GSR, a source node computes the shortest path to an intended destination using Dijkstra’s algorithm based on the distance metric. The computed path consists of a sequence of junction IDs known as anchor points (AP), along which packets should be forwarded to reach the destination. These anchors, obtained from street maps, reflect the underlying road topology and usually represent the road intersections where decisions are made. The list of junctions is then inserted into the header of each data packet sent by the source. The packets are forwarded over the selected path from one AP to the next AP using the greedy forwarding scheme. Moreover, it is important to note that the authors make use of a reactive location service to retrieve the current position of a desired destination. The connectivity of the shortest path is not realistic since it does not consider situations where there is no sufficient number of vehicles on the road between two involved junctions to ensure road connectivity. That is, the packets are directly discarded if they face a local maximum situation along one road segment that prevents them from progressing towards the next AP, even though an alternative longer path may exist. SPATIALLY AWARE PACKET ROUTING (SAR)VI. SAR has two pre-requisites 1. Location awareness requires the positioning ability and a location service. 2. Spatial-model awareness requires a node to possess the model information of the geographic space wherein it is located. Spatially aware packet routing (SAR) [7] attempts to overcome some of the weaknesses of the recovery strategy used by GPSR. SAR algorithms consist of GSR and the GSR-based packet forwarding. As shown in Figure 10, the source vehicle S can map itself and the destination vehicle D into the spatial model, and calculate the shortest path to the destination with a shortest path algorithm such as the Dijkstra algorithm. All data packets are marked by source nodes with their destinations’ locations. The source node sets the shortest path from its current location to the destination along the spatial graph edges as the geographic source route (GSR) in the packet header and switches the packet into SAR mode. The GSR is based on a list of intermediate vertices along the geographic path in graph, i.e. that GSR is based on locations instead of hops. Instead of forwarding packets to the neighbour which is geographically closest to the destination, in SAR each forwarding vehicle maps the positions of its neighbours into the graph model and chooses the neighbour with the shortest path along the GSR to the destination as the next hop. After a vertex in the GSR is reached (i.e. the forwarding vehicle finds the vertex to be located within its radio range), this vertex will be removed from the GSR and the packet will be forwarded to the next vertex of the GSR. With this approach, a packet will move successively closer to the destination along the GSR from one vertex to the next. However, there is a main drawback of SAR: since GSR is based on static geographic locations instead of existing
  • 4. Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol (IJSRD/Vol. 1/Issue 7/2013/0008) All rights reserved by www.ijsrd.com 1405 links, there is no guarantee that a forwarding vehicle can always find a suitable neighbour on the GSR. Fig. 9: Geometric view of network Fig. 10: Topological View of network ANCHOR BASED STRRET AND TRAFFICVII. AWARE Anchor-based street and traffic aware routing (A-STAR) [8] is designed for V2V. A-STAR also aims to improve the problem where the perimeter mode of GPSR utilizes next-neighbour hops along a street instead of selecting the farthest neighbour along a street for the next hop. The anchors in the A-STAR are both geographic forwarding points to route packets and junctions that a packet must pass through to reach its destination. The A-STAR involves inserting a sequence of anchors into a packet, through which the packet must travel on its route to the destination. SPATIAL AND TRAFFIC AWARE ROUTINGVIII. STAR [9] is quite different from other position-based routing algorithms, and is designed to fix the drawbacks of the SAR algorithm. SAR has the advantage of its underlying spatial model, allowing it to forward packets along streets. STAR able to exploit both street topology information achieved from geographic information systems and information about vehicular traffic in order to perform accurate routing decisions, as shown in Figure 11. STAR overcomes the local maximum problem of SAR in that it has no knowledge of where any vehicles are currently positioned along the streets it selects. In STAR, the monitoring and propagation of vehicular traffic conditions are performed through the exchange of network-level beacons, carrying observations of node neighbourhoods. The observations are maintained in data structures managed by the traffic monitoring module. A node maintains the position of its neighbours in the neighbour’s table. The node neighbourhood is discovered via the beacons. Each node periodically broadcasts a beacon to its neighbours that contains sender identifier information, sender coordinates, and the vehicular traffic conditions it has in its traffic table. Dijkstra’s algorithm is applied to the obtained graph in order to find the shortest route. APs are computed along the streets belonging to the route. The packet header includes the destination identifier, the destination position, and a limited number of APs. In case of routing failure, the recovery procedure adopted by STAR consists in computing a new route from the current node, exploiting updated traffic information. Fig. 11: Routing using STAR GREEDY PERIMETER COORDINATOR ROUTINGIX. (GPCR) This algorithm improves upon GSR by eliminating the requirement of an external static street map for its operation. In GPCR [4], the typical destination-based greedy forwarding strategy is modified such that it only routes messages along streets. In this way, routing decisions are only made at street intersections. As such, the goal is to forward messages to nodes at an intersection, rather than forwarding them to a node that is already past the intersection. These nodes that are located within the area of an intersection are called “coordinators”. A coordinator periodically broadcasts its role along with its position information, and nodes can determine whether they are coordinators. Once a packet reaches a coordinator a decision has to be made about the street that the packet should follow. This is done in a greedy fashion: the neighbouring node with the largest progress towards the destination is chosen. As a consequence, the repair strategy of GPCR consists of two parts: (1) On each junction it has to be decided which street the packet should follow next, and (2) In between junctions a special form of greedy forwarding is used to forward the packet towards the next junction. Given that no external map is available, the key challenges are to identify nodes that are on a junction and to avoid missing junctions while greedy forwarding is used. Therefore, the basic behaviour of GPCR is similar to GPSR, but it selects a relay node after considering information about the road structure. GPCR makes routing decisions on the basis of streets and junctions instead of individual nodes
  • 5. Understanding Vehicular Ad-hoc Networks And Use Of Greedy Routing Protocol (IJSRD/Vol. 1/Issue 7/2013/0008) All rights reserved by www.ijsrd.com 1406 and their connectivity. However if the density of nodes is low or there is no connectivity to the destination, then the delay time increases and the local maximum problem goes unresolved. Fig. 12: Working of GPCR CONCLUSIONX. In this paper we have provided an overview of the research for vehicular networks. Further we have reviewed greedy perimeter stateless routing protocols. Although many problems are not yet solved, the general feeling is that vehicles could benefit from spontaneous wireless communications in a near future. REFERENCES [1] Rakesh Kumar, Mayank Dave, A Comparative Study of Various Routing Protocols in VANET, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011 [2] Yue Liu, Jun Bi, Ju Yang , Research on Vehicular Ad Hoc Networks, IEEE 2009 [3] B. Karp, H.T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. International Conference on Mobile Computing and Networking (MobiCom), pp. 243-254, 2000. Article (CrossRefLink) [4] C. Lochert, M. Mauve, H. Fler, H. Hartenstein. “Geographic routing in city scenarios,” ACM Mobile Computing and Communications Review, vol. 9, no. 1, pp. 69-72, 2005. Article (CrossRefLink) [5] G. Liu, B. -S. Lee, B -C. Seet, C.H. Foh, K.J metropolis vehicular communications,” in Proc. of the International Conference on Information Networking (ICOIN), pp. 134-143, 2004. [6] 21 C. Lochert, H. Hartenstein, J.Tian, H. Füßler, D. Hermann, M. Mauve, “A routing strategy for vehicular ad hoc networks in city environments,” in Proc. of the IEEE Intelligent Vehicles Symposium, pp. 156-161, Jun 2003. Article (CrossRefLink) [7] J.Tian, L.Han, K. Rothermel, C.Cseh, “Spatially aware packet routing for mobile ad hoc inter- vehicle radio networks,” in Proc. of the IEEE Intelligent Transportation Systems, pp. 1546- 1551, Oct. 2003. Article (CrossRefLink) [8] B.-C. Seet, G. Liu, B.-S. Lee, C.-F. Foh, K.-J. Routing strategy for metropolis vehicular communications,” in Proc. Of the 3rd International IFIP-TC6 Networking Conference (Networking), pp. 989-999, May 9-14, 2004. [9] F. Giudici, E. Pagani, “Spatial and traffic-aware routing (star) for vehicular systems,” in Proc. Of International Conference on High Performance Computing and Communications, pp. 77-86, Sep. 2005. [10] C. Lochert, M. Mauve, H. Fler, H. Hartenstein. “Geographic routing in city scenarios,” ACM Mobile Computing and Communications Review, vol. 9, no. 1, pp. 69-72, 2005. Article (CrossRefLink)