SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. I (Nov – Dec. 2015), PP 64-68
www.iosrjournals.org
DOI: 10.9790/0661-17616468 www.iosrjournals.org 64 | Page
Inspecting Vanet for Determined Ways with Watertight
Connectivity
Ms. Pradnya kamble, Dr. M.M. Kshirsagar,
Research Scholar, Ph.D, GHRCE,Nagpur;
Principal,SDMP,Nagpur
Abstract: This paper is examining the VANET techniques by understanding the various papers published by the
authors in IEEE transactions. In this paper the new technique is explored where no of the routing method is
applied for connecting the nodes. But using the other information such as speed ,density,time,range and
calculating the time required by the vehicle on the road of interests we can link them full time period of their
run. We can use the standard frequency bands widths allocated by the Governments
Keywords: VANET; MANET; ADHOC Network; Routing; Link Time, RREQ packet; RF Packet etc.
I. INTRODUCTION
VANET is an emerging technology and the concept of VANET arrives from the MANET technique. In
MANET there are various routing methods which is applied to the ADHOC network. It uses the theory of
wireless networks. Wireless networks are computers that use radio frequency channels as their physical medium
for communication. Each node in the network broadcast information which can be received by all nodes within
its direct transmission range. Since the nodes transmit and receive over the air, they need not be physically
connected to any network. Hence the network offers data connectivity along with user mobility.
The World’s first wireless radio communication system was invented by GUGLIELMO Marconi in
1897. In 1901, he successfully demonstrated his wireless telegraph system to the world by transmitting radio
signals across the Atlantic Ocean from England to America, covering more than 1700 miles. Through his system
, two end users could communicate by sending each other alphanumeric characters that were encoded in an
analog signal. This signaled the beginning of the radio communication era. Wireless communication is one of
the fastest growing industries in the world. The wireless communication industry has several segments such as
cellular telephony, wireless LAN’s and satellite- based communication networks.
In VANET, it uses the wireless communication to communicate with nodes using radio frequency
signals. VANET is S based on the principle of broadcast and reception of electromagnetic waves. Since the
electromagnetic spectrum is a common resource which is open for access by anyone. The VANET system can
make use of this spectrum for allocation of frequency band for VANET.
One very important property that an ad hoc wireless network should exhibit is organizing and maintain
the network by itself
II. ISSUES IN VANET
Medium Access Scheme: The primary responsibility of a medium access control (MAC) protocol in an
ad hoc wireless networks is the distributed arbitration for the shared channel for transmission of packets
Routing: The responsibilities of a routing protocol include exchanging the route information; finding
the physical path to a destination based criteria such as hop length ,minimum power required, and the lifetime of
the wireless link; gathering information about the path breaks;
Mobility: The Mobility Of nodes result in frequent path breaks, Packet collision, transient loops, stale
routing information and difficulty in resource reservation. So how to solve the route forming in the fast mobile
nodes.
Bandwidth Constraint: Since the Channel is shared by all nodes in the broadcast region, The bandwidth
available per wireless link depends on the number of nodes and the traffic they handle
Location dependent contention: the load on the wireless channel varies with a number of nodes present
in a given geographical region. This makes the contention of the channel high when the number of nodes
increases.
Quick Route reconfiguration: The unpredictable changes in the topology of the network require that the
routing protocol be able to quickly perform route reconfiguration in order to handle path breaks and subsequent
packet losses.
Inspecting Vanet for Determined Ways with Watertight Connectivity
DOI: 10.9790/0661-17616468 www.iosrjournals.org 65 | Page
Security and privacy: The routing protocol in VANET must be resilient to threats and vulnerabilities. It
must have inbuilt capability to avoid resource consumption, denial –of- service, impersonation and similar
attacks.
Road constraint: the length and width of the road is fixed. the nodes must communicate within limits;
Stable routes: the need of stable routes is the most urgent issue in VANET; Continuous Link: another important
issue is continuous link for communication
III. RELATED PROTOCOLS
Many authors suggest that the routing protocols of MANET are used for VANET, In routing
Techniques the major activity is neighbor discovery. During Neighbor discovery phase, every node in the
network gathers information about its neighbors and maintains that information in appropriate data structures.
This may require periodic transmission of short packets named beacons, or promiscuous snooping on the
channel for detecting activities of neighbors.
During the topology reorganization phase, the VANET requires updating the topology information by
incorporating the topological changes occurred in the network due to mobility of nodes, failure of links
A. Macaw Protocol
The binary exponential back-off mechanism used in MACA at times starves flows.
Figure 1: Example Topology
For example consider the figure1, here both the nodes S1 and S2 keep generating the high volume of
traffic. The nodes that first capture the channel starts transmitting the packets (say node S1). The packets
transmitted any node S2 get collided, and the nodes keep incrementing its back-off window according to the
BEB algorithm. MACAW use CTS RTS and ACK control packets.
Real Time Medium Access Control Protocol: Provides the bandwidth reservation mechanism for
supporting real time traffic in VANET networks. A separate set of control packets consisting of ResvRTS, and
ResvACK is used for effective bandwidth reservation for real time packets
Table Driven Routing Protocol: routes to all destinations are readily available for every node at all times. In one
paper the author says that DSR is better than DSDV.
B. Dynamic Source Routing (Dsr) :
DSR is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-
demand when a transmitting computer requests one. Dynamic source routing protocol (DSR) is an on-demand
protocol designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by
eliminating the periodic table-update messages required in the table-driven approach OF DSDV. The major
difference between this and the other on-demand routing protocols is that it is beacon-less and hence does not
require periodic hello packet (beacon) transmissions, which are used by a node to inform its neighbors of its
presence. This protocol is truly based on source routing whereby all the routing information is maintained
(continually updated) at mobile nodes. It has only two major phases, which are Route Discovery and Route
Maintenance. Route Reply would only be generated if the message has reached the intended destination node
(route record which is initially contained in Route Request would be inserted into the Route Reply).
Inspecting Vanet for Determined Ways with Watertight Connectivity
DOI: 10.9790/0661-17616468 www.iosrjournals.org 66 | Page
Figure 2: Topology Graph Of The Network
C. Destination-Sequenced Distance-Vector Routing (DSDV):
Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc
mobile networks based on the Bellman–Ford algorithm. Each entry in the routing table contains a sequence
number, the sequence numbers are generally even if a link is present; else, an odd number is used. The number
is generated by the destination, and the emitter needs to send out the next update with this number.
Ad-Hoc on Demand Distance Vector Routing (AODV):
Ad-Hoc on Demand Distance Vector Routing uses on demand approach for finding routes. That is
route is established only when it is required by source node. For transmitting data packets. It employs
destination sequence numbers to identify the most recent paths. The major difference between DSR and AODV
stems out from a fact that DSR uses source routing in which a data packet carries the complete path to be
traversed. However in AODV, the source node and the intermediate nodes store the next hop information
corresponding to each flow for data packet transmission. In AODV protocol, the source node floods the RREQ
packet in the network, when the route is not available for the desired destination. And RREP packet for reply
mode. And if error occurs then RRER packet is used for error forwarding message.
D. Signal Stability Based Adaptive Routing Protocol:
SSBARP is an On Demand protocol that uses signal stability as a prime factor for finding stable routes
we can make use of bus transportation system their schedules for best packet delivery protocol is beacon based.
In which the signal strength of the beacon is measured for determining the link stability. The signal strength is
used to classify a link as stable or unstable
Every node maintains a table that contains the beacon count and the signal strength of each of its
neighbors. If the node has received the strong beacons for the past few beacons, the node classifies the link as a
strong stable link. The link is otherwise classified as a unstable link. Each node maintains a table called a signal
stability table (SST)
IV. RELATED WORK
The some of the Authors said that stable route is the important factor for VANET; Next important
factor is how to form a route. They said that number of above techniques can be used, but in that we have to
add stable route and packet transmission seamlessly.
1. In one IEEE Transaction paper on” A stable routing protocol to support its services in VANET networks;
IEEE transactions on Vehicular Technology Vol 56,no 6 November 2007;Tarik Taleb, Ehssan Sakhaee” ,
The author Tarik Taleb and others explains the idea about grouping of vehicles to forward the packet delay
and reduce the traffic. Therefore each group will forward the packet in the same direction of moving
vehicles Which is one of the good strategies for forwarding technique.. If the vehicle forwards the message
to different group vehicle then penalty is added and it is considered as unstable route. And the location of
nodes is found out by the GPS system installed in each device or say vehicles..In GPS system the X, Y
coordinates are easily available for all the moving vehicles. Location is detected in every 1 second time
interval
2. In 2nd
paper the author proposed the beacon message is used by all the vehicles to inform about speed
,direction and position of each other vehicle in the vicinity, they said that performance of the GPSR is
improved
3. In other paper, the author explains that predicted routes are already stored in the buffer inside the device so
that even if failure occurs, already stored route can then be taken for delivery of packets. So that creates a
stable route.
4. In another paper, the author said we can make use of bus transportation system for communication on the
road. Bus transportation has fixed schedules. Buses are occupying the fixed route from source to destination
and the timing is also fixed for them. Also bus move slowly than fast moving cars, also we don’t know the
Inspecting Vanet for Determined Ways with Watertight Connectivity
DOI: 10.9790/0661-17616468 www.iosrjournals.org 67 | Page
path of the cars. And the cars are less in number on roads. And only one interface can be given to each car
but bus can provide more than one interface. So they can be the best source for transmission of packets.
They can be used as a relay system on the road.
5. In one paper the author said that road side units are fixed unit so they can be used for storing the predefined
routes for the vehicles on the road. If route failure occurs then another route can immediately from the
Roadside units and packets are delivered
6. In one paper the probability of breaking the route is found out. And the predefined routes are stored.
Probability of vehicle density on the road at a particular time is also taken and range is also taken and
using OPNET simulator the results show that DSR is better than DSDV
7. The Securiy of Vehicular adhoc Networks,2005by by Maxim Raya ,Jean – Pierre Hubaux. Vehicular
networks implement the detail threat analysis and provide security and privacy and analysis of the
robustness of the security protocols. He carries out the quantitative assessment of the proposed solution
In all the above work the route is first found out from source to destination node and then packets are
forwarded and for maintaining that route, different techniques are used so that connectivity can be shown
between nodes. And even if route breaks, the new routes are set. but i suggest that if continuous connectivity is
directly shown between all the nodes there is no need of forming route and then send the packets from source to
destination only, the packets can be sent from any node to all other nodes
V. Proposed Work
Geographic routing (also called Georouting or position-based routing) is a routing principle that relies
on geographic position information. It is mainly proposed for wireless networks and based on the idea that the
source sends a message to the geographic location of the destination instead of using the network address.
Geographic routing requires that each node can determine its own location and that the source is aware
of the location of the destination. With this information a message can be routed to the destination without
knowledge of the network topology or a prior route discovery. But with some other information in the packet
In this I have taken the concept of GPS system to locate the position of nodes using X and Y
coordinates of each vehicle. Vehicle positions of x and y coordinates are created. After that, total time at which
the vehicle is on the road is found out. That is, time matrix is created
The point of Distance at which vehicle starts and the last maximum distance is taken which is the total
approximate distance, the vehicle will run.
The speed of each vehicle is calculated, distance of each vehicle is found out using the DSDV
There is no need of any routing technique here.
Road length and Road width is taken in consideration Speed is taken in consideration Distance is taken
in consideration ;GPS system is taken in consideration; Distance vector is created ;Distance between two points
is found out; Angle between two points is found out ;Example : Suppose There Are Two Vehicles Say i and j
Speed of the Vehicle i is Vi; and Speed of the Vehicle j is Vj; Taking the formula, Speed = Distance / Time
Distance to be covered for the Vehicle i = R –|di| ;Di is the starting point (distance )at which the
vehicle 1 is starting his ride;(Di is the X value of i vehicle and Dj is the X value of j vehicle); Dj is the starting
point(distance )at which the vehicle2 is starting his ride; Each two vehicle has X1,Y1 and x2 y2 coordinates
The speed of each vehicle we know in km/sec which is tracked from Speed Sensors and GPS device
But since we do not know time initially, we find time from the speed of the vehicle and its total distance covered
by the vehicle on the road. Distance say D is the maximum travel distance of the vehicle say i from its starting
position = R-di = 500-di And Z is Angular Distance between two vehicles = SQRT(x2-x1)2
+(y2-y1)2
;Using the distance between two vehicles distance matrix is created Using time sensors the time can be
measured time = distance covered (d)/ speed(v) ;Time of travel of vehicle 1 = (500-di) / speed1 Time of travel
of vehicle 2 = (R-dj)/ speed2; Time of each vehicle can be found out
Taking the total time of travel of vehicle on the road, we can show the connectivity between vehicles for that
total time period
If, x2 and y2 are the x, y coordinates for one point
If x1 and y1 are the x,y coordinates for the second point
if d is the distance between the two points; Then we can say that following equation will be formed for finding
the distance between two points.
So vehicle 1 takes time t1 seconds and vehicle 2 takes time t2 seconds then, Time of connectivity between the
two vehicles is the minimum time taken between the two vehicles; Total time required by the two vehicles at
which they can be connected = min(t1,t2) seconds; Z is the distance between the two vehicles is, distance =
SQRT(x2-x1)2
+(y2-y1)2
;From the standard Mathematical formula , for finding the Angle theta between two
vehicles, vehicle 1 and Vehicle2
Inspecting Vanet for Determined Ways with Watertight Connectivity
DOI: 10.9790/0661-17616468 www.iosrjournals.org 68 | Page
Ø= tan-1
[(y2-y1)/(x2-x1)] ; R=500; Z is the distance between the two vehicles is, distance = SQRT(x2-
x1)2
+(y2-y1)2
Speed Is Tracked Using GPS System, Required travel Distance (D)= R - Current Distance(Starting Point)
Time = Required Covered Distance (D) / Speed(V) Ex : Total time required by the two vehicles at which they
can be connected = min(t1,t2) seconds; Speed And Position Is Tracked By GPS System in Every 1 Second
Interval. Angle Ø Is Known Required Travelled Distance Is Known. Speed is known, distance between two
nodes is known, So Using All These Information The Link Is Made Using The Packet Information As (R,V, Ø,
TIME, X,Y, Z) for each vehicle. As all the nodes are known at a single time we can connect all of them for their
time on road, and using GPS System continuous RF packets having all the information and RREQ packets
showing the information about other nodes is sent
VI. PERFORMANCE ANALYSIS
A. The challenge in VANET:
The design of routing protocols for VANETS must achieve the low communication overhead, Low
latency delay, the low time cost, and high adjustability for the city, highway, and rural environments, Broadcast
storm problem, large scale deployment, collision avoidance, traffic congestion. This happens due to lack of
connection between the nodes. Because of frequent route breakes.because of high mobility pattern of nodes. In
different proposed routing methods for VANET, the prolong connectivity is not shown because each routing
method has to search the location of the neighboring nodes, and then connect, again optimum path is found out
to send the packet in the route. But if we know the location, distance and time of nodes then we can connect
them throughout of their total runtime. Many of the algorithms suggested the distance and position parameter for
finding the location of nodes.
B. Research contribution
1. New parameters are generated- distance1,distance2, link-time, position of nodes
2. From distance1 parameter , Distance vector is generated for all nodes
3. incessant connectivity between nodes is shown
4. Overhead of the nodes are reduced
5. Large scale deployment are covered
6. Traffic congestion is avoided
C. Comparision of SBAPM with GPCR,AODV,CBR
In SBAPM Method, the less number of nodes get disconnected in the route.while GPCR, AODV and CBR will
get a continuous disconnection because of their topology structure.The Following Figure 1: showing the
topologies of GPCR,CBR,AODV and SBAPM. Figure2: three tables represent the values of nodes in range for
break nodes.and figure 3 represent the graphs from the break nodes giving the values in percentage for breking
of nodes.Figure 4 shows the range of connection for SBAPM versus GPCR, AODV and CBR.The connectivity
range of SBAPM is greater than all the other protocols AODV,CBR,GPCR etc. therefor break range is lesser in
SBAPM than other topologies.
VII. REFERENCES
[1]. Mobisys13 The 11th
Annual International conference on Mobile systems, Applications and Services Taipei Taiwan June 25-28 2013
ACM new York NY ,USA @ 2013
[2]. A Novel Geographic Routing Strategy Over VANET,2010 IEEE 24TH
International Conference On Advanced Information
Networking And Applications Workshops: Yan Bo Wang,Tin Yu Wu
[3]. A NEW Cluster Based Routing protocol for VANET, 2010 2nd
International Conference on Network Security Yuyi Luo
[4]. Study of feasibility of VANET and its routing protocol, 2008 IEEE,SUN Xi,LI Xia Miao
[5]. Distance routing Effect algorithm for mobility(DREAM(1998))by S Basagni, I Chlamtac, V R Syrotiuk, B A Woodward IN the
proceedings of the 4th
annual ACM/IEEE International Conference on Mobile computing and Networking,ser . MobiCom’96
[6]. A Methodology for Studying VANET Performance with Practical Vehicle Distribution in Urban Environment
[7]. The Securiy of Vehicular adhoc Networks,2005by by Maxim Raya ,Jean – Pierre Hubaux.
VIII. BIBLOGRAPHY
[1]. Pradnya kamble ,she is a professor at PCE,Nagpur,and presently doing Ph.D. research in VANET systems
[2]. Dr. M.M. Kshirsagar, She is presently working as a Principal, SDMP, Nagpur. She has a versatile experience in teaching and
management field

More Related Content

What's hot

Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
An energy efficient void avoidance opportunistic routing protocol for underwa...
An energy efficient void avoidance opportunistic routing protocol for underwa...An energy efficient void avoidance opportunistic routing protocol for underwa...
An energy efficient void avoidance opportunistic routing protocol for underwa...TELKOMNIKA JOURNAL
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
A Specific Routing Protocol for Flying Adhoc Network
A Specific Routing Protocol for Flying Adhoc NetworkA Specific Routing Protocol for Flying Adhoc Network
A Specific Routing Protocol for Flying Adhoc NetworkTELKOMNIKA JOURNAL
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocolsRama Raman
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsMalik Saad
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanetAlexander Decker
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanetAlexander Decker
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 

What's hot (18)

Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
An energy efficient void avoidance opportunistic routing protocol for underwa...
An energy efficient void avoidance opportunistic routing protocol for underwa...An energy efficient void avoidance opportunistic routing protocol for underwa...
An energy efficient void avoidance opportunistic routing protocol for underwa...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
A Specific Routing Protocol for Flying Adhoc Network
A Specific Routing Protocol for Flying Adhoc NetworkA Specific Routing Protocol for Flying Adhoc Network
A Specific Routing Protocol for Flying Adhoc Network
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 

Viewers also liked

Vayeshev group 3 ls
Vayeshev group 3 lsVayeshev group 3 ls
Vayeshev group 3 lsel9360
 
Доклад Сорокиной Т.А.
Доклад Сорокиной Т.А.Доклад Сорокиной Т.А.
Доклад Сорокиной Т.А.bull2396
 
Millennial presentation final
Millennial presentation finalMillennial presentation final
Millennial presentation finalDr. Marcus Castro
 
Diari del 05 de febrer de 2013
Diari del 05 de febrer de 2013Diari del 05 de febrer de 2013
Diari del 05 de febrer de 2013diarimes
 
Les célibataires se cherchent sur ce site rencontre gratuit
Les célibataires se cherchent sur ce site rencontre gratuitLes célibataires se cherchent sur ce site rencontre gratuit
Les célibataires se cherchent sur ce site rencontre gratuitpascalsevran
 
Company Profile - Impact Public Relations Pvt. Ltd.
Company Profile - Impact Public Relations Pvt. Ltd.Company Profile - Impact Public Relations Pvt. Ltd.
Company Profile - Impact Public Relations Pvt. Ltd.ImpactPublicRelations
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”iosrjce
 
Ask the Experts: Protecting your Business
Ask the Experts: Protecting your BusinessAsk the Experts: Protecting your Business
Ask the Experts: Protecting your BusinessWelch LLP
 
Climbing to success
Climbing to successClimbing to success
Climbing to successjrobles2004
 
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...iosrjce
 
Stílusos design bútorok
Stílusos design bútorokStílusos design bútorok
Stílusos design bútorokfabutor
 
Berrocal jesus berrocal
Berrocal  jesus berrocalBerrocal  jesus berrocal
Berrocal jesus berrocalFecomercioSP
 
Project 2a site visit itinerary - cape rachado
Project 2a   site visit itinerary - cape rachadoProject 2a   site visit itinerary - cape rachado
Project 2a site visit itinerary - cape rachadoJia Jun Chok
 
COM 4415- News release
COM 4415- News release COM 4415- News release
COM 4415- News release Lauren Davis
 

Viewers also liked (19)

Vayeshev group 3 ls
Vayeshev group 3 lsVayeshev group 3 ls
Vayeshev group 3 ls
 
Доклад Сорокиной Т.А.
Доклад Сорокиной Т.А.Доклад Сорокиной Т.А.
Доклад Сорокиной Т.А.
 
Millennial presentation final
Millennial presentation finalMillennial presentation final
Millennial presentation final
 
Trading Derivados05/03/2013
Trading Derivados05/03/2013Trading Derivados05/03/2013
Trading Derivados05/03/2013
 
Diari del 05 de febrer de 2013
Diari del 05 de febrer de 2013Diari del 05 de febrer de 2013
Diari del 05 de febrer de 2013
 
Les célibataires se cherchent sur ce site rencontre gratuit
Les célibataires se cherchent sur ce site rencontre gratuitLes célibataires se cherchent sur ce site rencontre gratuit
Les célibataires se cherchent sur ce site rencontre gratuit
 
Company Profile - Impact Public Relations Pvt. Ltd.
Company Profile - Impact Public Relations Pvt. Ltd.Company Profile - Impact Public Relations Pvt. Ltd.
Company Profile - Impact Public Relations Pvt. Ltd.
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 
TP1 YERIO EMMANUEL
TP1 YERIO EMMANUELTP1 YERIO EMMANUEL
TP1 YERIO EMMANUEL
 
Projekt
ProjektProjekt
Projekt
 
Ask the Experts: Protecting your Business
Ask the Experts: Protecting your BusinessAsk the Experts: Protecting your Business
Ask the Experts: Protecting your Business
 
Avaliação da pesquisa
Avaliação da pesquisaAvaliação da pesquisa
Avaliação da pesquisa
 
Climbing to success
Climbing to successClimbing to success
Climbing to success
 
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
 
Stílusos design bútorok
Stílusos design bútorokStílusos design bútorok
Stílusos design bútorok
 
Perueducaescuela servidores
Perueducaescuela servidoresPerueducaescuela servidores
Perueducaescuela servidores
 
Berrocal jesus berrocal
Berrocal  jesus berrocalBerrocal  jesus berrocal
Berrocal jesus berrocal
 
Project 2a site visit itinerary - cape rachado
Project 2a   site visit itinerary - cape rachadoProject 2a   site visit itinerary - cape rachado
Project 2a site visit itinerary - cape rachado
 
COM 4415- News release
COM 4415- News release COM 4415- News release
COM 4415- News release
 

Similar to Inspecting Connectivity in VANETs

Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 

Similar to Inspecting Connectivity in VANETs (20)

Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Inspecting Connectivity in VANETs

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. I (Nov – Dec. 2015), PP 64-68 www.iosrjournals.org DOI: 10.9790/0661-17616468 www.iosrjournals.org 64 | Page Inspecting Vanet for Determined Ways with Watertight Connectivity Ms. Pradnya kamble, Dr. M.M. Kshirsagar, Research Scholar, Ph.D, GHRCE,Nagpur; Principal,SDMP,Nagpur Abstract: This paper is examining the VANET techniques by understanding the various papers published by the authors in IEEE transactions. In this paper the new technique is explored where no of the routing method is applied for connecting the nodes. But using the other information such as speed ,density,time,range and calculating the time required by the vehicle on the road of interests we can link them full time period of their run. We can use the standard frequency bands widths allocated by the Governments Keywords: VANET; MANET; ADHOC Network; Routing; Link Time, RREQ packet; RF Packet etc. I. INTRODUCTION VANET is an emerging technology and the concept of VANET arrives from the MANET technique. In MANET there are various routing methods which is applied to the ADHOC network. It uses the theory of wireless networks. Wireless networks are computers that use radio frequency channels as their physical medium for communication. Each node in the network broadcast information which can be received by all nodes within its direct transmission range. Since the nodes transmit and receive over the air, they need not be physically connected to any network. Hence the network offers data connectivity along with user mobility. The World’s first wireless radio communication system was invented by GUGLIELMO Marconi in 1897. In 1901, he successfully demonstrated his wireless telegraph system to the world by transmitting radio signals across the Atlantic Ocean from England to America, covering more than 1700 miles. Through his system , two end users could communicate by sending each other alphanumeric characters that were encoded in an analog signal. This signaled the beginning of the radio communication era. Wireless communication is one of the fastest growing industries in the world. The wireless communication industry has several segments such as cellular telephony, wireless LAN’s and satellite- based communication networks. In VANET, it uses the wireless communication to communicate with nodes using radio frequency signals. VANET is S based on the principle of broadcast and reception of electromagnetic waves. Since the electromagnetic spectrum is a common resource which is open for access by anyone. The VANET system can make use of this spectrum for allocation of frequency band for VANET. One very important property that an ad hoc wireless network should exhibit is organizing and maintain the network by itself II. ISSUES IN VANET Medium Access Scheme: The primary responsibility of a medium access control (MAC) protocol in an ad hoc wireless networks is the distributed arbitration for the shared channel for transmission of packets Routing: The responsibilities of a routing protocol include exchanging the route information; finding the physical path to a destination based criteria such as hop length ,minimum power required, and the lifetime of the wireless link; gathering information about the path breaks; Mobility: The Mobility Of nodes result in frequent path breaks, Packet collision, transient loops, stale routing information and difficulty in resource reservation. So how to solve the route forming in the fast mobile nodes. Bandwidth Constraint: Since the Channel is shared by all nodes in the broadcast region, The bandwidth available per wireless link depends on the number of nodes and the traffic they handle Location dependent contention: the load on the wireless channel varies with a number of nodes present in a given geographical region. This makes the contention of the channel high when the number of nodes increases. Quick Route reconfiguration: The unpredictable changes in the topology of the network require that the routing protocol be able to quickly perform route reconfiguration in order to handle path breaks and subsequent packet losses.
  • 2. Inspecting Vanet for Determined Ways with Watertight Connectivity DOI: 10.9790/0661-17616468 www.iosrjournals.org 65 | Page Security and privacy: The routing protocol in VANET must be resilient to threats and vulnerabilities. It must have inbuilt capability to avoid resource consumption, denial –of- service, impersonation and similar attacks. Road constraint: the length and width of the road is fixed. the nodes must communicate within limits; Stable routes: the need of stable routes is the most urgent issue in VANET; Continuous Link: another important issue is continuous link for communication III. RELATED PROTOCOLS Many authors suggest that the routing protocols of MANET are used for VANET, In routing Techniques the major activity is neighbor discovery. During Neighbor discovery phase, every node in the network gathers information about its neighbors and maintains that information in appropriate data structures. This may require periodic transmission of short packets named beacons, or promiscuous snooping on the channel for detecting activities of neighbors. During the topology reorganization phase, the VANET requires updating the topology information by incorporating the topological changes occurred in the network due to mobility of nodes, failure of links A. Macaw Protocol The binary exponential back-off mechanism used in MACA at times starves flows. Figure 1: Example Topology For example consider the figure1, here both the nodes S1 and S2 keep generating the high volume of traffic. The nodes that first capture the channel starts transmitting the packets (say node S1). The packets transmitted any node S2 get collided, and the nodes keep incrementing its back-off window according to the BEB algorithm. MACAW use CTS RTS and ACK control packets. Real Time Medium Access Control Protocol: Provides the bandwidth reservation mechanism for supporting real time traffic in VANET networks. A separate set of control packets consisting of ResvRTS, and ResvACK is used for effective bandwidth reservation for real time packets Table Driven Routing Protocol: routes to all destinations are readily available for every node at all times. In one paper the author says that DSR is better than DSDV. B. Dynamic Source Routing (Dsr) : DSR is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on- demand when a transmitting computer requests one. Dynamic source routing protocol (DSR) is an on-demand protocol designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update messages required in the table-driven approach OF DSDV. The major difference between this and the other on-demand routing protocols is that it is beacon-less and hence does not require periodic hello packet (beacon) transmissions, which are used by a node to inform its neighbors of its presence. This protocol is truly based on source routing whereby all the routing information is maintained (continually updated) at mobile nodes. It has only two major phases, which are Route Discovery and Route Maintenance. Route Reply would only be generated if the message has reached the intended destination node (route record which is initially contained in Route Request would be inserted into the Route Reply).
  • 3. Inspecting Vanet for Determined Ways with Watertight Connectivity DOI: 10.9790/0661-17616468 www.iosrjournals.org 66 | Page Figure 2: Topology Graph Of The Network C. Destination-Sequenced Distance-Vector Routing (DSDV): Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile networks based on the Bellman–Ford algorithm. Each entry in the routing table contains a sequence number, the sequence numbers are generally even if a link is present; else, an odd number is used. The number is generated by the destination, and the emitter needs to send out the next update with this number. Ad-Hoc on Demand Distance Vector Routing (AODV): Ad-Hoc on Demand Distance Vector Routing uses on demand approach for finding routes. That is route is established only when it is required by source node. For transmitting data packets. It employs destination sequence numbers to identify the most recent paths. The major difference between DSR and AODV stems out from a fact that DSR uses source routing in which a data packet carries the complete path to be traversed. However in AODV, the source node and the intermediate nodes store the next hop information corresponding to each flow for data packet transmission. In AODV protocol, the source node floods the RREQ packet in the network, when the route is not available for the desired destination. And RREP packet for reply mode. And if error occurs then RRER packet is used for error forwarding message. D. Signal Stability Based Adaptive Routing Protocol: SSBARP is an On Demand protocol that uses signal stability as a prime factor for finding stable routes we can make use of bus transportation system their schedules for best packet delivery protocol is beacon based. In which the signal strength of the beacon is measured for determining the link stability. The signal strength is used to classify a link as stable or unstable Every node maintains a table that contains the beacon count and the signal strength of each of its neighbors. If the node has received the strong beacons for the past few beacons, the node classifies the link as a strong stable link. The link is otherwise classified as a unstable link. Each node maintains a table called a signal stability table (SST) IV. RELATED WORK The some of the Authors said that stable route is the important factor for VANET; Next important factor is how to form a route. They said that number of above techniques can be used, but in that we have to add stable route and packet transmission seamlessly. 1. In one IEEE Transaction paper on” A stable routing protocol to support its services in VANET networks; IEEE transactions on Vehicular Technology Vol 56,no 6 November 2007;Tarik Taleb, Ehssan Sakhaee” , The author Tarik Taleb and others explains the idea about grouping of vehicles to forward the packet delay and reduce the traffic. Therefore each group will forward the packet in the same direction of moving vehicles Which is one of the good strategies for forwarding technique.. If the vehicle forwards the message to different group vehicle then penalty is added and it is considered as unstable route. And the location of nodes is found out by the GPS system installed in each device or say vehicles..In GPS system the X, Y coordinates are easily available for all the moving vehicles. Location is detected in every 1 second time interval 2. In 2nd paper the author proposed the beacon message is used by all the vehicles to inform about speed ,direction and position of each other vehicle in the vicinity, they said that performance of the GPSR is improved 3. In other paper, the author explains that predicted routes are already stored in the buffer inside the device so that even if failure occurs, already stored route can then be taken for delivery of packets. So that creates a stable route. 4. In another paper, the author said we can make use of bus transportation system for communication on the road. Bus transportation has fixed schedules. Buses are occupying the fixed route from source to destination and the timing is also fixed for them. Also bus move slowly than fast moving cars, also we don’t know the
  • 4. Inspecting Vanet for Determined Ways with Watertight Connectivity DOI: 10.9790/0661-17616468 www.iosrjournals.org 67 | Page path of the cars. And the cars are less in number on roads. And only one interface can be given to each car but bus can provide more than one interface. So they can be the best source for transmission of packets. They can be used as a relay system on the road. 5. In one paper the author said that road side units are fixed unit so they can be used for storing the predefined routes for the vehicles on the road. If route failure occurs then another route can immediately from the Roadside units and packets are delivered 6. In one paper the probability of breaking the route is found out. And the predefined routes are stored. Probability of vehicle density on the road at a particular time is also taken and range is also taken and using OPNET simulator the results show that DSR is better than DSDV 7. The Securiy of Vehicular adhoc Networks,2005by by Maxim Raya ,Jean – Pierre Hubaux. Vehicular networks implement the detail threat analysis and provide security and privacy and analysis of the robustness of the security protocols. He carries out the quantitative assessment of the proposed solution In all the above work the route is first found out from source to destination node and then packets are forwarded and for maintaining that route, different techniques are used so that connectivity can be shown between nodes. And even if route breaks, the new routes are set. but i suggest that if continuous connectivity is directly shown between all the nodes there is no need of forming route and then send the packets from source to destination only, the packets can be sent from any node to all other nodes V. Proposed Work Geographic routing (also called Georouting or position-based routing) is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. But with some other information in the packet In this I have taken the concept of GPS system to locate the position of nodes using X and Y coordinates of each vehicle. Vehicle positions of x and y coordinates are created. After that, total time at which the vehicle is on the road is found out. That is, time matrix is created The point of Distance at which vehicle starts and the last maximum distance is taken which is the total approximate distance, the vehicle will run. The speed of each vehicle is calculated, distance of each vehicle is found out using the DSDV There is no need of any routing technique here. Road length and Road width is taken in consideration Speed is taken in consideration Distance is taken in consideration ;GPS system is taken in consideration; Distance vector is created ;Distance between two points is found out; Angle between two points is found out ;Example : Suppose There Are Two Vehicles Say i and j Speed of the Vehicle i is Vi; and Speed of the Vehicle j is Vj; Taking the formula, Speed = Distance / Time Distance to be covered for the Vehicle i = R –|di| ;Di is the starting point (distance )at which the vehicle 1 is starting his ride;(Di is the X value of i vehicle and Dj is the X value of j vehicle); Dj is the starting point(distance )at which the vehicle2 is starting his ride; Each two vehicle has X1,Y1 and x2 y2 coordinates The speed of each vehicle we know in km/sec which is tracked from Speed Sensors and GPS device But since we do not know time initially, we find time from the speed of the vehicle and its total distance covered by the vehicle on the road. Distance say D is the maximum travel distance of the vehicle say i from its starting position = R-di = 500-di And Z is Angular Distance between two vehicles = SQRT(x2-x1)2 +(y2-y1)2 ;Using the distance between two vehicles distance matrix is created Using time sensors the time can be measured time = distance covered (d)/ speed(v) ;Time of travel of vehicle 1 = (500-di) / speed1 Time of travel of vehicle 2 = (R-dj)/ speed2; Time of each vehicle can be found out Taking the total time of travel of vehicle on the road, we can show the connectivity between vehicles for that total time period If, x2 and y2 are the x, y coordinates for one point If x1 and y1 are the x,y coordinates for the second point if d is the distance between the two points; Then we can say that following equation will be formed for finding the distance between two points. So vehicle 1 takes time t1 seconds and vehicle 2 takes time t2 seconds then, Time of connectivity between the two vehicles is the minimum time taken between the two vehicles; Total time required by the two vehicles at which they can be connected = min(t1,t2) seconds; Z is the distance between the two vehicles is, distance = SQRT(x2-x1)2 +(y2-y1)2 ;From the standard Mathematical formula , for finding the Angle theta between two vehicles, vehicle 1 and Vehicle2
  • 5. Inspecting Vanet for Determined Ways with Watertight Connectivity DOI: 10.9790/0661-17616468 www.iosrjournals.org 68 | Page Ø= tan-1 [(y2-y1)/(x2-x1)] ; R=500; Z is the distance between the two vehicles is, distance = SQRT(x2- x1)2 +(y2-y1)2 Speed Is Tracked Using GPS System, Required travel Distance (D)= R - Current Distance(Starting Point) Time = Required Covered Distance (D) / Speed(V) Ex : Total time required by the two vehicles at which they can be connected = min(t1,t2) seconds; Speed And Position Is Tracked By GPS System in Every 1 Second Interval. Angle Ø Is Known Required Travelled Distance Is Known. Speed is known, distance between two nodes is known, So Using All These Information The Link Is Made Using The Packet Information As (R,V, Ø, TIME, X,Y, Z) for each vehicle. As all the nodes are known at a single time we can connect all of them for their time on road, and using GPS System continuous RF packets having all the information and RREQ packets showing the information about other nodes is sent VI. PERFORMANCE ANALYSIS A. The challenge in VANET: The design of routing protocols for VANETS must achieve the low communication overhead, Low latency delay, the low time cost, and high adjustability for the city, highway, and rural environments, Broadcast storm problem, large scale deployment, collision avoidance, traffic congestion. This happens due to lack of connection between the nodes. Because of frequent route breakes.because of high mobility pattern of nodes. In different proposed routing methods for VANET, the prolong connectivity is not shown because each routing method has to search the location of the neighboring nodes, and then connect, again optimum path is found out to send the packet in the route. But if we know the location, distance and time of nodes then we can connect them throughout of their total runtime. Many of the algorithms suggested the distance and position parameter for finding the location of nodes. B. Research contribution 1. New parameters are generated- distance1,distance2, link-time, position of nodes 2. From distance1 parameter , Distance vector is generated for all nodes 3. incessant connectivity between nodes is shown 4. Overhead of the nodes are reduced 5. Large scale deployment are covered 6. Traffic congestion is avoided C. Comparision of SBAPM with GPCR,AODV,CBR In SBAPM Method, the less number of nodes get disconnected in the route.while GPCR, AODV and CBR will get a continuous disconnection because of their topology structure.The Following Figure 1: showing the topologies of GPCR,CBR,AODV and SBAPM. Figure2: three tables represent the values of nodes in range for break nodes.and figure 3 represent the graphs from the break nodes giving the values in percentage for breking of nodes.Figure 4 shows the range of connection for SBAPM versus GPCR, AODV and CBR.The connectivity range of SBAPM is greater than all the other protocols AODV,CBR,GPCR etc. therefor break range is lesser in SBAPM than other topologies. VII. REFERENCES [1]. Mobisys13 The 11th Annual International conference on Mobile systems, Applications and Services Taipei Taiwan June 25-28 2013 ACM new York NY ,USA @ 2013 [2]. A Novel Geographic Routing Strategy Over VANET,2010 IEEE 24TH International Conference On Advanced Information Networking And Applications Workshops: Yan Bo Wang,Tin Yu Wu [3]. A NEW Cluster Based Routing protocol for VANET, 2010 2nd International Conference on Network Security Yuyi Luo [4]. Study of feasibility of VANET and its routing protocol, 2008 IEEE,SUN Xi,LI Xia Miao [5]. Distance routing Effect algorithm for mobility(DREAM(1998))by S Basagni, I Chlamtac, V R Syrotiuk, B A Woodward IN the proceedings of the 4th annual ACM/IEEE International Conference on Mobile computing and Networking,ser . MobiCom’96 [6]. A Methodology for Studying VANET Performance with Practical Vehicle Distribution in Urban Environment [7]. The Securiy of Vehicular adhoc Networks,2005by by Maxim Raya ,Jean – Pierre Hubaux. VIII. BIBLOGRAPHY [1]. Pradnya kamble ,she is a professor at PCE,Nagpur,and presently doing Ph.D. research in VANET systems [2]. Dr. M.M. Kshirsagar, She is presently working as a Principal, SDMP, Nagpur. She has a versatile experience in teaching and management field