SlideShare a Scribd company logo
1 of 58
Download to read offline
For more Https://www.ThesisScientist.com
1
Performance Evaluation of Reactive and
proactive Routing protocols in VANET
A Dissertation Report Submitted in the Partial Fulfilment of
The Award of the Degree of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Under Guidance of: Submitted By:
Name of Internal Guide Name of Students
(Designation) Roll No
LOGO
DEPARTMENT OF COMPUTER SCIENCE
For more Https://www.ThesisScientist.com
2
DECLARATION………………………………………………………………. i
ACKNOWLEDGEMENTS................................................................................. ii
CERTIFICATE ……………………………………………………................... iii
ABSTRACT…………………………………………………………………….. iv
LIST OF FIGURES……………………………………………….................... viii
LIST OF TABLES……………………………………………………………... xi
LIST OF ABBREVIATIONS…………………………………………………. xii
CHAPTER 1 INTRODUCTION
1.1. Introduction…………………………………………………………....
1.2. Description of Broad Area……………………………………………
1.2.1. VANET Overview………………………………………………
1.2.2. VANET Architecture…………………………………………..
1.2.3. Types of VANET Architecture..............................................
1.2.4. VANET Standards, Regulations and Layered Architecture........
1.2.5. Some other wireless technologies in VANET...........................
1.3. Application of VANETs……………………………………….
1.3.1. Safety oriented applications of VANET…………………………
1.3.2. Convenience oriented applications of VANET..........................
1.3.3. Commercial oriented application.............................................
1.4. Security Challenge of VANET..........................................................
1.5. Attacks on VANET..........................................................................
1.6. Mobility Models..............................................................................
1.7. VANET Routing Protocols………………………………...................
1.7.1. Proactive Routing Protocols……………………………………
1.7.2. Reactive Routing Protocols……………………………………
1.8. Motivation……………………………………………………………..
1.9. Problem Statement………………………………………………........
1.10. Aims and Objectives……………………………………………
1.11. Methodology……………………………………………………
1.12. Layout of the Dissertation……………………………………
1.13. Conclusion………………………………………………………
1
1
2
3
3
7
9
11
12
12
12
15
15
16
18
20
20
22
23
24
24
25
26
27
For more Https://www.ThesisScientist.com
3
CHAPTER 2 LITERATURE REVIEW....................................................
2.1 Introduction…………………………………………………………………
2.2 VANET Routing Protocols…………………………………………………
2.3 Reactive Routing Protocols…………………………………………………
2.3.1 Ad hoc On Demand Distance Vector Routing……………………….
2.3.2 Dynamic Source Routing……………………………………..............
2.4 Proactive Routing Protocols………………………………………………..
2.4.1 Destination Sequence Distance Vector Routing Protocols…...............
2.5 Simulation Tools…………………………………………………………….
2.5.1Mobility Generators…………………………………………………..
2.5.2 VANET Simulators…………………………………………………..
2.5.3 Network Simulators………………………………………………….
2.6 Classification of VANET Applications………………………………….....
2.7 Safety Applications in VANET...............................................................
2.8 State of The Art....................................................................................
2.7 Conclusion…………………………………………………………………..
28
28
29
30
30
34
35
35
37
37
41
42
46
49
52
58
For more Https://www.ThesisScientist.com
4
Chapter 1
INTRODUCTION
In this chapter a brief introduction to basic concepts behind the emerging area of
Vehicular Ad hoc Networks (VANET) has been described. This chapter also describes
its architecture, domains and standards, at the same time this chapter describes an
overview of its applications, routing protocols and security challenges.
1.1 Introduction:
The increasing demand of wireless communication and wireless devices have tends to
research on self organizing, self healing networks without the interference of any
centralized or pre-established infrastructure/authority [2]. The networks with the
absence of any centralized or pre-established infrastructure are known as Ad hoc
networks [4]. Ad hoc Networks are the category of wireless networks that uses multi
hop radio relay.
Figure 1.1: Working structure of VANET
For more Https://www.ThesisScientist.com
5
Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks
(MANETs) [4]. It is the most advanced technology that provides Intelligent
Transportation System (ITS) in wireless communication among vehicles to vehicles
and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard [2].
VANET provides broad range of safety and non safety applications. Safety
application provides safety to the passengers such as lane change warning, collision
detection etc. It also provides comfort and commercial applications to the road users
such as electronic toll collection, audio/video exchanging, electronic payments, route
guidance, weather information, mobile E-commerce, internet access etc. Figure 1.1[1]
shows the overall working structure of Vehicular Ad hoc Network (VANET).
1.2 VANET Overview:
Vehicular Ad hoc Networks (VANETs) is a subclass of Mobile Ad Hoc Networks
(MANETs) that has emerged because of recent growth in wireless technology and
sensors networks [2, 4]. Vehicular Ad hoc Networks (VANETs) are one of ad-hoc
network‟s real applications where communication among vehicles and nearby fixed
equipment is possible. It reduces both traffic congestion and vehicles crashes which
are serious issues throughout the world.
1.2.1 VANET Architecture:
Vehicular Ad hoc Network (VANET) system architecture [5] consists of three
different types of domains such as in-vehicle, ad hoc, and infrastructure domains and
many individual components such as application unit, on-board unit, and road-side
unit. The figure 1.2[14] shows the all components and domains of VANET.
For more Https://www.ThesisScientist.com
6
Figure 1.3: VANET System Architecture.
In-Vehicle Domain: This domain consists of one or more applications units (AUs)
and a single On-Board Unit (OBU) that resides inside a vehicle [19]. Applications
Units (AUs) is an in- vehicle entity, multiple AUs can be plugged in with a single
OBU and share the OBU processing and wireless resources. An On-Board Unit
(OBU) is used for providing the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle
(V2V) communication. An OBU is equipped with a single network device based on
IEEE 802.11p radio technology; basically network device is used for sending,
receiving and forwarding the safety and non safety messages in the ad hoc domain .
For more Https://www.ThesisScientist.com
7
Ad hoc Domain: This VANET domain composed of vehicles or nodes that equipped
with On-Board Unit (OBUs) and road-side units (RSUs), that forming the VANET
[19]. A road side unit is a physical device located at fixed positions like hospitals,
shopping complexes, colleges, road highways etc. An RSU is equipped with at least a
network device based on IEEE 802.11p standard [30]. The main function of RSU is to
provide the internet connectivity to the OBUs. On-Board Units (OBUs) form a mobile
ad hoc network that allows communications among vehicles without the need for a
centralised coordination instance. Two vehicles directly communicate via On-Board
Units (OBUs) if wireless connectivity exists among them; else multi-hop
communications are used to forward data [30].
Infrastructure Domain: The infrastructure domain consists of Road-Side Units
(RSUs) and wireless Hot-Spots (HS) that the vehicles access for safety and comfort
based applications [18, 29]. These two types of infrastructure access, road-side units
(RSU) and Hot-Spots (HS).In case that neither road-side units (RSUs) nor Hot-Spots
(HT) provide internet access, OBUs can also utilise communication abilities of
several radio networks or technologies such as GPRS, GSM, WiMax, if they are
integrated in the On-Board Unit (OBU), in particular for non-safety applications.
Application Units (AUs): An Applications Units (AUs) is an in-vehicle entity,
multiple AUs can be plugged in with a single OBU and share the OBU processing and
wireless resources [29]. Examples of Application Units (AUs) are I) safety
applications devices like hazard-warning, or ii) a navigation system with
communication capabilities. Multiple Application Units can be plugged in with a
single On-Board Unit (OBU) simultaneously and share the On-Board Units (OBUs)
processing and wireless resources. An Application Unit (AU) communicates solely
via the On-Board Unit (OBU), which handles all mobility and networking functions
on the Application Unit (AU) behalf. The distinction between an Application Unit
(AU) and an On-Board Unit (OBU) is only logical and an Application Unit (AU) can
be physically co-located with an OBU [29].
On-Board Units (OBUs): The On-Board Unit (OBU) used for vehicle to vehicle
(V2V) communications and vehicle to infrastructure or road side unit (V2I)
For more Https://www.ThesisScientist.com
8
communications [29]. It also provides communication services to the application units
and also forwards data on behalf of other On-Board Units (OBUs) in the ad hoc
domain. An On-Board Unit (OBU) is equipped with at least a single network device f
IEEE 802.11p standard. This network device is responsible for sending, receiving and
forwarding safety and non safety messages in the ad-hoc domain. The main functions
and procedures of On-Board Unit (OBU) includes wireless radio access, geographical
ad hoc routing, network congestion control, reliable message transfer, data security,
IP mobility support, and others.
Road-Side Units (RSUs): A Road-Side Unit (RSU) is a physical device situated at
fixed positions along roads and highways, or at dedicated locations such as colleges,
petrol pumps, parking places, hospitals, shopping complexes, restaurants etc [19, 29].
A Road-Side Unit (RSU) is equipped with at least a network device based on IEEE
802.11p. The main function of RSU is to provide the internet connectivity to the
OBUs. An overview of the main functions performed by RSU is given below.
i. Extending the communication range of an ad hoc network by means of re-
distribution of information to other OBUs and cooperating with other RSUs in
forwarding or in distributing safety information (Figure 1.4).
ii. Running safety applications, such as for vehicle-to-infrastructure warning (e.g.
low bridge warning, work-zone warning), and act as information source
(Figure 1.5).
iii. Providing internet connectivity to all OBUs for accessing safety and non
safety applications (Figure 1.6).
Figure 1.4: RSU extends communication range
For more Https://www.ThesisScientist.com
9
Figure 1.5: RSU acts as information source
Figure 1.6: RSU providing internet access
2. Motivation
Traffic safety is a major challenge recognised by the major players in the automotive
industry and by many governments. Traffic delays continue to increase, wasting many
hours for peak time travellers. Apart from traffic safety and efficiency, features like
internet access, entertainment, payment services and information updates into can be
integrated into vehicles to improve passenger comfort. Normally a driver, has
incomplete information about road conditions, speed and location of vehicles around
them, and is forced to make decisions like breaking and lane changing without the
benefit of whole data. Real time communication between vehicles or between vehicles
and road-side infrastructure can improve traffic safety and efficiency [7]. For
For more Https://www.ThesisScientist.com
10
example, if a vehicle needs to slow down due to an accident ahead, it will broadcast
warning messages to neighbouring vehicles. The vehicles behind it will thus be
warned before they actually see the accident, helping the drivers react faster. In
another scenario, if vehicles can transmit traffic congestion information to other
vehicles in its transmission range, it can help other vehicles receiving the information
to chose alternate routes and avoid traffic congestion.
Vehicular Ad hoc Networks (VANETs), an extension of mobile ad hoc networks
(MANET) [8], were developed with a view to enable real-time communication
between mobile nodes (either vehicles or road side infrastructure) over wireless links,
primarily with a view to enable traffic safety and efficiency. The communication
between two or more nodes in a Vehicular Ad hoc Networks (VANET) faces many
unique challenges [8]. This is especially true for safety-critical applications like
collision avoidance, pre-crash sensing, lane change etc. Factors like high vehicle
speeds, low signal latencies, varying topology, total message size, traffic density etc.
induce challenges that makes conventional wireless technologies and protocols
unsuitable for Vehicular Ad hoc Networks (VANETs).Apart from the performance
challenges, there are many security issues unique to VANET like authenticating
message sender, verifying validity of message data (like vehicle position), providing
node privacy with non-repudiation, certificate revocation, availability etc. All these
performance and security requirements contribute to make VANET safety
applications challenging unlike other wireless applications.
3. Problem Statement:
There are many comparative studies and surveys that compare various ad hoc routing
in VANET environment. The simulations performed in these comparative studies are
very basic do not incorporate with the large number of nodes in real Vehicular Ad hoc
Network environment. The main aim of our dissertation work is to firstly investigate
the reactive and proactive routeing protocols than examine the performance of
selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing
(DSDV), Ad hoc On Demand Distance Vector (AODV), Optimized Link State
Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance
metrics like network load, throughput and end-to-end delay with varying number of
mobile nodes or vehicle node density (100, 150, 200, 250, 300 and 350) i.e. low
For more Https://www.ThesisScientist.com
11
vehicle-node density (100 and 150 mobile nodes) medium vehicle-node density (200
and 250) mobile nodes) and high vehicle-node density (300 and 350 mobile nodes)
with constant mobility 10m/s.hen the selected routing protocols (OLSR, DSR) have
been simulating via a simulation tool i.e. OPNET Modeler v14.5 and compared in
terms of network load, throughput and packet end to end delay.
4. Aims and objectives:
The main aim of this dissertation is to evaluate the performance of Four routing
protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On
Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and
Dynamic Source Routing (DSR) with varying number of mobile nodes or vehicle
node densities (100, 150, 200, 250, 300 and 350) i.e. low vehicle-node density (100
and 150 mobile nodes) medium vehicle-node density (200 and 250) mobile nodes)
and high vehicle-node density (300 and 350 mobile nodes) with constant mobility
10m/s. After getting simulation results a detail comparative study of AODV, DSDV,
OLSR and DSR for Vehicular Ad hoc Network (VANET) have been performing. The
comparative study based on different performance metrics i.e. throughput, packet end
to end delay and network load. To achieve this aim we have set the following
objectives:
 To conduct a detailed literature survey to review the current state of art of
routing protocols used in Vehicular Ad hoc Networks.
 To explore different classification of routing protocols in Vehicular Ad hoc
Networks. Furthermore also identify the major performance issues in such
networks.
 To evaluate the performance of selected routing protocols with varying
number of mobile nodes
 Perform a detail comparative analysis of selected routing protocols by taking
three performance metrics.
5. Methodology:
In this dissertation, following steps are carried out to achieve the objectives of this
thesis work.
For more Https://www.ThesisScientist.com
12
5.1 Literature Review: In these steps a detailed literature review of any published
work that relevant to the dissertation area is carried out.
5.2 Understanding Background Information: In this step a detail study of the area
of dissertation is carried out for better understanding of the subject of dissertation. It
is simple to start with Mobile Ad hoc Network (MANET) which are the base of
Vehicular Ad hoc Network.
5.3 Functionality of Routing Protocols: In this step a detail study of various ad hoc
routing protocols: reactive routing protocols (OLSR, DSR) and proactive routing
protocols (DSDV, OLSR) is carried out for understanding the functionality of routing
protocols.
5.4 Simulation Tool: In this step a detail study of various network simulators,
mobility generators and VANET simulators is carried out. And select a simulation
tool for our dissertation work.
5.5 Simulation: In this dissertation work we employed OPNET Modeler v14.5 for
performance evaluation of AODV, DSDV, OLSR and DSR routing protocols. The
performance comparison of selected routing protocols (AODV, DSDV, OLSR and
DSR) will be done by consideration of with varying number of mobile nodes or
vehicle node densities taking with varying mobility. Then results are compared in the
terms of performance metrics i.e. throughput, packet delay and network load.
5.6 Analysis of Results: In this step result obtained for the selected routing protocols
(AODV, DSDV, OLSR and DSR) by using considered performance metrics and
scenarios is carried out. After analysis of results a detailed comparative study of
selected routing protocols is performed.
For more Https://www.ThesisScientist.com
13
Chapter 2
LITERATURE REVIEW
In this chapter a detail literature review on Vehicular Ad- Hoc Networks (VANETs)
has been carried out. This chapter also describes a detail overview of VANET routing
protocols, at the same time this chapter also describes several VANET simulators,
network simulators and mobility generators that used in simulation for Vehicular Ad
hoc Networks.
2.1 Introduction:
There are several routing protocols designed for Vehicular Ad hoc Networks
classified either as proactive or reactive that have been describes in next section.
There are some ad hoc routing protocols which are combination of both proactive and
For more Https://www.ThesisScientist.com
14
reactive routing characteristics. These protocols are known as hybrid routing
protocols. This chapter is organized as follows: Section 2.2 introduces the various
routing protocols for Vehicular Ad hoc Networks. Section 2.3 describes the various
VANET reactive routing protocols: AODV and DSR. Section 2.4 presents the
VANET proactive routing protocols: DSDV and OLSR. The various mobility
generators, network simulators and VANET simulators are describes in Section 2.5.
Section 2.6 presents the current state of the art. Section 2.7 describes a detail
overview of several VANET applications. And examples of various VANET
applications are explained in Section 2.8. Finally, Section 2.9 concludes this chapter.
2.2 VANET Routing Protocols:
Routing is a mechanism to establish and to select a specific path in order to send data
from source to destination [14, 16]. There are various routing algorithm designed for
ad-hoc networks. Classification of various VANET routing protocols can be divided
in two broad categories: proactive and reactive routing protocols that shown in figure
2.1. In the next section describes a detail overview of various reactive routing
protocols (AODV, DSR).
Figure 2.1: VANET Routing Protocols
2.3 Reactive/On Demand Routing Protocols:
Reactive routing protocols were designed to reduce the overheads by maintaining
information for active routes at each node [8]. This means that each node determined
and maintained routes only when it requires sending data to a particular destination. It
For more Https://www.ThesisScientist.com
15
using two main mechanisms for route establishment: Route discovery and Route
maintenance [17, 25]. Route discovery mechanism uses two messages: Route Request
(RREQ) and Route Reply (RREP).
Figure 2.2: Route Request Propagation in Reactive Routing Protocols
The basic approach is when a node needs to send a message to a particular
destination, it broadcasts the RREQ message in the network that shown in figure 2.2
When RREQ message found a destination node then destination node send a RREP
message to source node that shown in figure 2.3.
Figure 2.3: Route Reply Propagation in Reactive Routing Protocols
For more Https://www.ThesisScientist.com
16
2.3.1 Ad hoc On Demand Distance Vector (AODV): Ad hoc On Demand Distance
Vector (AODV) is a pure reactive routing protocol which is capable of both
unicasting and multicasting. In Ad hoc On Demand Distance Vector (AODV), like all
reactive protocols, it works on demand basis when it is required by the nodes within
the network [8, 14]. When source node has to send some data to destination node then
initially it propagates Route Request (RREQ) message which is forwarded by
intermediate nodes until destination is reached. A route reply message is unicasted
back to the source node if the receiver is either the node using the requested address,
or it has a valid route to the requested address that is shown is figure 2.4.
(a) (b)
Figure 2.4: AODV Route Discovery Process. (a) Propagation of the RREQ. (b)
Path of the RREP to the source.
Working of Ad Hoc On Demand Distance Vector Routing (AODV): In this type of
routing [14, 16] allows the communication between two nodes via intermediated
nodes, if those two nodes are not within the range of each other. To establish a route
between source to the destination, AODV using route discovery phase, along which
Route Request message (RREQ) messages are broadcasted to all its neighbouring
nodes. This phase makes sure that these routes do not forms any loops and find only
the shortest possible route to the destination node. It also uses destination sequence
number for each route entry, which ensures the loop free route, this is the one of the
main benefit of AODV routing protocol. For example if two different sources send
two different requests to a same destination node, then a requesting node selects the
For more Https://www.ThesisScientist.com
17
one with greatest sequence number. In the route discovery phase several control
messages are defined in AODV that are defined as follows.
a) RREQ (Route Request): When any node wants to communicate with other
node then it broadcast route request message (RREQ) to its neighbouring
nodes [14, 16]. This message is forwarded by all intermediate nodes until
destination is reached. The route request messages (RREQ) contains the some
information such as RREQ id or broadcast id, source and destination IP
address, source and destination sequence number and a counter that shown in
figure 2.5.
Figure 2.5: AODV Route Request Message Format
b) RREP (Route Reply): When any intermediate nodes received Route Request
(RREQ) message then it unicast the route reply message (RREP) to source
node either it is valid destination or it has path to destination and reverse path
is constructed between source and destination [14, 16]. Each route reply
message (RREP) packet consist of some information such as hop count,
destination sequence number, source and destination IP address that shown in
figure 2.6.
For more Https://www.ThesisScientist.com
18
Figure 2.6: AODV Route Reply Message Format
c) RERR (Route Error): Whenever there is any link failure arises in the routing
process then route error message (RERR) is used for link failure notifications.
The route error message (RERR) consist of some information such as
Unreachable Destination node IP Address, Unreachable Destination node
Sequence Number that shown in figure 2.7.
Figure 2.7: AODV Route Error Message Format
Routing in AODV: There are various mechanisms which are followed in AODV
routing approach:
a) AODV Route Discovery phase: To establish a route between source node to
the destination node, AODV using route discovery phase, along which the
Route Request message (RREQ) messages are broadcasted to all its
neighbouring nodes [14]. This phase makes sure that these routes do not forms
For more Https://www.ThesisScientist.com
19
any loops and find only the shortest possible path to the destination node. It
also uses destination sequence number for each route entry that ensures the
loop free route, this is the one of the main benefit of AODV routing protocol.
For example if two different sources sends two different request to a same
destination node, then a destination node selects only that node having largest
sequence number. In the route discovery phase several control messages are
defined in AODV protocol.
b) AODV Route Table Management: In AODV, Routing table management is
required to avoid those entities of nodes that do not exist or having invalid
route from source to destination. The need for routing table management is
important to make communication loop free. It consists of following
characteristics to maintain the route table for each node.
• Destination IP address
• Total number of hops to the destination
• Destination sequence numbers
• Number of active neighbours
• Route expiration time
c) AODV Route Maintenance: In AODV, when any node in the network detects
that a route is not valid anymore for communication it delete all the related
entries from the routing table .And it sends the Route reply message (RREP)
to all current active neighbouring nodes to inform that the route is not valid
anymore for communication purpose.
2.3.2 Dynamic Source Routing Protocol (DSR):
Dynamic Source Routing is a reactive routing protocol that is based on the concept of
source routing [8, 16]. Source routing means source has the complete knowledge of
entire route to the destination before transmitting data. In DSR each node maintains a
route cache where it records all possible learned routes. It using two main
mechanisms: Route discovery and Route maintenance.
a) Route Discovery: Whenever a source node wants to send a data packet to
destination node in the network, it first looks in its Route Cache to find a valid
hop sequence to the destination [1]. If such a route exists, the source node
attaches to the packet header the complete route to the destination and
For more Https://www.ThesisScientist.com
20
forwards the packet to the next node. The next node checks the packet header
and forwards the packet to the next node. The process terminates when the
packet reaches the destination. If the source node cannot find a valid hop
sequence to the destination in its Route Cache then it initiates a route
discovery process [17].
Figure 2.8: Route Request Propagation in DSR
 In route discovery process a route request (RREQ) message is broadcasts to all
its neighbouring nodes, adding a unique request ID to each request to prevent
other nodes from transmitting the same request [17].
Figure 2.9: Route Reply Propagation in DSR
 Each of the intermediate nodes receives RREQ and searches in its Route
Cache, and if it finds such a route, it sends a Route Reply (RREP) message
For more Https://www.ThesisScientist.com
21
back to the source node with the complete path to the destination. In order to
minimize the Route Request (RREQ) in the network, the intermediate or
destination node discard the duplicate Route Request (RREQ) message
identified by the same request identification number and common source.
Figure 2.8 shows the RREQ message propagation in the network. And figure
2.9 shows the propagation of RREP message that carries the entire hop
sequence.
a) Route Maintenance: Route Maintenance is done by the propagation of route
error message (RERR). Whenever any active node sees or detects the link
failure, it propagates the route error message to its upstream neighbours along
the reverse path till it reaches the source node. To verify the correct operation
of the router links, HELLO messages and acknowledgement messages can be
used.
2.4 Proactive/Table Driven Routing Protocols:
These types of protocols are table based because they maintain table of connected
nodes to transmit data from one node to another and each node share its table with
another node. These protocols desire to maintain up-to-date and consistent routing
information in the network. Thus, every node maintains one or more routing table to
store routing information about every other node in the network. So due to this reason,
these type of protocols are not preferred for large network. There are different types
of proactive routing protocols: Destination Sequence Distance Vector Routing
(DSDV), Optimized link state routing (OLSR), Fisheye State Routing (FSR).
2.4.1 Destination Sequence Distance Vector Routing (DSDV):
Destination Sequence Distance Vector Routing (DSDV) is a table driven routing
protocol based on the Bellman-Ford algorithm. In this type of routing protocol every
node in the network share packet with its entire neighbour [19]. And packet contain
information such as node‟s IP address, last known sequence number, hop count.
Whenever there is topology change in network each node advertises its routing status
after a fixed time or immediately.
Working of Destination Sequence Distance Vector Routing (DSDV):
For more Https://www.ThesisScientist.com
22
The main objective of DSDV routing protocol is to avoiding loop formation and
maintains its simplicity. In DSDV whenever any node want to transmitted a packet or
information to the destination node, it using the routing table [16]. Routing tables are
maintained by each node in the network, each node routing table maintains some
information like destination address, number of hops required to reach the destination
and sequence number. Thus the routing table consist of following entries
<destination, distance, next hop> [16]. Whenever any node want to sending a
message to other node than it adds a sequence number in the routing entries, the
sequence number indicates the newness of the information to the routing table. In
DSDV routing protocol routes with the latest sequence number are always preferred
for forwarding a message to one node to other. If one or more source have same
sequence number and sending a message to the same destination then in this case
route with lower distance is preferred [16].
Figure 2.10: Routing in DSDV
For more Https://www.ThesisScientist.com
23
2.5 Simulation Tools:
The simulation software or tools have been classified into three different categories.
They are (a) Vehicular mobility generator (b) Network simulator (c) VANET
simulators [20]. VANET mobility generators are used to generate realistic movement
traces of the vehicles motion to increasing level of realism in VANET simulation.
These traces subsequently imported into a network simulator as an input in order to
study the performance of the protocol application. Network simulators are used to
perform detailed packet-level simulation of source, destinations, reception, route,
background load, links, data traffic transmission and channels [20]. Finally, VANET
simulators provide both network simulation and traffic flow simulation. In the next
few sections, we will discuss vehicular mobility generators, network simulators and
VANET simulators in greater depth with their characteristics, functions.
2.5.1 Mobility Generators:
VANET mobility generators are used to generate traces of the vehicles motion that
can be usually saved and subsequently imported into a network simulator in order to
study the performances of the protocol application [20]. As mentioned earlier, it is
important to generate realistic movement traces in order to rigorously evaluate
VANET protocols because the overall performances depend on the connectivity
which, in turn, relies on the movement traces.
A. TSIS-CORSIM: TSIS-CORSIM (Traffic Software Integrated System Corridor
Simulation) is a powerful commercial traffic simulation package, developed at
the University of Florida and funded by the Federal Highway Administration
(FHWA). It is a microscopic simulation model that is especially designed to
simulate highways and surface streets and, thus, includes traffic signals and
stop signs [20]. This simulator is made up of two main components, NETSIM
for simulating surface streets, and FRESIM for simulating freeways.
Unfortunately, TSIS-CORSIM simulator requires Microsoft Windows and
Internet Explorer to run. It can simulate very complex traffic scenarios and
thus it can take a large amount of information as input.
B. STRAW: Street Random Waypoint (STRAW) mobility generator gives the
more accurate simulation results by using a vehicular mobility model based on
For more Https://www.ThesisScientist.com
24
the operation of real vehicular environment [20, 29]. Its current
implementation is written for the JiST/SWANS discrete-event based
simulator. STRAW is part of the Car-to-Car Cooperation project also known
as C3 project.
C. SUMO: Simulation of Urban Mobility (SUMO) is an open source, highly
portable microscopic road traffic simulation package that deals with very large
number of nodes in Vehicular Ad hoc Network [20]. It can be used on most of
the operating system. Because of high portability and its GNU General public
license SUMO has become more popular and most widely used in Vehicular
Ad hoc Networks. It has evolved into a full featured suite of traffic modelling
utilities uses own formats for road networks and traffic demand generation and
routing utilities [4].The main merits of SUMO is that it is OpenGL GUI based,
highly portable, open source, easy simulation set-up, portable libraries,
imports different formats, collision free movement and large number of map
defined for better understanding. But it has some limitations such as, less user
friendly interface and its traces do not support NS-2, GloMoSim and QualNet.
Figure 2.11: Graphical User Interface of SUMO
For more Https://www.ThesisScientist.com
25
D. MOVE: Mobility model generator for Vehicular network (MOVE) is a
mobility generator built on top of the SUMO (Simulation of Urban Mobility)
and rapidly generates realistic mobility models for VANET simulations. The
MOVE‟s output is a mobility trace file that consists of realistic vehicle
movement‟s information which can be used by popular simulation tools such
as NS-2 or GloMoSim or QualNet. MOVE consists of two main components:
Mobility model and traffic model generator. Mobility Model Generator
provides a user friendly interface for generating mobility model for
simulations using SUMO. It also allows the user to create customized
topology or import maps. And Network Traffic Model generator takes the
SUMO trace file as the input and generates the network traffic model as
required by either NS-2 or QualNet. It provides all the configurable option of
NS-2 TCL files, like specifying MAC, routing protocol to use, etc.
For more Https://www.ThesisScientist.com
26
Figure 2.12: Graphical User Interface of MOVE
E. FreeSim: FreeSim is an open source and portable microscopic and
macroscopic free-flow traffic simulator. Traffic and graph algorithms can be
easily created and executed for the entire network or for individual vehicles or
nodes [20, 29]. FreeSim is ideal for Intelligent Transportation System (ITS)
simulation because Vehicles in FreeSim can communicate with the system
monitoring traffic on the freeways. The main features of FreeSim are: It is
GUI based, highly portable, easy to simulation set-up, easy to use, open source
and large number of examples available for better understanding. But it has
some limitations also like not import different formats, and its traces do not
support NS-2, GloMoSim, QualNet, SWANS.
F. CityMob: CityMob is a highly portable, open source, GUI based mobility
model generator generally used in Vehicular Ad hoc Networks (VANETs)
[20]. The main advantages of CityMob like easy to create simulation set-up
and easy to use , for better understanding large number of example is available
But its biggest limitations is that it generated traces does not support NS-
2,GloMoSim,QualNet,SWANS. And real and user defined maps is not
available here [20, 29].
2.5.2 VANET Simulators:
A. GrooveNet: GrooveNet is a hybrid simulator that integrated both network and
mobility simulator. It allows communication between real and simulated
vehicles. GrooveNet is an open source hybrid simulator that integrated both
network and mobility simulator [20, 29]. It allows communication between
real and simulated vehicles. Its modular architecture incorporates mobility,
trip, and message broadcast models over physical layer and Link layer
communication models [20].
B. TraNS: TraNS (Traffic and Network Simulation Environment) is the first
VANET simulator. It is a simulation tool that integrates both mobility
generator and network simulator for conducting realistic VANET simulation
[20]. It provides a tool to build realistic VANET simulations. TraNS also
For more Https://www.ThesisScientist.com
27
provides a feedback between mobility model and vehicular behaviour. It can
operate in two modes: application-centric mode and network centric mode. In
the network-centric mode, there is no feedback provided from NS-2 to SUMO.
So the link between NS-2 and SUMO is done through a parser. Parser analyses
the mobility trace file generated by SUMO simulator and then converts it to a
suitable format for NS-2 simulator. In the case of application-centric mode,
the feedback between NS-2 and SUMO is provided through an interface called
TraCI. In this mode SUMO and NS-2 must run simultaneously [20, 29].
C. NCTUns: National Chiao Tung University Network Simulator (NCTUns) is a
VANET simulator that combines both traffic and network simulator in to a
single module that built using C++ programming language and supports high
level of GUI. It is a highly extensible and robust network simulator in no need
to be worry about the code complexity [20]. It supports parallel simulations
for fixed network on multi core machines. The main merits of NCTUns is that
it can simulate IEEE 802.11a, IEEE 802.11b, IEEE 802.11e, IEEE 802.16d,
IEEE802.11g and IEEE 802.11 technologies, and supports large number of
nodes. NCTUns includes bidirectional and unidirectional communication.
Compared to TraNS, NCTUns combines traffic and network simulator
together in a single module and returns feedback to supports VANET.
However, the maximum number of nodes that can be simulated by single
simulation by NCTUns is just 4096. But it has some limitations such as,
complex set up procedure and it can works only on Fedora 9 Linux platform
[20].
2.5.3 Network Simulators:
Network simulators perform detailed packet-level simulation of source, destinations,
reception, route, background load, links, data traffic transmission and channels. There
are various types of network simulators some of them are describes as follows.
A. NS-2: Network Simulator (Version 2), called as the NS-2, is simply an event
driven, open source, portable simulation tool that used in studying the
dynamic nature of communication network. Several different NS-2 versions
have been released over the last few years; the latest version of NS-2 is the
NS-2.35 [20]. Users are feeding the name of a TCL simulation script as an
For more Https://www.ThesisScientist.com
28
input argument of NS-2 executable command ns. NS-2 uses two key
languages one is the C++ and second is the Object-oriented Tool Command
Language (OTCL). In NS-2 C++ defines the internal mechanism (backend) of
the simulation objects, and OTCL defines external simulation environment
(i.e., a frontend) for assembling and configuring the objects. After simulation,
NS-2 gives simulation outputs either in form of NAM files or trace files [20].
In NS-2 some limitation can be found in terms of the installation process on
windows based operating systems. To run NS-2 on window based
environment a software program is used for creating Unix-like environment
known as Cygwin; downloading and installing of Cygwin on windows based
system is quite complex because of large size of packages of Cygwin [20].
Figure 2.13: Architecture of Network Simulator
B. OPNET: Optimized Network Engineering Tool (OPNET) is a commercial
network simulator environment used for simulations of both wired and
wireless networks [20]. Several different OPNET versions have been released
over the last few years; the latest version of OPNET is the OPNET 16.0. At
present OPNET is licensed under Riverbed technologies. It allows the user to
design and study the network communication devices, protocols, individual
applications and also simulate the performance of routing protocol. It supports
many wireless technologies and standards such as, IEEE 802.11, IEEE
802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru
Academic Edition is available for free to the academic research and teaching
community. It provides a virtual network environment that models the
behaviour of an entire network including its switches, routers, servers,
For more Https://www.ThesisScientist.com
29
protocols and individual application. The main merits of OPNET are that it is
much easier to use, very user friendly graphical user interface and provide
good quality of documentation [20].
Figure 2.14: Graphical User Interface of OPNET
C. GloMoSim: GloMoSim (Global Mobile Information System Simulator) is a
scalable simulation environment especially designed of MANET and its
applications [20]. It is open source, portable and includes a large set of routing
protocols and several physical layer implementations. It was retired in 2000
but it is still possible to download for educational purposes only. On the other
side, Scalable Network Technologies introduced the commercial version of
GloMoSim (Global Mobile Information System Simulator) named as QualNet
(Quality Networking) simulator. The main merits of QualNet simulator
(Quality Networking), is that it is portable, highly scalable and extremely
powerful simulator. One of the main merits of QualNet is that it is run on both
Windows and Unix/Linux platforms [20].
D. QualNet: Quality Networking (QualNet) simulator is a highly scalable, fastest
simulator for large heterogeneous network that supports the wired and wireless
For more Https://www.ThesisScientist.com
30
network protocol. QualNet execute any type of scenario 5 to 10 times faster
than other simulators [20].
Figure 2.16: Graphical User Interface of QualNet
 It is highly scalable and simulate up to 50,000 mobile nodes. And this
simulator is designed as a powerful Graphical User Interface (GUI) for custom
code development [20]. The main merits of QualNet simulator (Quality
Networking), is that it is portable, highly scalable and extremely powerful
simulator. One of the main merits of QualNet is that it is run on both Windows
and Unix/Linux platforms [20].
E. VanetMobiSim: VanetMobiSim is an extension of the CANU Mobility
Simulation Environment (CanuMobiSim) which focuses on vehicular mobility
and features realistic automotive motion models at both microscopic and
macroscopic levels [20, 24]. At the microscopic level it supports mobility
models such as Intelligent Driving Model with Lane Changing (IDM/LC) and
Intelligent Driving Model with Intersection Management (IDM/IM). It also
supports car to infrastructure and car to car communication, which supports
traffic lights, multi-lane roads, separate directional flows stop signs and traffic
For more Https://www.ThesisScientist.com
31
signs at intersections. VanetMobiSim is based on JAVA and can generate
movement traces in different formats, supporting different simulation for
mobile networks including ns-2, GloMoSim, and QualNet [20].
F. SWANS: SWANS (Scalable Wireless Ad hoc Network Simulator) was
proposed to be a best alternative to the NS-2 simulator for simulating the
wireless and ad hoc networks. On the basis of comparative study of simulators
like SWANS, GloMoSim, and NS-2, it is found that SWANS simulator is the
most scalable and more memory efficient. SWANS take Java file as an input.
It is a scalable wireless network simulator built top on the JIST platform and
good capabilities like NS-2 and GloMoSim [20, 29].
2.6 Classification of the VANET Applications:
The prospective applications of Vehicular Ad hoc Networks (VANET) are
categorized in to three major groups as comfort oriented applications, convenience-
oriented applications and safety oriented applications [11]. Safety oriented related
applications look for the increasing safety of passengers by exchanging relevant
information via vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). And
comfort and convenience applications improve passenger‟s comfort and traffic
efficiency.
2.6.1 Safety-Oriented Applications: These types of applications help the driver to
avoid potential dangers via the exchange of information among vehicles. They are the
most important applications because they serve to avoid accidents [11].
For more Https://www.ThesisScientist.com
32
Figure 2.17: Safety Applications provided by VANET
They can take control of the vehicle in case of dangerous situations, as in the case of
the automatic braking, or only send warning messages to drivers. Some safety
oriented application shown in Table 1.1[11].
Table 2.1: Examples of Safety-Oriented Applications
Name Description
Intersection violation warning It warns drivers when they are going to pass over a
red light.
On-coming traffic warning It helps the driver during overtaking manoeuvres
Electronic brake warning It reports to the driver that a preceding vehicle has
performed a sudden braking.
Vehicle stability warning It alerts drivers that they should activate the vehicle
stability control system.
Post-crash notification A vehicle involved in an accident sends warning
messages in broadcast to approaching vehicles.
Traffic signal violation
warning
A roadside unit sends messages in broadcast to
warn drivers of potential violations of traffic
signals.
Lane change warning It helps drivers to perform a safe lane change
For more Https://www.ThesisScientist.com
33
2.6.2 Convenience-Oriented Applications: These types of applications improve the
efficiency of the roads and to save drivers time and money. Some Convenience
oriented application shown in Table 1.2[11].
Figure 2.18: Convenience Oriented Application Provided by VANET
Table 2.2: Examples of Convenience-Oriented Applications
Name Description
Intersection management V2V and V2R communications allow a better
intersections management
Limited access and detour
warning
A roadside unit sends information in broadcast
about limited access areas or possible detours.
Electronic toll collection A vehicle establishes unicast communication
with a toll gate roadside unit and pays the toll
without stopping.
Parking availability notification A vehicle asks to a roadside unit for a list of
available parking spaces, and the roadside unit
sends the list to the vehicle.
Congested road notification A vehicle in a congested road sends information
in broadcast to other vehicles.
2.6.3 Commercial-Oriented Applications: These types of applications serve to make
the travelling more comfortable and productive, for example, by means of the internet
connection. Some Commercial oriented application shown in Table 1.3[11].
For more Https://www.ThesisScientist.com
34
Table 2.3: Examples of Commercial-Oriented Applications
Name Description
Remote diagnosis The driver can start a wireless connection with the
dealer in order to upload the vehicle diagnostics
information to detect possible problems.
Media or map download A vehicle can start a wireless connection with the
home network or a hot-spot to download maps and
multimedia contents.
Service announcement Restaurants and other businesses can use a roadside
unit to send promotional messages to the drivers of the
vehicles that are in their communication range.
2.7 Safety Related VANET Applications: As presented in [9], there are five
possible safety applications in VANETs:
 Intersection violation warning
 Electronic brake warning
 On-coming traffic warning
 Vehicle stability warning
 Lane change warning
2.7.1 Intersection Violation Warning (IVW): The intersection violation warning
(IVW) application warns drivers when they are going to pass over a red light that
shown in Figure 2.19.
For more Https://www.ThesisScientist.com
35
Figure (a): Without Intersection Violation Warning (IVW)
Figure (b): With Intersection Violation Warning (IVW)
Figure 2.19: (a) Without Intersection Violation Warning (IVW), the inattentive
driver of vehicle 1 can cause a serious accident due to not stopping at red light. (b)
With IVW the driver of vehicle 1 is warned of red light and stops the vehicle before
the intersection.
It is possible to achieve this application by placing a RSU with a traffic light
controller, so that the RSU broadcast traffic light information. Vehicles that receive
these data can warn the driver about the presence of a red light to avoid accidents in
time [11].
For more Https://www.ThesisScientist.com
36
2.7.2 Electronic Brake Warning (EBW): The electronic brake warning (EBW)
application reports to the driver that a preceding vehicle has performed a sudden
braking [11]. This is useful when the view of the braking vehicle is obstructed by
other vehicles. The scenario is shown in Figure 2.20, where vehicle 1, braking
violently, produces a message that is sent in broadcast to warn the other vehicles
about the dangerous situation.
Figure (a): Braking Situation
Figure (b): Without EBW
Figure (c): With EBW
Figure 2.20: (a) Vehicle 1 has to perform an emergency braking and vehicle 3 does
not realize it because it has the view obstructed by the vehicle 2. (b) Without EBW
vehicle 3 cannot react to the delayed braking of vehicle 2 and so there is a collision.
(c) With EBW vehicle 3 is informed of the emergency braking of vehicle 1 and so it
has the time to slow down
For more Https://www.ThesisScientist.com
37
2.7.3 On-coming Traffic Warning The on-coming traffic warning (OTW)
application helps the driver during overtaking manoeuvres, by providing information
about on-coming traffic that shown in figure 2.21[11]. The vehicle stability warning
(VSW) application alerts drivers that they should activate the vehicle stability control
system due to the hazardous driving conditions (ice, oil) that shown in figure
2.22[11].
Figure (a): Overtaking situation
Figure (b): Without OTW
Figure (c): With OTW
Figure 2.21: (a) Drivers often misjudge velocity and distance of on-coming traffic
when they are about to perform an Overtake. (b) Without OTW, vehicle 1 causes a
collision with both vehicles 2 and 3. (c) With OTW, vehicle 1 is informed about the
possible collision and so it decides to perform overtakes only after vehicle 2 has
passed.
For more Https://www.ThesisScientist.com
38
Figure (a): Icy Road condition
Figure (b): Without VSW
Figure (c): With VSW
Figure 2.22: (a) Vehicle 1 encounters an icy stretch of road and activates its stability
control system to maintain the bend. (b) Without VSW, driver 2 that travels at a
For more Https://www.ThesisScientist.com
39
higher speed is not able to activate the stability control system and so he loses control
and collides with vehicle 3. (c) With VSW, the driver of vehicle 2 is informed of the
activation of the stability control system by vehicle 1 and so he slows down to
maintains control of the car.
2.6 State of the Art:
In recent years, several researchers have analyzed and compare various ad-hoc
Routing Protocols taking into consideration different performance metrics as basis for
performance evaluation. In this section describes the literature review of various
research papers and journals related to Vehicular Ad hoc Networks (VANET).
Vidhale et al. [2]: Here, authors evaluate the MANET routing protocols in VANET
environment by using different mobility models available in VanetMobiSim. In their
work, authors using different simulation parameters such as number of nodes, packet
size, simulation area and performance metrics, average end to end delay, normalized
routing load. After the simulation result authors conclude that DSR has better packet
delivery fraction (PDF) and lesser routing overload than others. But in the case of end
to end delay AOMDV protocol performed better than others. Also it shows that
reactive routing protocols performance degrading in space graph model. So finally
authors conclude that AOMDV is more appropriate than DSR in VANET.
Jerome Haerri et al. [3]: Here, authors evaluate and improve the performance of the
AODV and OLSR routing protocols under two topical and realistic mobility models
for VANET. In their work for the performance evaluation authors used the
OMNET++ simulator .In this paper authors design a convoy scenario that contains
several parameters like 400km*400km simulation area, 60 seconds simulating time,
500m communication range, 1440B packet size, 27m inter vehicle distance and UDP
transport protocol .The main objective of this work is improves the communication
performance of routing protocols by increasing the density around the receiver. In
their work authors also analyse the properties of the two mobility models in high
density urban areas. Finally after the simulation result authors conclude that the
performance of AODV is better than OLSR and OLSR routing protocol seem more
affected by the density than AODV, the reason behind is that proactive routing
For more Https://www.ThesisScientist.com
40
protocol maintains the entire network topology while reactive routing protocol create
routes when they need.
Sun Xi. et al. [4]: Here, authors evaluate the performance of AODV, ADV and DSR
routing protocols by taking some performance metrics such as packer drop ratio,
throughput. In their work, authors to use an open source simulator tool namely
NCTUns-6.0.In this paper, authors using three different mobility patterns for three
Indian Metros cities: Kolkata, Chennai and Mumbai. After the simulation result
authors conclude that almost same performance of ADV and AODV routing protocol
for all different city scenarios, and DSR have less overhead than ADV and AODV so
DSR is not suitable for highly dynamic network.
Monika et al. [6]: In this paper authors analyzed the performance of AODV and DSR
routing protocols for Vehicular Ad-hoc network with and without RSU (Road Side
Unit). For performance evaluation of considered protocols they used Estinet
Simulator. After getting simulation results they conclude that throughput was highest
for AODV as compared to DSR with varying number of nodes so AODV performed
better than DSR. They also found that in presence of RSU whole performance of
network was better as compared to absence of RSUs.
Uma mani et al. [8]: Here authors examined the performance of AODV, DSR, and
OLSR routing protocol with different nodes density and the number of data traffic
sources in order to shows their advantages and limitations in the context of Vehicular
Ad hoc Networks. In their work, authors considered two propagation models, the first
one is the TwoRayGroungand second one is the adaption model. The first one
assumes an unobstructed flat environment and second one takes into account the
terrain characteristics and define three terrain categories. For the simulation purpose
authors used Territoire Mobile mobility model and NS-2.23 network simulator. After
the simulation result authors conclude that AODV routing protocol shows higher end
to end values.
Amit N. Thakare et al. [10]: In this paper authors analyzed the performance of
AODV and DSR routing protocols using ns-2 simulator with Random Waypoint
mobility model. After getting simulation results they conclude that packet loss of
For more Https://www.ThesisScientist.com
41
DSR is higher as compared to AODV and ratio of packet received was higher for
AODV as compared to the DSR routing protocol.
Mittal N.M. et al. [11]: In this paper authors present a survey and comparative study
of several publicly available network simulators, mobility generators and VANET
simulators. In their work, the network simulators like NS-2, SNS, GloMoSim,
SWANS, and QualNet briefly described by authors. In this paper authors also present
comparative study of various mobility generators like SUMO, MOVE, FreeSim,
CityMob, STRAW, VanetMobiSim and Net stream. In their work authors conclude
that SUMO, STRAW, MOVE and VanetMobiSim have good traffic model support
and also have some good features but these are the best. Finally the authors present
briefly introduction of VANET simulators such as TraNS, MobiREAL, GrooveNet,
and NCTUns. According to the authors survey GrooveNet and NCTUns are more
frequently used for VANET simulations than simulation tools.
Davesh et al. [12]: In this paper authors analyzed the performance of AODV and
DSR routing protocols using ns2 simulator with varying number of nodes. After
getting simulation results they conclude that AODV shows very high packet delivery
ratio in 40 mobile nodes, but substantially decreases if the simulation node increases.
DSR shows less end to end delay as compared to the AODV. Finally they concluded
that AODV performs best because it provides almost identical result in all scenarios
and DSR suits for lower scalability networks in which mobile nodes move at
moderate speed.
Shastri A. et al. [14]: Here authors, reveals the performance analysis of reactive
routing protocols AODV, AOMDV and DSR. In their work, authors performed
comparison with proactive routing protocol DSDV. In this paper authors used NS-
2.34 simulation tool for simulation purpose with taking various parameters such as
200 second simulation time, 1000*1000 m simulation area and 100 bytes packet size,
by using performance metrics such as packet delivery ratio, average packet loss ratio
and average end to end delay of packets are investigated on the basis of vehicle
velocity and vehicle density. According to the authors simulation result, DSDV
routing protocol shows the worst packet delivery ratio and AOMDV and AODV have
highest average end to end delays.
For more Https://www.ThesisScientist.com
42
Fan li. et al. [15]: Here authors provides a comprehensive and comparative survey
that dealing with all issues related to Vehicular Ad hoc Networks like its wireless
access technologies and standards, its characteristics , challenges ,security issues, its
applications and various simulators. In their work, authors present comprehensive and
comparative study that focuses on the issues surrounding VANET and its applications
that help to tackle the all issues related to the VANET. In this paper authors also
briefly described the several network simulators like NS-2, MOVE, Trans,
VanetMobiSim, GloMoSim, NCTUns and QualNet.
Gupta P. et al. [16]: In this paper authors compared and analyzed the performance of
AODV and DSR routing protocols using default random way point mobility model.
For performance evaluation of considered protocols they used ns-2 simulator with
variable pause time. After getting simulation results they conclude that DSR
outperformed AODV in delay and throughput on small number of nodes with lower
load and mobility while AODV performed better than DSR on large number of nodes
with higher load and mobility. They also found that DSR has low throughput and
delay because of aggressive use of caching and stale routes.
Manvi S. et al. [17]: In this paper authors analyse performance of two routing
protocols AODV and OLSR by using OPNET Modeler 14.5.In their work ,authors
create a network scenario of 40 nodes with the comparison of network load media
access delay and throughput to examine the AODV and OLSR routing protocols with
simulation parameters like 600*600 m campus area , 40 nodes and 20 minutes
simulation time .According to the authors simulation result OLSR routing protocol
shows low media access delay and low network load in comparison of AODV , with
the overall performance OLSR is better than AODV but it is not necessary that OLSR
is always better than AODV.
Artimy et al. [18]: in this paper authors try to make best use of DSRC channels by
proposing a cluster based multi channel communication scheme. In this scheme
authors assumed that each vehicles is equipped with two DSRC transceiver that can
work on two different channel simultaneously. In their work they divide time in to
periods that can be repeated every T millisecond. And each period is further divide
into sub periods for exchange data.
For more Https://www.ThesisScientist.com
43
Goel A. al. [22]: In this paper authors investigate methods on how to propagate safety
related messages to accidental areas. They outline a scenario, in which an accident
happened on a city highway then how a safety message is propagated within one mile
of the accidental area, for telling to the other vehicles to slow down and take
alternative route.
Nzouonta J. et al. [23]: In this paper authors proposed a Road based vehicular traffic
(RBVT) routing which is a class of VANET routing protocols for the city based
environments. In this work ,authors described a road based vehicular traffic (RBVT)
routing protocol that uses real time vehicular traffic information to create road based
paths between endpoints. And also authors outline how to improve the end to end
performance for the high contention areas by using the distributed mechanism.
Wang S. et al. [24]: Here, authors proposed a hybrid media access technique for
cluster based vehicular networks ,this technique is based on the scheduled based
approach such as TDMA for intra cluster based communications and management ,
and contention based approach for the inter cluster based communications and
management. In this scheme authors used a control channel for delivering the safety
and non safety application related messages to the nearby clusters.
Kamble et al. [26]: Here Authors, proposed an AODV-R routing protocol that is
improved version of AODV routing protocol. In their work to achieve these objective
authors developed a link reliability model based on the vehicular velocity distribution
on highways. In this papers authors applying a hybrid approach combining both
macroscopic and microscopic traffic flow models is highway mobility model and also
applying the link reliability model to improve the performance of the current routing
protocols in VANETs and incorporated vehicular reliability model into the AODV
routing protocol to create a new protocol named as AODV-R routing. Authors
compare both AODV and AODV-R. In their work for the performance comparison
and evaluation authors was taking four performance metrics such as Average packet
delivery ratio, link failures, and average end to end delay. After the simulation result
authors found that AODV-R shows higher average end to end values than AODV and
route establishment in AODV-R takes longer than that in AODV because of the
processing of multiple routing request and replies.
For more Https://www.ThesisScientist.com
44
Ameur et al. [27]: In this paper authors present a systematic comparative study of
three routing protocols: DSDV, AOMDV and AODV in low, high and middle density
regions. In their work, authors was developed a road traffic scenario with taking 50
vehicle as low density ,100 for middle density and 150 for high density region
respectively. For the simulation purpose, authors used NS-2.34 network simulator in
LINUX platform and VanetMobiSim simulator for generated road topology for
simulations purposes. After the simulation result, authors conclude that in low density
region AODV and AOMDV score almost same range of packet delivery ratio whereas
DSDV packet delivery ratio was situated in between in range of 60-80.In the middle
density region the graph shows that AODV and AOMDV have packet delivery ratio
lies between 90 to 100 ranges, whereas DSDV packet delivery ratio is in range of 60-
80. And in high density region the graph shows the AODV and AOMDV score same
packer delivery ratio in range of 90-100, whereas DSDV packet delivery ratio was
degrades to 20-3
Jorjeta G. et al. [32]: In this paper authors discussed several security related issues of
mobile ad hoc networks. In their work, authors described the black hole attack in
mobile ad hoc networks and proposed a feasible solution for it. Authors used the
Global Mobile Simulator in this proposed solution and found to achieve the required
reliability and security with minimal overhead and delay. In their work, authors used
several performances metrics like routing overhead, packet delivery ratio, average end
to end delay to evaluate the performance of AODV. To evaluate the packet delivery
ratio authors take several parameters such as25 number of nodes, 5Minutes simulation
time and 800m by 800m simulation area.
Thus, in recent years, several researchers have analyzed and compare various ad-hoc
Routing Protocols taking into consideration different performance metrics as basis for
performance evaluation. They have used different simulators and simulation models
for the same. In the next section describes a conclusion of this chapter.
For more Https://www.ThesisScientist.com
45
For more Https://www.ThesisScientist.com
46
Chapter 3
PROPOSED WORK
This chapter will describe proposed simulation methodology and algorithm used in
the performance evaluation of AODV and DSR routing protocols. In this chapter a
brief discussion of the software simulation environment used in the dissertation and
their performance parameters used in the comparison have been discussed.
3.1 Software Simulation Environment:
This dissertation work using a simulation tool „OPNET Modeler v14.5‟ for simulating
AODV & DSR routing protocols. OPNET is a network simulator that provides
multiple solutions for managing networks and applications e.g. planning, network
operation, research and development (R&D), network engineering and performance
management [20, 29]. It allows the user to design and study the network
communication devices, protocols, individual applications and also simulate the
performance of routing protocol [20, 29]. It supports many wireless technologies and
standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and
satellite networks. OPNET IT Guru Academic Edition is available for free to the
academic research and teaching community. It provides a virtual network
environment that models the behaviour of an entire network including its switches,
routers, servers, protocols and individual application.
3.2 Proposed Simulation Methodology:
The Proposed Simulation Methodology can be divided into four major steps that
shown in figure 3.2. The first step is the modelling, it means to create network model.
The second step is to select and apply simulation statistics on the scenarios. Third step
is to simulate the scenarios and finally view and analyses results of selected protocols.
For more Https://www.ThesisScientist.com
47
Figure 3.2: Flow Chart of Proposed Simulation Methodology
3.3 Statistics for Simulation:
In OPNET there are two kinds of statistics, one is Global statistics and the other is the
Object statistics. Global statistics can be defined as the statistics that can be collected
from the entire network.
Simulation Parameters
Examined Protocols AODV and DSR
Number of Nodes 100,150,200,250,300, and 350
Types of Nodes Mobile
Simulation Area 1500*1500 meters
Simulation Time 1800 seconds
Mobility 10 m/s
Pause Time 200 seconds
Performance Parameters Throughput, Delay, Network load
Traffic type FTP
Mobility model used Random waypoint
Data Type Constant Bit Rate (CBR)
Packet Size 512 bytes
Wireless LAN MAC Address Auto Assigned
Physical Characteristics IEEE 802.11g (OFDM)
Data Rates(bps) 54 Mbps
Transmit Power 0.005
RTS Threshold 256
Packet-Reception Threshold 95
Long Retry Limit 4
Max Receive Lifetime(seconds) 0.5
For more Https://www.ThesisScientist.com
48
Buffer Size(bits) 256000
On the other hand Object statistics can be defined as the statistics that can be
collected from the individual nodes. In Table 1 describe the simulation parameters
that are used in this simulation in order to evaluate and compare the performance of
two selected routing protocols (AODV, DSR) over a MANET network.
A campus network of size 1500 m x 1500 m is using for simulating varying number
of mobile nodes. The all mobile nodes are spreading within this area. Each scenario
takes 1800 seconds (simulation time) for running. In this simulation default random
waypoint mobility model is used and all mobile nodes in all scenarios moving with
constant speed of 10 m/s and pause time 200 seconds.
Under each simulation we check the behaviour of AODV and DSR routing protocol
with constant mobility (10 m/s) and constant pause time. For examining average
statistics of the network load, delay and throughput for the AODV and DSR routing
protocol of VANET we collected DES (global discrete event statistics) on each
protocol and Wireless LAN. We take the FTP traffic in the application configuration
object this sets the application to model the high load FTP traffic for analyse the
effects on routing protocols.
Table: 2 Scenarios Used
Scenarios Name No. of Mobile Nodes Protocol Used
Scenario 1 100 AODV
Scenario 2 100 DSR
Scenario 3 200 AODV
Scenario 4 200 DSR
Scenario 5 250 AODV
Scenario 6 250 DSR
Scenario 7 300 AODV
Scenario 8 300 DSR
Scenario 9 350 AODV
Scenario 10 350 DSR
In profile configuration object we configured the profile with high load FTP
application. The nodes were wireless LAN mobile nodes with data rate of 11Mbps.
After defining profile configuration we configure Mobility Configuration object for
For more Https://www.ThesisScientist.com
49
defining the mobility pattern and model that the nodes will follow during the
simulation.
3.4. Proposed Methodology
Here, we present different adaptable parameters to optimize AODV routing algorithm
and describe their effects on energy constraints. The parameters we target to optimize
AODV routing algorithm are Active Route Timeout, Hello Interval and Hello
Message loss. The Active Route time out is the lifetime of the routing table. After this
period of time the MANET will not consider this route. Hello interval is the time
taken by the source node to send the hello message to the other node to make a
contact with the intermediate node [7]. For each parameter, we present a discussion
on how the parameter affects energy consumption through routing QoS and present an
adaptation policy to reduce energy consumption by finding the appropriate value of
these parameters considering the current channel conditions.
3.5. Proposed Algorithm
In our proposed algorithm we show the effect of different parameters on energy
consumption through routing QoS. First we take an example of Active route time out
i.e. the lifetime of a routing table entry if a route is not used and refreshed within this
"Active route timeout" period, AODV marks the route as "Invalid" and removes it
from IP Common Table. The constant value is used to modify the values of the
parameters. First of all Set Active Route time as any value X and calculate the results
of Quality of service and routing results for that value X. After taking the previous
value suppose the constant value is added in this value then the value becomes XI.
Then again the simulation takes place in different scenarios and calculates the result
of QoS for XI if the result becomes better than X then calculates results for routing
parameters, and if the result is not better than previous one then the value remain X.
Then again simulation takes place for routing parameters if this result become better
than X then the value of X become XI. If the result will not better than the previous
one then the value of X will change. Similarly the value of Hello interval and Hello
message is modified.
For more Https://www.ThesisScientist.com
50
Figure: Proposed Algorithm for Improvement of AODV
For more Https://www.ThesisScientist.com
51
REFERENCES
[1] Saha A. K. and Johnson D.B., “Modeling the mobility for Vehicular Ad hoc
Networks(VANET),” In Proceedings of The ACM International Workshop on
Vehicular Ad hoc Networks,2004, pp. 91-96.
[2] Vidhale, B. and Dorle S.S., "Performance Analysis of Routing Protocols in
Realistic Environment for Vehicular Ad hoc Networks," In Proceedings of Systems
Engineering (ICSEng), 2011 21st International Conference on , vol.2, Aug. 2011,
pp.267-272.
[3] Jerome Haerri “Performance Comparison of AODV and OLSR in VANETs Urban
Environments under Realistic Mobility Patterns” Department of Mobile
Communications, June 2005, pp. 123-134.
[4] Sun Xi and Xia-Miao Li, "Study of the Feasibility of VANET and its Routing
Protocols," In proceeding of Wireless Communications, Networking and Mobile
Computing, 2008. 4th International Conference on Vehicular Ad hoc Networks,
2008, pp.1-4.
[5] Wan S., Tang J., and Wolff R. “Reliable routing for roadside to vehicle
communications in rural areas,” In Proceedings of the IEEE International Conference
on Communications, 2008, pp. 3017-3028.
[6] Monika, Sanjay Batish and Amardeep Dhiman, “Comparative Study of AODV,
DSDV and DSR Routing Protocols in vehicular Network Using EstiNet Simulator”,
In Proceedings of International Journal of Scientific & Engineering Research , Vol. 3,
Issue 6, June 2012.
[7] Prem Chand and Deepak Kumar” Performance comparison of two on-demand
routing protocols for mobile ad-hoc networks” International journal of Advances in
Engineering and technology,2011, pp. 283-289.
For more Https://www.ThesisScientist.com
52
[8] Uma mani, Ramasamy Chandrasekaran and V. R Sharma” Study and analysis of
routing protocols in mobile ad hoc networks” In Proceedings of Journals of Computer
science, 2013, pp. 1519-1525.
[9] Chen Y. S., Y. W. Lin, and S. L. Lee, “A mobicast routing protocol for Vehicular
Ad hoc Networks,” In Proceedings of ACM/Springer Mobile Networks and
Applications, Vol. 15, 2010, pp. 20-35.
[10] Amit N. Thakare, Mrs. M. Y. Joshi, “Performance Analysis of AODV & DSR
Routing Protocols in Mobile Ad hoc Networks”, In Proceedings of Indian Journal of
Computer Application, Special Issues, 2010, pp. 231-240.
[11] Narendra Mohan Mittal and Dr. P. C. Vashist, “ A Detail Survey on Applications
of Vehicular Ad hoc Networks (VANETs)” International Journal of Computer
Science and Mobile Computing, Vol. 3, Issues 6, June 2014, pp. 713-721.
[12] Davesh Singh and Dhananjaya Singh,“Performance Analysis and Simulation of
AODV, DSR and TORA Routing Protocols in MANETs” International Journal of
Recent Technology and Engineering (IJRTE), Vol. 1, Issue-3, August 2012, pp. 218-
224.
[13] Amit Kumar Saha and David B. Johnson, “Modeling mobility for Vehicular Ad-
hoc Networks” In Proceedings of the first ACM workshop on Vehicular Ad hoc
Networks, Philadelphia, PA, USA, Oct. 2004, pp. 22-34.
[14] Shastri A., R. Dadhich and Ramesh C. Poonia” Performance analysis of on-
demand routing protocols for Vehicular Ad hoc Networks” International Journal of
wireless and mobile networks, Vol. 3,2011, pp. 103-109.
[15] Yamaguchi H., K. Yukimasa, and S. Kusumoto, “QoS routing Protocol for
Vehicular Ad hoc Networks,” In Proceedings of IEEE International Workshop on
Quality of Service, 2006, pp. 132-139.
[16] Pooja Gupta and Rajesh Kumar Tyagi” A significant study and comparison of
DSDV, AODV and DSR protocols in MANET using NS-2” In Proceeding of
For more Https://www.ThesisScientist.com
53
International Journal of Engineering Research and technology, Vol. 2, Issue 3, 2013,
pp. 1-8.
[17] Manvi S., Kakkasageri M.S. and Mahapurush , “Performance Analysis of
AODV, DSR, Routing Protocols In Vehicular Ad hoc Network Environment” In
Proceedings of International conference on future Computer and Communication.,
April. 2009, pp. 21-26.
[18] Artimy M.M., W. Robertson, and W. J. Phillips. “Connectivity in inter-vehicle ad
hoc networks”. In Proceedings of Engineering Canadian Conference on Electrical and
Computer, Volume: 1, May 2004, pp. 100-112.
[19] Bernsen, J. Manivannan, “Routing Protocols for Vehicular Ad hoc Networks
That Ensure Quality of Service” In Proceedings of the fourth international conference
on Wireless and Mobile Communications, Aug. 2008, pp.1-6.
[20] Narendra Mohan Mittal and Savita Choudhary,” Comparative Study of
Simulators for Vehicular Ad-hoc Networks (VANETs)” International Journal of
Emerging Technology and Advanced Engineering, vol. 4, Issue 4, April 2014, pp.
528-537.
[21] Taleb T., E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A
stable routing protocol to support its services in VANET” In Proceedings of IEEE
Transactions on Vehicular Technology, vol. 56, no. 6, November 2007, pp.3337–
3347.
[22] Goel A., Ramakrishnan K. G., D. Kataria, and D. Logothetis, “Efficient
computation of delay-sensitive routes from one source to all destinations,” In
Proceedings of IEEE Conference on Computer Communications, 2001, pp. 854-858.
[23] Nzouonta J. R., Guiling N. and Wang Borcea C., “VANET Routing on City
Roads Using Real-Time Vehicular Traffic Information,” In Proceedings of Vehicular
Technology, IEEE Transactions on Vol. 58, Issue. 7, Sept. 2009, pp. 33-37.
[24] Wang S. Y. “Predicting the lifetime of repairable unicast routing paths in vehicle
formed mobile ad hoc networks on highways” In Proceedings of 15th IEEE
For more Https://www.ThesisScientist.com
54
International Symposium on Personal, Indoor and Mobile Radio Communications,
Volume: 4, Sept. 2005, pp. 2815-2819.
[25] David B. Johnson, David A. Maltz, and Josh Broch, “The Dynamic Source
Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, In Ad Hoc Networking,
Editor: Charles E. Perkins, Addison-Wesley, Chapter 5, 2001 , pp. 139-172.
[26] Ameur Bennaoul, Mustapha Guezouri and Mokhtar Keche,” Performance
Evaluation of Routing protocols in Vehicular Networks” International Journal of
Computer Network and Information Security,2013,pp. 11-16.
[27] kamble P.A. and M.M. Kshirsagar, “ Improvement over AODV Routing Protocol
in VANET” International Journal of Computer Engineering & Technology, Vol. 4,
Issue 4, July 2013, pp. 315-320.
[28] H. Wu, Fujimoto, R., Guensler, R., and Hunter, M, “MDDV: a mobility-centric
data dissemination algorithm for vehicular network,” In Proceedings of the 1st ACM
international Workshop on Vehicular Ad hoc Networks, October, 2004, pp. 47-56.
[29] Sherali Zeadally, Ray hunt and Yuh Shayan Chan, “Vehicular Ad hoc Networks
(VANETs): Status, Results and Challenges” In Proceeding of Springer Science, Dec.
2011, pp. 217-241.
[30] Yang X., L. Liu, N.H. Vaidya, and F. Zhao, "A vehicle-to-vehicle
communication protocol for cooperative collision warning in VANET," In
Proceedings of the 1st International Conference on Networking and Services,2004,
pp.114-123.
[31] Balon N., and J. Guo, “Increasing Broadcast Reliability in Vehicular Ad hoc
Networks(VANET),” In Proceeding of the 3rd ACM International Workshop on
Vehicular Ad hoc Networks VANET, NY,USA,2006, pp. 104-105.
[32] Jorjeta G. Jetcheva, Yih-Chun Hu, Amit Kumar Saha, and David B. Johnson.
“Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network
For more Https://www.ThesisScientist.com
55
Architecture in VANET”. In Proceedings of the Fifth IEEE Workshop on Mobile
Computing Systems & Applications, Monterey, CA, Oct. 2003,pp 32-37.
[33] Tseng Y.C., Y.S. Chen, and J.P. Sheu, "The broadcast storm problem in a mobile
ad hoc network(MANET)," In Proceeding of the 5th ACM/IEEE International
Conference on Mobile Computing and Networking, NY, USA, 1999, pp. 51-162.
[34] H. Safa, H. Artail, and R. Shibli, “An Interoperability model for supporting
reliability and power-efficient routing in mobile ad hoc network,” International
Journal of Ad Hoc and Ubiquitous Computing, Vol. 4, 2009, pp. 74-83.
[35] H.P. Glathe, L. Karlsson, G.P. Brusaglino, L. Calandrino, “The PROMETHEUS
Programme– Objectives, Concepts and Technology for Future Road Traffic”, In
Proceedings of12th
conference of networking, May 1990, pp. 477-484.
[36] T. Sawamura, K. Tanaka, M. Atajanov, N. Matsumoto, and N. Yoshida,
“Adaptive router promotion and group forming in ad-hoc networks,” In Proceedings
of International Journal of Ad Hoc and Ubiquitous Computing, Vol. 3, 2008, pp. 217-
223.
[37] Heissenbüttel M., T. Braun, M. Wälchli, and T. Bernoulli, “Optimized stateless
broadcasting in wireless multi-hop networks,” In proceeding of 4th
IEEE international
conference on Infocom Barcelona,2006,pp.234-240.
[38] Sommer, C.; Dietrich, I.; Dressler, F. “Realistic Simulation of Network Protocols
in VANET Scenarios” International Journal of Ad Hoc and Ubiquitous Computing,
Vol. 3, 2008, pp. 217-223.
[39] Tseng Y.C., Y.S. Chen, and J.P. Sheu, "The broadcast storm problem in a mobile
ad hoc network(MANET)," In Proceeding of the 5th ACM/IEEE International
Conference on Mobile Computing and Networking, NY, USA, 1999, pp. 51-162.
[40] Zhao J. C. and Josh Broch “Vehicle-Assisted Data Delivery in Vehicular Ad hoc
Networks” In Proceedings of 25th IEEE International Conference on Computer
Communications. Proceedings, April 2006, pp. 6-12.
For more Https://www.ThesisScientist.com
56
[41] Korkmaz G., E. Ekici, F. Ozgüner, and U. Ozgüner, "Urban multi-hop broadcast
protocol for inter-vehicle communication systems in VANET," In Proceeding of the
1st ACM International Workshop on Vehicular Ad hoc Networks, NY, USA,
2004,pp. 76-85.
[42] Rajive Bagrodia, Richard Meyer, Mineo Takai, Yu an Chen, Xiang Zeng, Jay
Martin, and Ha Yoon Song. “A parallel simulation environment for complex systems”
In Proceedings of the 1st ACM international workshop on Vehicular Ad hoc
Networks, 2004, pp. 66 – 75.
[43] Dirk Reichardt, Maurizio Miglietta, and Wolfgang Schulz “CARTALK 2000
Safe and Comfortable Driving Based Inter-Vehicle-Communication in VANET”, In
proceedings of IEEE Intelligent Vehicle Symposium, June 2002, pp.145-147.
[45] Tsugawa, S.; Kato, S.; Tokuda, K.; Matsui, T.; Fujii, H., “A cooperative driving
system with automated vehicles and inter-vehicle communications in Demo 2000”, In
proceedings of IEEE Intelligent Transportation Systems,2006, pp.178-189.
[46] Brian D. Noble, Jungkeun Yoon ,Mingyan Liu, Minkyong Kim, ”Building
realistic mobility models in VANET”, In Proceeding of the ACM International
Conference On Mobile Systems, Applications And Services,2006, pp. 177-190.
[47] Robert E. Chandler, Robert Herman, Elliott W. Montroll, ”Traffic Dynamics:
Studies in Car Following”, Operations Research, Vol. 6, 2004, pp. 165-184.
[48] Fan Li and Yu Wang; “Survey of Routing in Vehicular Ad hoc Networks”, In
Proceedings of IEEE Vehicular Technology Magazine, Volume 2, Issue 2, June 2007;
pp. 12-22.
[49] Jahanzeb Farooq and Bilal Rauf “ Implementation and Evaluation of IEEE
802.11e Wireless LAN in GloMoSim” In Proceeding of the 1st ACM International
Workshop on Vehicular Ad hoc Networks, NY, USA, 2004,pp. 76-85.
For more Https://www.ThesisScientist.com
57
[50] Skordylis A. and Trigoni N., “Delay-bounded routing in vehicular ad-hoc
networks (VANET),” In Proceedings of ACM International Symposium on Mobile
Ad hoc Networking and Computing, 2008, pp. 3020-3026.
[51] Abedi Berangi and R.; Azgomi, M. A., "Improving Route Stability and Overhead
on AODV Routing Protocol and Make it Usable for VANET," In Proceedings of 29th
IEEE International Conference on Vehicular Ad hoc Networks, June 2009, pp.464-
467.
[52] Robert E. Chandler, Robert Herman, Elliott W. Montroll, ”Traffic Dynamics:
Studies in Car Following”, In proceeding of 4th
IEEE International Conference on
Infocom, Barcelona, 2006, pp.234-240.
[53] Chowdhury S.I., Won-Il Lee, Youn-Sang Choi, and Guen-Young Kee
"Performance evaluation of reactive routing protocols in VANET," In proceeding of
Communications (APCC), 2011 17th Asia-Pacific Conference on Vehicular Ad hoc
Networks ,2011, pp.559-564.
[54] T. Taleb, E. Sakhaee, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing
protocol to support ITS services in VANET networks,” In Proceedings of IEEE
Transactions on Vehicular Technology, Vol. 56, 2007, pp. 3337-3347.
[55] Nzouonta, J., Rajgure, N., Guiling Wang and Borcea, C., "VANET Routing on
City Roads Using Real-Time Vehicular Traffic Information," In proceeding of
Vehicular Technology, IEEE Transactions on on Vehicular Ad hoc Networks, vol.58,
no.7, 2011,pp.3609-3626.
[56] Vinod Namboodiri, Manish Agarwal and Lixin Gao; “A Study on the Feasibility
of Mobile Gateways for Vehicular Ad-hoc Networks (VANET)”, In proceeding of
Wireless Communications Networking and Mobile Computing 6th International
Conference on 2010,Sept. 2010, pp. 23-25.
[57] Yue Liu, Jun Bi and Ju Yang; “Research on Vehicular Ad hoc Networks” In
Proceedings of Chinese Control and Decision Conference (CCDC), 2009, pp. 4430 –
4435.
For more Https://www.ThesisScientist.com
58
[58] Tonguz, F. Bai and P. Mudalige, “Broadcasting in VANET,” In Proceedings of
IEEE Mobile Networking for Vehicular Environments, 2007, pp. 7-12.
[59] Blum J., Eskandarian A., and HoffmanL. "Performance Characteristics of Inter-
Vehicle Ad Hoc Networks". In Proceedings of IEEE 6th International Conference on
Intelligent Transportation Systems, Shanghai, China,2004, Pp. 115-119.
[60] Manoharan R. and S. L. P. Thambidurai, “Energy efficient robust on-demand
multicast routing protocol for mobile ad hoc network,” In Proceedings of International
Journal of Ad Hoc and Ubiquitous Computing, Vol. 3, 2008, pp. 90-98.

More Related Content

What's hot

Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationMrityunjaya Chauhan
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationNavin B S
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication Mohamed Zaki
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationAbdullah Khosa
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 

What's hot (20)

Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
VANET
VANETVANET
VANET
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Internet of vehicles
Internet of vehiclesInternet of vehicles
Internet of vehicles
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 

Similar to Routing protocols in Vanet

Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks IOSR Journals
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected VehiclesIRJET Journal
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 

Similar to Routing protocols in Vanet (20)

Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected Vehicles
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 

More from Thesis Scientist Private Limited

Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Thesis Scientist Private Limited
 

More from Thesis Scientist Private Limited (20)

HTML guide for beginners
HTML guide for beginnersHTML guide for beginners
HTML guide for beginners
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
How to write a Great Research Paper?
How to write a Great Research Paper?How to write a Great Research Paper?
How to write a Great Research Paper?
 
Research Process design
Research Process designResearch Process design
Research Process design
 
How to write a good Dissertation/ Thesis
How to write a good Dissertation/ ThesisHow to write a good Dissertation/ Thesis
How to write a good Dissertation/ Thesis
 
How to write a Research Paper
How to write a Research PaperHow to write a Research Paper
How to write a Research Paper
 
Internet security tips for Businesses
Internet security tips for BusinessesInternet security tips for Businesses
Internet security tips for Businesses
 
How to deal with a Compulsive liar
How to deal with a Compulsive liarHow to deal with a Compulsive liar
How to deal with a Compulsive liar
 
Driverless car Google
Driverless car GoogleDriverless car Google
Driverless car Google
 
Podcast tips beginners
Podcast tips beginnersPodcast tips beginners
Podcast tips beginners
 
Vastu for Career Success
Vastu for Career SuccessVastu for Career Success
Vastu for Career Success
 
Reliance jio broadband
Reliance jio broadbandReliance jio broadband
Reliance jio broadband
 
Job Satisfaction definition
Job Satisfaction definitionJob Satisfaction definition
Job Satisfaction definition
 
Mistakes in Advertising
Mistakes in AdvertisingMistakes in Advertising
Mistakes in Advertising
 
Contributor in a sentence
Contributor in a sentenceContributor in a sentence
Contributor in a sentence
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Ad hoc network routing protocols
Ad hoc network routing protocolsAd hoc network routing protocols
Ad hoc network routing protocols
 
IPTV Thesis
IPTV ThesisIPTV Thesis
IPTV Thesis
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Routing protocols in Vanet

  • 1. For more Https://www.ThesisScientist.com 1 Performance Evaluation of Reactive and proactive Routing protocols in VANET A Dissertation Report Submitted in the Partial Fulfilment of The Award of the Degree of MASTER OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING Under Guidance of: Submitted By: Name of Internal Guide Name of Students (Designation) Roll No LOGO DEPARTMENT OF COMPUTER SCIENCE
  • 2. For more Https://www.ThesisScientist.com 2 DECLARATION………………………………………………………………. i ACKNOWLEDGEMENTS................................................................................. ii CERTIFICATE ……………………………………………………................... iii ABSTRACT…………………………………………………………………….. iv LIST OF FIGURES……………………………………………….................... viii LIST OF TABLES……………………………………………………………... xi LIST OF ABBREVIATIONS…………………………………………………. xii CHAPTER 1 INTRODUCTION 1.1. Introduction………………………………………………………….... 1.2. Description of Broad Area…………………………………………… 1.2.1. VANET Overview……………………………………………… 1.2.2. VANET Architecture………………………………………….. 1.2.3. Types of VANET Architecture.............................................. 1.2.4. VANET Standards, Regulations and Layered Architecture........ 1.2.5. Some other wireless technologies in VANET........................... 1.3. Application of VANETs………………………………………. 1.3.1. Safety oriented applications of VANET………………………… 1.3.2. Convenience oriented applications of VANET.......................... 1.3.3. Commercial oriented application............................................. 1.4. Security Challenge of VANET.......................................................... 1.5. Attacks on VANET.......................................................................... 1.6. Mobility Models.............................................................................. 1.7. VANET Routing Protocols………………………………................... 1.7.1. Proactive Routing Protocols…………………………………… 1.7.2. Reactive Routing Protocols…………………………………… 1.8. Motivation…………………………………………………………….. 1.9. Problem Statement………………………………………………........ 1.10. Aims and Objectives…………………………………………… 1.11. Methodology…………………………………………………… 1.12. Layout of the Dissertation…………………………………… 1.13. Conclusion……………………………………………………… 1 1 2 3 3 7 9 11 12 12 12 15 15 16 18 20 20 22 23 24 24 25 26 27
  • 3. For more Https://www.ThesisScientist.com 3 CHAPTER 2 LITERATURE REVIEW.................................................... 2.1 Introduction………………………………………………………………… 2.2 VANET Routing Protocols………………………………………………… 2.3 Reactive Routing Protocols………………………………………………… 2.3.1 Ad hoc On Demand Distance Vector Routing………………………. 2.3.2 Dynamic Source Routing…………………………………….............. 2.4 Proactive Routing Protocols……………………………………………….. 2.4.1 Destination Sequence Distance Vector Routing Protocols…............... 2.5 Simulation Tools……………………………………………………………. 2.5.1Mobility Generators………………………………………………….. 2.5.2 VANET Simulators………………………………………………….. 2.5.3 Network Simulators…………………………………………………. 2.6 Classification of VANET Applications…………………………………..... 2.7 Safety Applications in VANET............................................................... 2.8 State of The Art.................................................................................... 2.7 Conclusion………………………………………………………………….. 28 28 29 30 30 34 35 35 37 37 41 42 46 49 52 58
  • 4. For more Https://www.ThesisScientist.com 4 Chapter 1 INTRODUCTION In this chapter a brief introduction to basic concepts behind the emerging area of Vehicular Ad hoc Networks (VANET) has been described. This chapter also describes its architecture, domains and standards, at the same time this chapter describes an overview of its applications, routing protocols and security challenges. 1.1 Introduction: The increasing demand of wireless communication and wireless devices have tends to research on self organizing, self healing networks without the interference of any centralized or pre-established infrastructure/authority [2]. The networks with the absence of any centralized or pre-established infrastructure are known as Ad hoc networks [4]. Ad hoc Networks are the category of wireless networks that uses multi hop radio relay. Figure 1.1: Working structure of VANET
  • 5. For more Https://www.ThesisScientist.com 5 Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs) [4]. It is the most advanced technology that provides Intelligent Transportation System (ITS) in wireless communication among vehicles to vehicles and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard [2]. VANET provides broad range of safety and non safety applications. Safety application provides safety to the passengers such as lane change warning, collision detection etc. It also provides comfort and commercial applications to the road users such as electronic toll collection, audio/video exchanging, electronic payments, route guidance, weather information, mobile E-commerce, internet access etc. Figure 1.1[1] shows the overall working structure of Vehicular Ad hoc Network (VANET). 1.2 VANET Overview: Vehicular Ad hoc Networks (VANETs) is a subclass of Mobile Ad Hoc Networks (MANETs) that has emerged because of recent growth in wireless technology and sensors networks [2, 4]. Vehicular Ad hoc Networks (VANETs) are one of ad-hoc network‟s real applications where communication among vehicles and nearby fixed equipment is possible. It reduces both traffic congestion and vehicles crashes which are serious issues throughout the world. 1.2.1 VANET Architecture: Vehicular Ad hoc Network (VANET) system architecture [5] consists of three different types of domains such as in-vehicle, ad hoc, and infrastructure domains and many individual components such as application unit, on-board unit, and road-side unit. The figure 1.2[14] shows the all components and domains of VANET.
  • 6. For more Https://www.ThesisScientist.com 6 Figure 1.3: VANET System Architecture. In-Vehicle Domain: This domain consists of one or more applications units (AUs) and a single On-Board Unit (OBU) that resides inside a vehicle [19]. Applications Units (AUs) is an in- vehicle entity, multiple AUs can be plugged in with a single OBU and share the OBU processing and wireless resources. An On-Board Unit (OBU) is used for providing the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication. An OBU is equipped with a single network device based on IEEE 802.11p radio technology; basically network device is used for sending, receiving and forwarding the safety and non safety messages in the ad hoc domain .
  • 7. For more Https://www.ThesisScientist.com 7 Ad hoc Domain: This VANET domain composed of vehicles or nodes that equipped with On-Board Unit (OBUs) and road-side units (RSUs), that forming the VANET [19]. A road side unit is a physical device located at fixed positions like hospitals, shopping complexes, colleges, road highways etc. An RSU is equipped with at least a network device based on IEEE 802.11p standard [30]. The main function of RSU is to provide the internet connectivity to the OBUs. On-Board Units (OBUs) form a mobile ad hoc network that allows communications among vehicles without the need for a centralised coordination instance. Two vehicles directly communicate via On-Board Units (OBUs) if wireless connectivity exists among them; else multi-hop communications are used to forward data [30]. Infrastructure Domain: The infrastructure domain consists of Road-Side Units (RSUs) and wireless Hot-Spots (HS) that the vehicles access for safety and comfort based applications [18, 29]. These two types of infrastructure access, road-side units (RSU) and Hot-Spots (HS).In case that neither road-side units (RSUs) nor Hot-Spots (HT) provide internet access, OBUs can also utilise communication abilities of several radio networks or technologies such as GPRS, GSM, WiMax, if they are integrated in the On-Board Unit (OBU), in particular for non-safety applications. Application Units (AUs): An Applications Units (AUs) is an in-vehicle entity, multiple AUs can be plugged in with a single OBU and share the OBU processing and wireless resources [29]. Examples of Application Units (AUs) are I) safety applications devices like hazard-warning, or ii) a navigation system with communication capabilities. Multiple Application Units can be plugged in with a single On-Board Unit (OBU) simultaneously and share the On-Board Units (OBUs) processing and wireless resources. An Application Unit (AU) communicates solely via the On-Board Unit (OBU), which handles all mobility and networking functions on the Application Unit (AU) behalf. The distinction between an Application Unit (AU) and an On-Board Unit (OBU) is only logical and an Application Unit (AU) can be physically co-located with an OBU [29]. On-Board Units (OBUs): The On-Board Unit (OBU) used for vehicle to vehicle (V2V) communications and vehicle to infrastructure or road side unit (V2I)
  • 8. For more Https://www.ThesisScientist.com 8 communications [29]. It also provides communication services to the application units and also forwards data on behalf of other On-Board Units (OBUs) in the ad hoc domain. An On-Board Unit (OBU) is equipped with at least a single network device f IEEE 802.11p standard. This network device is responsible for sending, receiving and forwarding safety and non safety messages in the ad-hoc domain. The main functions and procedures of On-Board Unit (OBU) includes wireless radio access, geographical ad hoc routing, network congestion control, reliable message transfer, data security, IP mobility support, and others. Road-Side Units (RSUs): A Road-Side Unit (RSU) is a physical device situated at fixed positions along roads and highways, or at dedicated locations such as colleges, petrol pumps, parking places, hospitals, shopping complexes, restaurants etc [19, 29]. A Road-Side Unit (RSU) is equipped with at least a network device based on IEEE 802.11p. The main function of RSU is to provide the internet connectivity to the OBUs. An overview of the main functions performed by RSU is given below. i. Extending the communication range of an ad hoc network by means of re- distribution of information to other OBUs and cooperating with other RSUs in forwarding or in distributing safety information (Figure 1.4). ii. Running safety applications, such as for vehicle-to-infrastructure warning (e.g. low bridge warning, work-zone warning), and act as information source (Figure 1.5). iii. Providing internet connectivity to all OBUs for accessing safety and non safety applications (Figure 1.6). Figure 1.4: RSU extends communication range
  • 9. For more Https://www.ThesisScientist.com 9 Figure 1.5: RSU acts as information source Figure 1.6: RSU providing internet access 2. Motivation Traffic safety is a major challenge recognised by the major players in the automotive industry and by many governments. Traffic delays continue to increase, wasting many hours for peak time travellers. Apart from traffic safety and efficiency, features like internet access, entertainment, payment services and information updates into can be integrated into vehicles to improve passenger comfort. Normally a driver, has incomplete information about road conditions, speed and location of vehicles around them, and is forced to make decisions like breaking and lane changing without the benefit of whole data. Real time communication between vehicles or between vehicles and road-side infrastructure can improve traffic safety and efficiency [7]. For
  • 10. For more Https://www.ThesisScientist.com 10 example, if a vehicle needs to slow down due to an accident ahead, it will broadcast warning messages to neighbouring vehicles. The vehicles behind it will thus be warned before they actually see the accident, helping the drivers react faster. In another scenario, if vehicles can transmit traffic congestion information to other vehicles in its transmission range, it can help other vehicles receiving the information to chose alternate routes and avoid traffic congestion. Vehicular Ad hoc Networks (VANETs), an extension of mobile ad hoc networks (MANET) [8], were developed with a view to enable real-time communication between mobile nodes (either vehicles or road side infrastructure) over wireless links, primarily with a view to enable traffic safety and efficiency. The communication between two or more nodes in a Vehicular Ad hoc Networks (VANET) faces many unique challenges [8]. This is especially true for safety-critical applications like collision avoidance, pre-crash sensing, lane change etc. Factors like high vehicle speeds, low signal latencies, varying topology, total message size, traffic density etc. induce challenges that makes conventional wireless technologies and protocols unsuitable for Vehicular Ad hoc Networks (VANETs).Apart from the performance challenges, there are many security issues unique to VANET like authenticating message sender, verifying validity of message data (like vehicle position), providing node privacy with non-repudiation, certificate revocation, availability etc. All these performance and security requirements contribute to make VANET safety applications challenging unlike other wireless applications. 3. Problem Statement: There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with the large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node density (100, 150, 200, 250, 300 and 350) i.e. low
  • 11. For more Https://www.ThesisScientist.com 11 vehicle-node density (100 and 150 mobile nodes) medium vehicle-node density (200 and 250) mobile nodes) and high vehicle-node density (300 and 350 mobile nodes) with constant mobility 10m/s.hen the selected routing protocols (OLSR, DSR) have been simulating via a simulation tool i.e. OPNET Modeler v14.5 and compared in terms of network load, throughput and packet end to end delay. 4. Aims and objectives: The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR) with varying number of mobile nodes or vehicle node densities (100, 150, 200, 250, 300 and 350) i.e. low vehicle-node density (100 and 150 mobile nodes) medium vehicle-node density (200 and 250) mobile nodes) and high vehicle-node density (300 and 350 mobile nodes) with constant mobility 10m/s. After getting simulation results a detail comparative study of AODV, DSDV, OLSR and DSR for Vehicular Ad hoc Network (VANET) have been performing. The comparative study based on different performance metrics i.e. throughput, packet end to end delay and network load. To achieve this aim we have set the following objectives:  To conduct a detailed literature survey to review the current state of art of routing protocols used in Vehicular Ad hoc Networks.  To explore different classification of routing protocols in Vehicular Ad hoc Networks. Furthermore also identify the major performance issues in such networks.  To evaluate the performance of selected routing protocols with varying number of mobile nodes  Perform a detail comparative analysis of selected routing protocols by taking three performance metrics. 5. Methodology: In this dissertation, following steps are carried out to achieve the objectives of this thesis work.
  • 12. For more Https://www.ThesisScientist.com 12 5.1 Literature Review: In these steps a detailed literature review of any published work that relevant to the dissertation area is carried out. 5.2 Understanding Background Information: In this step a detail study of the area of dissertation is carried out for better understanding of the subject of dissertation. It is simple to start with Mobile Ad hoc Network (MANET) which are the base of Vehicular Ad hoc Network. 5.3 Functionality of Routing Protocols: In this step a detail study of various ad hoc routing protocols: reactive routing protocols (OLSR, DSR) and proactive routing protocols (DSDV, OLSR) is carried out for understanding the functionality of routing protocols. 5.4 Simulation Tool: In this step a detail study of various network simulators, mobility generators and VANET simulators is carried out. And select a simulation tool for our dissertation work. 5.5 Simulation: In this dissertation work we employed OPNET Modeler v14.5 for performance evaluation of AODV, DSDV, OLSR and DSR routing protocols. The performance comparison of selected routing protocols (AODV, DSDV, OLSR and DSR) will be done by consideration of with varying number of mobile nodes or vehicle node densities taking with varying mobility. Then results are compared in the terms of performance metrics i.e. throughput, packet delay and network load. 5.6 Analysis of Results: In this step result obtained for the selected routing protocols (AODV, DSDV, OLSR and DSR) by using considered performance metrics and scenarios is carried out. After analysis of results a detailed comparative study of selected routing protocols is performed.
  • 13. For more Https://www.ThesisScientist.com 13 Chapter 2 LITERATURE REVIEW In this chapter a detail literature review on Vehicular Ad- Hoc Networks (VANETs) has been carried out. This chapter also describes a detail overview of VANET routing protocols, at the same time this chapter also describes several VANET simulators, network simulators and mobility generators that used in simulation for Vehicular Ad hoc Networks. 2.1 Introduction: There are several routing protocols designed for Vehicular Ad hoc Networks classified either as proactive or reactive that have been describes in next section. There are some ad hoc routing protocols which are combination of both proactive and
  • 14. For more Https://www.ThesisScientist.com 14 reactive routing characteristics. These protocols are known as hybrid routing protocols. This chapter is organized as follows: Section 2.2 introduces the various routing protocols for Vehicular Ad hoc Networks. Section 2.3 describes the various VANET reactive routing protocols: AODV and DSR. Section 2.4 presents the VANET proactive routing protocols: DSDV and OLSR. The various mobility generators, network simulators and VANET simulators are describes in Section 2.5. Section 2.6 presents the current state of the art. Section 2.7 describes a detail overview of several VANET applications. And examples of various VANET applications are explained in Section 2.8. Finally, Section 2.9 concludes this chapter. 2.2 VANET Routing Protocols: Routing is a mechanism to establish and to select a specific path in order to send data from source to destination [14, 16]. There are various routing algorithm designed for ad-hoc networks. Classification of various VANET routing protocols can be divided in two broad categories: proactive and reactive routing protocols that shown in figure 2.1. In the next section describes a detail overview of various reactive routing protocols (AODV, DSR). Figure 2.1: VANET Routing Protocols 2.3 Reactive/On Demand Routing Protocols: Reactive routing protocols were designed to reduce the overheads by maintaining information for active routes at each node [8]. This means that each node determined and maintained routes only when it requires sending data to a particular destination. It
  • 15. For more Https://www.ThesisScientist.com 15 using two main mechanisms for route establishment: Route discovery and Route maintenance [17, 25]. Route discovery mechanism uses two messages: Route Request (RREQ) and Route Reply (RREP). Figure 2.2: Route Request Propagation in Reactive Routing Protocols The basic approach is when a node needs to send a message to a particular destination, it broadcasts the RREQ message in the network that shown in figure 2.2 When RREQ message found a destination node then destination node send a RREP message to source node that shown in figure 2.3. Figure 2.3: Route Reply Propagation in Reactive Routing Protocols
  • 16. For more Https://www.ThesisScientist.com 16 2.3.1 Ad hoc On Demand Distance Vector (AODV): Ad hoc On Demand Distance Vector (AODV) is a pure reactive routing protocol which is capable of both unicasting and multicasting. In Ad hoc On Demand Distance Vector (AODV), like all reactive protocols, it works on demand basis when it is required by the nodes within the network [8, 14]. When source node has to send some data to destination node then initially it propagates Route Request (RREQ) message which is forwarded by intermediate nodes until destination is reached. A route reply message is unicasted back to the source node if the receiver is either the node using the requested address, or it has a valid route to the requested address that is shown is figure 2.4. (a) (b) Figure 2.4: AODV Route Discovery Process. (a) Propagation of the RREQ. (b) Path of the RREP to the source. Working of Ad Hoc On Demand Distance Vector Routing (AODV): In this type of routing [14, 16] allows the communication between two nodes via intermediated nodes, if those two nodes are not within the range of each other. To establish a route between source to the destination, AODV using route discovery phase, along which Route Request message (RREQ) messages are broadcasted to all its neighbouring nodes. This phase makes sure that these routes do not forms any loops and find only the shortest possible route to the destination node. It also uses destination sequence number for each route entry, which ensures the loop free route, this is the one of the main benefit of AODV routing protocol. For example if two different sources send two different requests to a same destination node, then a requesting node selects the
  • 17. For more Https://www.ThesisScientist.com 17 one with greatest sequence number. In the route discovery phase several control messages are defined in AODV that are defined as follows. a) RREQ (Route Request): When any node wants to communicate with other node then it broadcast route request message (RREQ) to its neighbouring nodes [14, 16]. This message is forwarded by all intermediate nodes until destination is reached. The route request messages (RREQ) contains the some information such as RREQ id or broadcast id, source and destination IP address, source and destination sequence number and a counter that shown in figure 2.5. Figure 2.5: AODV Route Request Message Format b) RREP (Route Reply): When any intermediate nodes received Route Request (RREQ) message then it unicast the route reply message (RREP) to source node either it is valid destination or it has path to destination and reverse path is constructed between source and destination [14, 16]. Each route reply message (RREP) packet consist of some information such as hop count, destination sequence number, source and destination IP address that shown in figure 2.6.
  • 18. For more Https://www.ThesisScientist.com 18 Figure 2.6: AODV Route Reply Message Format c) RERR (Route Error): Whenever there is any link failure arises in the routing process then route error message (RERR) is used for link failure notifications. The route error message (RERR) consist of some information such as Unreachable Destination node IP Address, Unreachable Destination node Sequence Number that shown in figure 2.7. Figure 2.7: AODV Route Error Message Format Routing in AODV: There are various mechanisms which are followed in AODV routing approach: a) AODV Route Discovery phase: To establish a route between source node to the destination node, AODV using route discovery phase, along which the Route Request message (RREQ) messages are broadcasted to all its neighbouring nodes [14]. This phase makes sure that these routes do not forms
  • 19. For more Https://www.ThesisScientist.com 19 any loops and find only the shortest possible path to the destination node. It also uses destination sequence number for each route entry that ensures the loop free route, this is the one of the main benefit of AODV routing protocol. For example if two different sources sends two different request to a same destination node, then a destination node selects only that node having largest sequence number. In the route discovery phase several control messages are defined in AODV protocol. b) AODV Route Table Management: In AODV, Routing table management is required to avoid those entities of nodes that do not exist or having invalid route from source to destination. The need for routing table management is important to make communication loop free. It consists of following characteristics to maintain the route table for each node. • Destination IP address • Total number of hops to the destination • Destination sequence numbers • Number of active neighbours • Route expiration time c) AODV Route Maintenance: In AODV, when any node in the network detects that a route is not valid anymore for communication it delete all the related entries from the routing table .And it sends the Route reply message (RREP) to all current active neighbouring nodes to inform that the route is not valid anymore for communication purpose. 2.3.2 Dynamic Source Routing Protocol (DSR): Dynamic Source Routing is a reactive routing protocol that is based on the concept of source routing [8, 16]. Source routing means source has the complete knowledge of entire route to the destination before transmitting data. In DSR each node maintains a route cache where it records all possible learned routes. It using two main mechanisms: Route discovery and Route maintenance. a) Route Discovery: Whenever a source node wants to send a data packet to destination node in the network, it first looks in its Route Cache to find a valid hop sequence to the destination [1]. If such a route exists, the source node attaches to the packet header the complete route to the destination and
  • 20. For more Https://www.ThesisScientist.com 20 forwards the packet to the next node. The next node checks the packet header and forwards the packet to the next node. The process terminates when the packet reaches the destination. If the source node cannot find a valid hop sequence to the destination in its Route Cache then it initiates a route discovery process [17]. Figure 2.8: Route Request Propagation in DSR  In route discovery process a route request (RREQ) message is broadcasts to all its neighbouring nodes, adding a unique request ID to each request to prevent other nodes from transmitting the same request [17]. Figure 2.9: Route Reply Propagation in DSR  Each of the intermediate nodes receives RREQ and searches in its Route Cache, and if it finds such a route, it sends a Route Reply (RREP) message
  • 21. For more Https://www.ThesisScientist.com 21 back to the source node with the complete path to the destination. In order to minimize the Route Request (RREQ) in the network, the intermediate or destination node discard the duplicate Route Request (RREQ) message identified by the same request identification number and common source. Figure 2.8 shows the RREQ message propagation in the network. And figure 2.9 shows the propagation of RREP message that carries the entire hop sequence. a) Route Maintenance: Route Maintenance is done by the propagation of route error message (RERR). Whenever any active node sees or detects the link failure, it propagates the route error message to its upstream neighbours along the reverse path till it reaches the source node. To verify the correct operation of the router links, HELLO messages and acknowledgement messages can be used. 2.4 Proactive/Table Driven Routing Protocols: These types of protocols are table based because they maintain table of connected nodes to transmit data from one node to another and each node share its table with another node. These protocols desire to maintain up-to-date and consistent routing information in the network. Thus, every node maintains one or more routing table to store routing information about every other node in the network. So due to this reason, these type of protocols are not preferred for large network. There are different types of proactive routing protocols: Destination Sequence Distance Vector Routing (DSDV), Optimized link state routing (OLSR), Fisheye State Routing (FSR). 2.4.1 Destination Sequence Distance Vector Routing (DSDV): Destination Sequence Distance Vector Routing (DSDV) is a table driven routing protocol based on the Bellman-Ford algorithm. In this type of routing protocol every node in the network share packet with its entire neighbour [19]. And packet contain information such as node‟s IP address, last known sequence number, hop count. Whenever there is topology change in network each node advertises its routing status after a fixed time or immediately. Working of Destination Sequence Distance Vector Routing (DSDV):
  • 22. For more Https://www.ThesisScientist.com 22 The main objective of DSDV routing protocol is to avoiding loop formation and maintains its simplicity. In DSDV whenever any node want to transmitted a packet or information to the destination node, it using the routing table [16]. Routing tables are maintained by each node in the network, each node routing table maintains some information like destination address, number of hops required to reach the destination and sequence number. Thus the routing table consist of following entries <destination, distance, next hop> [16]. Whenever any node want to sending a message to other node than it adds a sequence number in the routing entries, the sequence number indicates the newness of the information to the routing table. In DSDV routing protocol routes with the latest sequence number are always preferred for forwarding a message to one node to other. If one or more source have same sequence number and sending a message to the same destination then in this case route with lower distance is preferred [16]. Figure 2.10: Routing in DSDV
  • 23. For more Https://www.ThesisScientist.com 23 2.5 Simulation Tools: The simulation software or tools have been classified into three different categories. They are (a) Vehicular mobility generator (b) Network simulator (c) VANET simulators [20]. VANET mobility generators are used to generate realistic movement traces of the vehicles motion to increasing level of realism in VANET simulation. These traces subsequently imported into a network simulator as an input in order to study the performance of the protocol application. Network simulators are used to perform detailed packet-level simulation of source, destinations, reception, route, background load, links, data traffic transmission and channels [20]. Finally, VANET simulators provide both network simulation and traffic flow simulation. In the next few sections, we will discuss vehicular mobility generators, network simulators and VANET simulators in greater depth with their characteristics, functions. 2.5.1 Mobility Generators: VANET mobility generators are used to generate traces of the vehicles motion that can be usually saved and subsequently imported into a network simulator in order to study the performances of the protocol application [20]. As mentioned earlier, it is important to generate realistic movement traces in order to rigorously evaluate VANET protocols because the overall performances depend on the connectivity which, in turn, relies on the movement traces. A. TSIS-CORSIM: TSIS-CORSIM (Traffic Software Integrated System Corridor Simulation) is a powerful commercial traffic simulation package, developed at the University of Florida and funded by the Federal Highway Administration (FHWA). It is a microscopic simulation model that is especially designed to simulate highways and surface streets and, thus, includes traffic signals and stop signs [20]. This simulator is made up of two main components, NETSIM for simulating surface streets, and FRESIM for simulating freeways. Unfortunately, TSIS-CORSIM simulator requires Microsoft Windows and Internet Explorer to run. It can simulate very complex traffic scenarios and thus it can take a large amount of information as input. B. STRAW: Street Random Waypoint (STRAW) mobility generator gives the more accurate simulation results by using a vehicular mobility model based on
  • 24. For more Https://www.ThesisScientist.com 24 the operation of real vehicular environment [20, 29]. Its current implementation is written for the JiST/SWANS discrete-event based simulator. STRAW is part of the Car-to-Car Cooperation project also known as C3 project. C. SUMO: Simulation of Urban Mobility (SUMO) is an open source, highly portable microscopic road traffic simulation package that deals with very large number of nodes in Vehicular Ad hoc Network [20]. It can be used on most of the operating system. Because of high portability and its GNU General public license SUMO has become more popular and most widely used in Vehicular Ad hoc Networks. It has evolved into a full featured suite of traffic modelling utilities uses own formats for road networks and traffic demand generation and routing utilities [4].The main merits of SUMO is that it is OpenGL GUI based, highly portable, open source, easy simulation set-up, portable libraries, imports different formats, collision free movement and large number of map defined for better understanding. But it has some limitations such as, less user friendly interface and its traces do not support NS-2, GloMoSim and QualNet. Figure 2.11: Graphical User Interface of SUMO
  • 25. For more Https://www.ThesisScientist.com 25 D. MOVE: Mobility model generator for Vehicular network (MOVE) is a mobility generator built on top of the SUMO (Simulation of Urban Mobility) and rapidly generates realistic mobility models for VANET simulations. The MOVE‟s output is a mobility trace file that consists of realistic vehicle movement‟s information which can be used by popular simulation tools such as NS-2 or GloMoSim or QualNet. MOVE consists of two main components: Mobility model and traffic model generator. Mobility Model Generator provides a user friendly interface for generating mobility model for simulations using SUMO. It also allows the user to create customized topology or import maps. And Network Traffic Model generator takes the SUMO trace file as the input and generates the network traffic model as required by either NS-2 or QualNet. It provides all the configurable option of NS-2 TCL files, like specifying MAC, routing protocol to use, etc.
  • 26. For more Https://www.ThesisScientist.com 26 Figure 2.12: Graphical User Interface of MOVE E. FreeSim: FreeSim is an open source and portable microscopic and macroscopic free-flow traffic simulator. Traffic and graph algorithms can be easily created and executed for the entire network or for individual vehicles or nodes [20, 29]. FreeSim is ideal for Intelligent Transportation System (ITS) simulation because Vehicles in FreeSim can communicate with the system monitoring traffic on the freeways. The main features of FreeSim are: It is GUI based, highly portable, easy to simulation set-up, easy to use, open source and large number of examples available for better understanding. But it has some limitations also like not import different formats, and its traces do not support NS-2, GloMoSim, QualNet, SWANS. F. CityMob: CityMob is a highly portable, open source, GUI based mobility model generator generally used in Vehicular Ad hoc Networks (VANETs) [20]. The main advantages of CityMob like easy to create simulation set-up and easy to use , for better understanding large number of example is available But its biggest limitations is that it generated traces does not support NS- 2,GloMoSim,QualNet,SWANS. And real and user defined maps is not available here [20, 29]. 2.5.2 VANET Simulators: A. GrooveNet: GrooveNet is a hybrid simulator that integrated both network and mobility simulator. It allows communication between real and simulated vehicles. GrooveNet is an open source hybrid simulator that integrated both network and mobility simulator [20, 29]. It allows communication between real and simulated vehicles. Its modular architecture incorporates mobility, trip, and message broadcast models over physical layer and Link layer communication models [20]. B. TraNS: TraNS (Traffic and Network Simulation Environment) is the first VANET simulator. It is a simulation tool that integrates both mobility generator and network simulator for conducting realistic VANET simulation [20]. It provides a tool to build realistic VANET simulations. TraNS also
  • 27. For more Https://www.ThesisScientist.com 27 provides a feedback between mobility model and vehicular behaviour. It can operate in two modes: application-centric mode and network centric mode. In the network-centric mode, there is no feedback provided from NS-2 to SUMO. So the link between NS-2 and SUMO is done through a parser. Parser analyses the mobility trace file generated by SUMO simulator and then converts it to a suitable format for NS-2 simulator. In the case of application-centric mode, the feedback between NS-2 and SUMO is provided through an interface called TraCI. In this mode SUMO and NS-2 must run simultaneously [20, 29]. C. NCTUns: National Chiao Tung University Network Simulator (NCTUns) is a VANET simulator that combines both traffic and network simulator in to a single module that built using C++ programming language and supports high level of GUI. It is a highly extensible and robust network simulator in no need to be worry about the code complexity [20]. It supports parallel simulations for fixed network on multi core machines. The main merits of NCTUns is that it can simulate IEEE 802.11a, IEEE 802.11b, IEEE 802.11e, IEEE 802.16d, IEEE802.11g and IEEE 802.11 technologies, and supports large number of nodes. NCTUns includes bidirectional and unidirectional communication. Compared to TraNS, NCTUns combines traffic and network simulator together in a single module and returns feedback to supports VANET. However, the maximum number of nodes that can be simulated by single simulation by NCTUns is just 4096. But it has some limitations such as, complex set up procedure and it can works only on Fedora 9 Linux platform [20]. 2.5.3 Network Simulators: Network simulators perform detailed packet-level simulation of source, destinations, reception, route, background load, links, data traffic transmission and channels. There are various types of network simulators some of them are describes as follows. A. NS-2: Network Simulator (Version 2), called as the NS-2, is simply an event driven, open source, portable simulation tool that used in studying the dynamic nature of communication network. Several different NS-2 versions have been released over the last few years; the latest version of NS-2 is the NS-2.35 [20]. Users are feeding the name of a TCL simulation script as an
  • 28. For more Https://www.ThesisScientist.com 28 input argument of NS-2 executable command ns. NS-2 uses two key languages one is the C++ and second is the Object-oriented Tool Command Language (OTCL). In NS-2 C++ defines the internal mechanism (backend) of the simulation objects, and OTCL defines external simulation environment (i.e., a frontend) for assembling and configuring the objects. After simulation, NS-2 gives simulation outputs either in form of NAM files or trace files [20]. In NS-2 some limitation can be found in terms of the installation process on windows based operating systems. To run NS-2 on window based environment a software program is used for creating Unix-like environment known as Cygwin; downloading and installing of Cygwin on windows based system is quite complex because of large size of packages of Cygwin [20]. Figure 2.13: Architecture of Network Simulator B. OPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community. It provides a virtual network environment that models the behaviour of an entire network including its switches, routers, servers,
  • 29. For more Https://www.ThesisScientist.com 29 protocols and individual application. The main merits of OPNET are that it is much easier to use, very user friendly graphical user interface and provide good quality of documentation [20]. Figure 2.14: Graphical User Interface of OPNET C. GloMoSim: GloMoSim (Global Mobile Information System Simulator) is a scalable simulation environment especially designed of MANET and its applications [20]. It is open source, portable and includes a large set of routing protocols and several physical layer implementations. It was retired in 2000 but it is still possible to download for educational purposes only. On the other side, Scalable Network Technologies introduced the commercial version of GloMoSim (Global Mobile Information System Simulator) named as QualNet (Quality Networking) simulator. The main merits of QualNet simulator (Quality Networking), is that it is portable, highly scalable and extremely powerful simulator. One of the main merits of QualNet is that it is run on both Windows and Unix/Linux platforms [20]. D. QualNet: Quality Networking (QualNet) simulator is a highly scalable, fastest simulator for large heterogeneous network that supports the wired and wireless
  • 30. For more Https://www.ThesisScientist.com 30 network protocol. QualNet execute any type of scenario 5 to 10 times faster than other simulators [20]. Figure 2.16: Graphical User Interface of QualNet  It is highly scalable and simulate up to 50,000 mobile nodes. And this simulator is designed as a powerful Graphical User Interface (GUI) for custom code development [20]. The main merits of QualNet simulator (Quality Networking), is that it is portable, highly scalable and extremely powerful simulator. One of the main merits of QualNet is that it is run on both Windows and Unix/Linux platforms [20]. E. VanetMobiSim: VanetMobiSim is an extension of the CANU Mobility Simulation Environment (CanuMobiSim) which focuses on vehicular mobility and features realistic automotive motion models at both microscopic and macroscopic levels [20, 24]. At the microscopic level it supports mobility models such as Intelligent Driving Model with Lane Changing (IDM/LC) and Intelligent Driving Model with Intersection Management (IDM/IM). It also supports car to infrastructure and car to car communication, which supports traffic lights, multi-lane roads, separate directional flows stop signs and traffic
  • 31. For more Https://www.ThesisScientist.com 31 signs at intersections. VanetMobiSim is based on JAVA and can generate movement traces in different formats, supporting different simulation for mobile networks including ns-2, GloMoSim, and QualNet [20]. F. SWANS: SWANS (Scalable Wireless Ad hoc Network Simulator) was proposed to be a best alternative to the NS-2 simulator for simulating the wireless and ad hoc networks. On the basis of comparative study of simulators like SWANS, GloMoSim, and NS-2, it is found that SWANS simulator is the most scalable and more memory efficient. SWANS take Java file as an input. It is a scalable wireless network simulator built top on the JIST platform and good capabilities like NS-2 and GloMoSim [20, 29]. 2.6 Classification of the VANET Applications: The prospective applications of Vehicular Ad hoc Networks (VANET) are categorized in to three major groups as comfort oriented applications, convenience- oriented applications and safety oriented applications [11]. Safety oriented related applications look for the increasing safety of passengers by exchanging relevant information via vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). And comfort and convenience applications improve passenger‟s comfort and traffic efficiency. 2.6.1 Safety-Oriented Applications: These types of applications help the driver to avoid potential dangers via the exchange of information among vehicles. They are the most important applications because they serve to avoid accidents [11].
  • 32. For more Https://www.ThesisScientist.com 32 Figure 2.17: Safety Applications provided by VANET They can take control of the vehicle in case of dangerous situations, as in the case of the automatic braking, or only send warning messages to drivers. Some safety oriented application shown in Table 1.1[11]. Table 2.1: Examples of Safety-Oriented Applications Name Description Intersection violation warning It warns drivers when they are going to pass over a red light. On-coming traffic warning It helps the driver during overtaking manoeuvres Electronic brake warning It reports to the driver that a preceding vehicle has performed a sudden braking. Vehicle stability warning It alerts drivers that they should activate the vehicle stability control system. Post-crash notification A vehicle involved in an accident sends warning messages in broadcast to approaching vehicles. Traffic signal violation warning A roadside unit sends messages in broadcast to warn drivers of potential violations of traffic signals. Lane change warning It helps drivers to perform a safe lane change
  • 33. For more Https://www.ThesisScientist.com 33 2.6.2 Convenience-Oriented Applications: These types of applications improve the efficiency of the roads and to save drivers time and money. Some Convenience oriented application shown in Table 1.2[11]. Figure 2.18: Convenience Oriented Application Provided by VANET Table 2.2: Examples of Convenience-Oriented Applications Name Description Intersection management V2V and V2R communications allow a better intersections management Limited access and detour warning A roadside unit sends information in broadcast about limited access areas or possible detours. Electronic toll collection A vehicle establishes unicast communication with a toll gate roadside unit and pays the toll without stopping. Parking availability notification A vehicle asks to a roadside unit for a list of available parking spaces, and the roadside unit sends the list to the vehicle. Congested road notification A vehicle in a congested road sends information in broadcast to other vehicles. 2.6.3 Commercial-Oriented Applications: These types of applications serve to make the travelling more comfortable and productive, for example, by means of the internet connection. Some Commercial oriented application shown in Table 1.3[11].
  • 34. For more Https://www.ThesisScientist.com 34 Table 2.3: Examples of Commercial-Oriented Applications Name Description Remote diagnosis The driver can start a wireless connection with the dealer in order to upload the vehicle diagnostics information to detect possible problems. Media or map download A vehicle can start a wireless connection with the home network or a hot-spot to download maps and multimedia contents. Service announcement Restaurants and other businesses can use a roadside unit to send promotional messages to the drivers of the vehicles that are in their communication range. 2.7 Safety Related VANET Applications: As presented in [9], there are five possible safety applications in VANETs:  Intersection violation warning  Electronic brake warning  On-coming traffic warning  Vehicle stability warning  Lane change warning 2.7.1 Intersection Violation Warning (IVW): The intersection violation warning (IVW) application warns drivers when they are going to pass over a red light that shown in Figure 2.19.
  • 35. For more Https://www.ThesisScientist.com 35 Figure (a): Without Intersection Violation Warning (IVW) Figure (b): With Intersection Violation Warning (IVW) Figure 2.19: (a) Without Intersection Violation Warning (IVW), the inattentive driver of vehicle 1 can cause a serious accident due to not stopping at red light. (b) With IVW the driver of vehicle 1 is warned of red light and stops the vehicle before the intersection. It is possible to achieve this application by placing a RSU with a traffic light controller, so that the RSU broadcast traffic light information. Vehicles that receive these data can warn the driver about the presence of a red light to avoid accidents in time [11].
  • 36. For more Https://www.ThesisScientist.com 36 2.7.2 Electronic Brake Warning (EBW): The electronic brake warning (EBW) application reports to the driver that a preceding vehicle has performed a sudden braking [11]. This is useful when the view of the braking vehicle is obstructed by other vehicles. The scenario is shown in Figure 2.20, where vehicle 1, braking violently, produces a message that is sent in broadcast to warn the other vehicles about the dangerous situation. Figure (a): Braking Situation Figure (b): Without EBW Figure (c): With EBW Figure 2.20: (a) Vehicle 1 has to perform an emergency braking and vehicle 3 does not realize it because it has the view obstructed by the vehicle 2. (b) Without EBW vehicle 3 cannot react to the delayed braking of vehicle 2 and so there is a collision. (c) With EBW vehicle 3 is informed of the emergency braking of vehicle 1 and so it has the time to slow down
  • 37. For more Https://www.ThesisScientist.com 37 2.7.3 On-coming Traffic Warning The on-coming traffic warning (OTW) application helps the driver during overtaking manoeuvres, by providing information about on-coming traffic that shown in figure 2.21[11]. The vehicle stability warning (VSW) application alerts drivers that they should activate the vehicle stability control system due to the hazardous driving conditions (ice, oil) that shown in figure 2.22[11]. Figure (a): Overtaking situation Figure (b): Without OTW Figure (c): With OTW Figure 2.21: (a) Drivers often misjudge velocity and distance of on-coming traffic when they are about to perform an Overtake. (b) Without OTW, vehicle 1 causes a collision with both vehicles 2 and 3. (c) With OTW, vehicle 1 is informed about the possible collision and so it decides to perform overtakes only after vehicle 2 has passed.
  • 38. For more Https://www.ThesisScientist.com 38 Figure (a): Icy Road condition Figure (b): Without VSW Figure (c): With VSW Figure 2.22: (a) Vehicle 1 encounters an icy stretch of road and activates its stability control system to maintain the bend. (b) Without VSW, driver 2 that travels at a
  • 39. For more Https://www.ThesisScientist.com 39 higher speed is not able to activate the stability control system and so he loses control and collides with vehicle 3. (c) With VSW, the driver of vehicle 2 is informed of the activation of the stability control system by vehicle 1 and so he slows down to maintains control of the car. 2.6 State of the Art: In recent years, several researchers have analyzed and compare various ad-hoc Routing Protocols taking into consideration different performance metrics as basis for performance evaluation. In this section describes the literature review of various research papers and journals related to Vehicular Ad hoc Networks (VANET). Vidhale et al. [2]: Here, authors evaluate the MANET routing protocols in VANET environment by using different mobility models available in VanetMobiSim. In their work, authors using different simulation parameters such as number of nodes, packet size, simulation area and performance metrics, average end to end delay, normalized routing load. After the simulation result authors conclude that DSR has better packet delivery fraction (PDF) and lesser routing overload than others. But in the case of end to end delay AOMDV protocol performed better than others. Also it shows that reactive routing protocols performance degrading in space graph model. So finally authors conclude that AOMDV is more appropriate than DSR in VANET. Jerome Haerri et al. [3]: Here, authors evaluate and improve the performance of the AODV and OLSR routing protocols under two topical and realistic mobility models for VANET. In their work for the performance evaluation authors used the OMNET++ simulator .In this paper authors design a convoy scenario that contains several parameters like 400km*400km simulation area, 60 seconds simulating time, 500m communication range, 1440B packet size, 27m inter vehicle distance and UDP transport protocol .The main objective of this work is improves the communication performance of routing protocols by increasing the density around the receiver. In their work authors also analyse the properties of the two mobility models in high density urban areas. Finally after the simulation result authors conclude that the performance of AODV is better than OLSR and OLSR routing protocol seem more affected by the density than AODV, the reason behind is that proactive routing
  • 40. For more Https://www.ThesisScientist.com 40 protocol maintains the entire network topology while reactive routing protocol create routes when they need. Sun Xi. et al. [4]: Here, authors evaluate the performance of AODV, ADV and DSR routing protocols by taking some performance metrics such as packer drop ratio, throughput. In their work, authors to use an open source simulator tool namely NCTUns-6.0.In this paper, authors using three different mobility patterns for three Indian Metros cities: Kolkata, Chennai and Mumbai. After the simulation result authors conclude that almost same performance of ADV and AODV routing protocol for all different city scenarios, and DSR have less overhead than ADV and AODV so DSR is not suitable for highly dynamic network. Monika et al. [6]: In this paper authors analyzed the performance of AODV and DSR routing protocols for Vehicular Ad-hoc network with and without RSU (Road Side Unit). For performance evaluation of considered protocols they used Estinet Simulator. After getting simulation results they conclude that throughput was highest for AODV as compared to DSR with varying number of nodes so AODV performed better than DSR. They also found that in presence of RSU whole performance of network was better as compared to absence of RSUs. Uma mani et al. [8]: Here authors examined the performance of AODV, DSR, and OLSR routing protocol with different nodes density and the number of data traffic sources in order to shows their advantages and limitations in the context of Vehicular Ad hoc Networks. In their work, authors considered two propagation models, the first one is the TwoRayGroungand second one is the adaption model. The first one assumes an unobstructed flat environment and second one takes into account the terrain characteristics and define three terrain categories. For the simulation purpose authors used Territoire Mobile mobility model and NS-2.23 network simulator. After the simulation result authors conclude that AODV routing protocol shows higher end to end values. Amit N. Thakare et al. [10]: In this paper authors analyzed the performance of AODV and DSR routing protocols using ns-2 simulator with Random Waypoint mobility model. After getting simulation results they conclude that packet loss of
  • 41. For more Https://www.ThesisScientist.com 41 DSR is higher as compared to AODV and ratio of packet received was higher for AODV as compared to the DSR routing protocol. Mittal N.M. et al. [11]: In this paper authors present a survey and comparative study of several publicly available network simulators, mobility generators and VANET simulators. In their work, the network simulators like NS-2, SNS, GloMoSim, SWANS, and QualNet briefly described by authors. In this paper authors also present comparative study of various mobility generators like SUMO, MOVE, FreeSim, CityMob, STRAW, VanetMobiSim and Net stream. In their work authors conclude that SUMO, STRAW, MOVE and VanetMobiSim have good traffic model support and also have some good features but these are the best. Finally the authors present briefly introduction of VANET simulators such as TraNS, MobiREAL, GrooveNet, and NCTUns. According to the authors survey GrooveNet and NCTUns are more frequently used for VANET simulations than simulation tools. Davesh et al. [12]: In this paper authors analyzed the performance of AODV and DSR routing protocols using ns2 simulator with varying number of nodes. After getting simulation results they conclude that AODV shows very high packet delivery ratio in 40 mobile nodes, but substantially decreases if the simulation node increases. DSR shows less end to end delay as compared to the AODV. Finally they concluded that AODV performs best because it provides almost identical result in all scenarios and DSR suits for lower scalability networks in which mobile nodes move at moderate speed. Shastri A. et al. [14]: Here authors, reveals the performance analysis of reactive routing protocols AODV, AOMDV and DSR. In their work, authors performed comparison with proactive routing protocol DSDV. In this paper authors used NS- 2.34 simulation tool for simulation purpose with taking various parameters such as 200 second simulation time, 1000*1000 m simulation area and 100 bytes packet size, by using performance metrics such as packet delivery ratio, average packet loss ratio and average end to end delay of packets are investigated on the basis of vehicle velocity and vehicle density. According to the authors simulation result, DSDV routing protocol shows the worst packet delivery ratio and AOMDV and AODV have highest average end to end delays.
  • 42. For more Https://www.ThesisScientist.com 42 Fan li. et al. [15]: Here authors provides a comprehensive and comparative survey that dealing with all issues related to Vehicular Ad hoc Networks like its wireless access technologies and standards, its characteristics , challenges ,security issues, its applications and various simulators. In their work, authors present comprehensive and comparative study that focuses on the issues surrounding VANET and its applications that help to tackle the all issues related to the VANET. In this paper authors also briefly described the several network simulators like NS-2, MOVE, Trans, VanetMobiSim, GloMoSim, NCTUns and QualNet. Gupta P. et al. [16]: In this paper authors compared and analyzed the performance of AODV and DSR routing protocols using default random way point mobility model. For performance evaluation of considered protocols they used ns-2 simulator with variable pause time. After getting simulation results they conclude that DSR outperformed AODV in delay and throughput on small number of nodes with lower load and mobility while AODV performed better than DSR on large number of nodes with higher load and mobility. They also found that DSR has low throughput and delay because of aggressive use of caching and stale routes. Manvi S. et al. [17]: In this paper authors analyse performance of two routing protocols AODV and OLSR by using OPNET Modeler 14.5.In their work ,authors create a network scenario of 40 nodes with the comparison of network load media access delay and throughput to examine the AODV and OLSR routing protocols with simulation parameters like 600*600 m campus area , 40 nodes and 20 minutes simulation time .According to the authors simulation result OLSR routing protocol shows low media access delay and low network load in comparison of AODV , with the overall performance OLSR is better than AODV but it is not necessary that OLSR is always better than AODV. Artimy et al. [18]: in this paper authors try to make best use of DSRC channels by proposing a cluster based multi channel communication scheme. In this scheme authors assumed that each vehicles is equipped with two DSRC transceiver that can work on two different channel simultaneously. In their work they divide time in to periods that can be repeated every T millisecond. And each period is further divide into sub periods for exchange data.
  • 43. For more Https://www.ThesisScientist.com 43 Goel A. al. [22]: In this paper authors investigate methods on how to propagate safety related messages to accidental areas. They outline a scenario, in which an accident happened on a city highway then how a safety message is propagated within one mile of the accidental area, for telling to the other vehicles to slow down and take alternative route. Nzouonta J. et al. [23]: In this paper authors proposed a Road based vehicular traffic (RBVT) routing which is a class of VANET routing protocols for the city based environments. In this work ,authors described a road based vehicular traffic (RBVT) routing protocol that uses real time vehicular traffic information to create road based paths between endpoints. And also authors outline how to improve the end to end performance for the high contention areas by using the distributed mechanism. Wang S. et al. [24]: Here, authors proposed a hybrid media access technique for cluster based vehicular networks ,this technique is based on the scheduled based approach such as TDMA for intra cluster based communications and management , and contention based approach for the inter cluster based communications and management. In this scheme authors used a control channel for delivering the safety and non safety application related messages to the nearby clusters. Kamble et al. [26]: Here Authors, proposed an AODV-R routing protocol that is improved version of AODV routing protocol. In their work to achieve these objective authors developed a link reliability model based on the vehicular velocity distribution on highways. In this papers authors applying a hybrid approach combining both macroscopic and microscopic traffic flow models is highway mobility model and also applying the link reliability model to improve the performance of the current routing protocols in VANETs and incorporated vehicular reliability model into the AODV routing protocol to create a new protocol named as AODV-R routing. Authors compare both AODV and AODV-R. In their work for the performance comparison and evaluation authors was taking four performance metrics such as Average packet delivery ratio, link failures, and average end to end delay. After the simulation result authors found that AODV-R shows higher average end to end values than AODV and route establishment in AODV-R takes longer than that in AODV because of the processing of multiple routing request and replies.
  • 44. For more Https://www.ThesisScientist.com 44 Ameur et al. [27]: In this paper authors present a systematic comparative study of three routing protocols: DSDV, AOMDV and AODV in low, high and middle density regions. In their work, authors was developed a road traffic scenario with taking 50 vehicle as low density ,100 for middle density and 150 for high density region respectively. For the simulation purpose, authors used NS-2.34 network simulator in LINUX platform and VanetMobiSim simulator for generated road topology for simulations purposes. After the simulation result, authors conclude that in low density region AODV and AOMDV score almost same range of packet delivery ratio whereas DSDV packet delivery ratio was situated in between in range of 60-80.In the middle density region the graph shows that AODV and AOMDV have packet delivery ratio lies between 90 to 100 ranges, whereas DSDV packet delivery ratio is in range of 60- 80. And in high density region the graph shows the AODV and AOMDV score same packer delivery ratio in range of 90-100, whereas DSDV packet delivery ratio was degrades to 20-3 Jorjeta G. et al. [32]: In this paper authors discussed several security related issues of mobile ad hoc networks. In their work, authors described the black hole attack in mobile ad hoc networks and proposed a feasible solution for it. Authors used the Global Mobile Simulator in this proposed solution and found to achieve the required reliability and security with minimal overhead and delay. In their work, authors used several performances metrics like routing overhead, packet delivery ratio, average end to end delay to evaluate the performance of AODV. To evaluate the packet delivery ratio authors take several parameters such as25 number of nodes, 5Minutes simulation time and 800m by 800m simulation area. Thus, in recent years, several researchers have analyzed and compare various ad-hoc Routing Protocols taking into consideration different performance metrics as basis for performance evaluation. They have used different simulators and simulation models for the same. In the next section describes a conclusion of this chapter.
  • 46. For more Https://www.ThesisScientist.com 46 Chapter 3 PROPOSED WORK This chapter will describe proposed simulation methodology and algorithm used in the performance evaluation of AODV and DSR routing protocols. In this chapter a brief discussion of the software simulation environment used in the dissertation and their performance parameters used in the comparison have been discussed. 3.1 Software Simulation Environment: This dissertation work using a simulation tool „OPNET Modeler v14.5‟ for simulating AODV & DSR routing protocols. OPNET is a network simulator that provides multiple solutions for managing networks and applications e.g. planning, network operation, research and development (R&D), network engineering and performance management [20, 29]. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol [20, 29]. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community. It provides a virtual network environment that models the behaviour of an entire network including its switches, routers, servers, protocols and individual application. 3.2 Proposed Simulation Methodology: The Proposed Simulation Methodology can be divided into four major steps that shown in figure 3.2. The first step is the modelling, it means to create network model. The second step is to select and apply simulation statistics on the scenarios. Third step is to simulate the scenarios and finally view and analyses results of selected protocols.
  • 47. For more Https://www.ThesisScientist.com 47 Figure 3.2: Flow Chart of Proposed Simulation Methodology 3.3 Statistics for Simulation: In OPNET there are two kinds of statistics, one is Global statistics and the other is the Object statistics. Global statistics can be defined as the statistics that can be collected from the entire network. Simulation Parameters Examined Protocols AODV and DSR Number of Nodes 100,150,200,250,300, and 350 Types of Nodes Mobile Simulation Area 1500*1500 meters Simulation Time 1800 seconds Mobility 10 m/s Pause Time 200 seconds Performance Parameters Throughput, Delay, Network load Traffic type FTP Mobility model used Random waypoint Data Type Constant Bit Rate (CBR) Packet Size 512 bytes Wireless LAN MAC Address Auto Assigned Physical Characteristics IEEE 802.11g (OFDM) Data Rates(bps) 54 Mbps Transmit Power 0.005 RTS Threshold 256 Packet-Reception Threshold 95 Long Retry Limit 4 Max Receive Lifetime(seconds) 0.5
  • 48. For more Https://www.ThesisScientist.com 48 Buffer Size(bits) 256000 On the other hand Object statistics can be defined as the statistics that can be collected from the individual nodes. In Table 1 describe the simulation parameters that are used in this simulation in order to evaluate and compare the performance of two selected routing protocols (AODV, DSR) over a MANET network. A campus network of size 1500 m x 1500 m is using for simulating varying number of mobile nodes. The all mobile nodes are spreading within this area. Each scenario takes 1800 seconds (simulation time) for running. In this simulation default random waypoint mobility model is used and all mobile nodes in all scenarios moving with constant speed of 10 m/s and pause time 200 seconds. Under each simulation we check the behaviour of AODV and DSR routing protocol with constant mobility (10 m/s) and constant pause time. For examining average statistics of the network load, delay and throughput for the AODV and DSR routing protocol of VANET we collected DES (global discrete event statistics) on each protocol and Wireless LAN. We take the FTP traffic in the application configuration object this sets the application to model the high load FTP traffic for analyse the effects on routing protocols. Table: 2 Scenarios Used Scenarios Name No. of Mobile Nodes Protocol Used Scenario 1 100 AODV Scenario 2 100 DSR Scenario 3 200 AODV Scenario 4 200 DSR Scenario 5 250 AODV Scenario 6 250 DSR Scenario 7 300 AODV Scenario 8 300 DSR Scenario 9 350 AODV Scenario 10 350 DSR In profile configuration object we configured the profile with high load FTP application. The nodes were wireless LAN mobile nodes with data rate of 11Mbps. After defining profile configuration we configure Mobility Configuration object for
  • 49. For more Https://www.ThesisScientist.com 49 defining the mobility pattern and model that the nodes will follow during the simulation. 3.4. Proposed Methodology Here, we present different adaptable parameters to optimize AODV routing algorithm and describe their effects on energy constraints. The parameters we target to optimize AODV routing algorithm are Active Route Timeout, Hello Interval and Hello Message loss. The Active Route time out is the lifetime of the routing table. After this period of time the MANET will not consider this route. Hello interval is the time taken by the source node to send the hello message to the other node to make a contact with the intermediate node [7]. For each parameter, we present a discussion on how the parameter affects energy consumption through routing QoS and present an adaptation policy to reduce energy consumption by finding the appropriate value of these parameters considering the current channel conditions. 3.5. Proposed Algorithm In our proposed algorithm we show the effect of different parameters on energy consumption through routing QoS. First we take an example of Active route time out i.e. the lifetime of a routing table entry if a route is not used and refreshed within this "Active route timeout" period, AODV marks the route as "Invalid" and removes it from IP Common Table. The constant value is used to modify the values of the parameters. First of all Set Active Route time as any value X and calculate the results of Quality of service and routing results for that value X. After taking the previous value suppose the constant value is added in this value then the value becomes XI. Then again the simulation takes place in different scenarios and calculates the result of QoS for XI if the result becomes better than X then calculates results for routing parameters, and if the result is not better than previous one then the value remain X. Then again simulation takes place for routing parameters if this result become better than X then the value of X become XI. If the result will not better than the previous one then the value of X will change. Similarly the value of Hello interval and Hello message is modified.
  • 50. For more Https://www.ThesisScientist.com 50 Figure: Proposed Algorithm for Improvement of AODV
  • 51. For more Https://www.ThesisScientist.com 51 REFERENCES [1] Saha A. K. and Johnson D.B., “Modeling the mobility for Vehicular Ad hoc Networks(VANET),” In Proceedings of The ACM International Workshop on Vehicular Ad hoc Networks,2004, pp. 91-96. [2] Vidhale, B. and Dorle S.S., "Performance Analysis of Routing Protocols in Realistic Environment for Vehicular Ad hoc Networks," In Proceedings of Systems Engineering (ICSEng), 2011 21st International Conference on , vol.2, Aug. 2011, pp.267-272. [3] Jerome Haerri “Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns” Department of Mobile Communications, June 2005, pp. 123-134. [4] Sun Xi and Xia-Miao Li, "Study of the Feasibility of VANET and its Routing Protocols," In proceeding of Wireless Communications, Networking and Mobile Computing, 2008. 4th International Conference on Vehicular Ad hoc Networks, 2008, pp.1-4. [5] Wan S., Tang J., and Wolff R. “Reliable routing for roadside to vehicle communications in rural areas,” In Proceedings of the IEEE International Conference on Communications, 2008, pp. 3017-3028. [6] Monika, Sanjay Batish and Amardeep Dhiman, “Comparative Study of AODV, DSDV and DSR Routing Protocols in vehicular Network Using EstiNet Simulator”, In Proceedings of International Journal of Scientific & Engineering Research , Vol. 3, Issue 6, June 2012. [7] Prem Chand and Deepak Kumar” Performance comparison of two on-demand routing protocols for mobile ad-hoc networks” International journal of Advances in Engineering and technology,2011, pp. 283-289.
  • 52. For more Https://www.ThesisScientist.com 52 [8] Uma mani, Ramasamy Chandrasekaran and V. R Sharma” Study and analysis of routing protocols in mobile ad hoc networks” In Proceedings of Journals of Computer science, 2013, pp. 1519-1525. [9] Chen Y. S., Y. W. Lin, and S. L. Lee, “A mobicast routing protocol for Vehicular Ad hoc Networks,” In Proceedings of ACM/Springer Mobile Networks and Applications, Vol. 15, 2010, pp. 20-35. [10] Amit N. Thakare, Mrs. M. Y. Joshi, “Performance Analysis of AODV & DSR Routing Protocols in Mobile Ad hoc Networks”, In Proceedings of Indian Journal of Computer Application, Special Issues, 2010, pp. 231-240. [11] Narendra Mohan Mittal and Dr. P. C. Vashist, “ A Detail Survey on Applications of Vehicular Ad hoc Networks (VANETs)” International Journal of Computer Science and Mobile Computing, Vol. 3, Issues 6, June 2014, pp. 713-721. [12] Davesh Singh and Dhananjaya Singh,“Performance Analysis and Simulation of AODV, DSR and TORA Routing Protocols in MANETs” International Journal of Recent Technology and Engineering (IJRTE), Vol. 1, Issue-3, August 2012, pp. 218- 224. [13] Amit Kumar Saha and David B. Johnson, “Modeling mobility for Vehicular Ad- hoc Networks” In Proceedings of the first ACM workshop on Vehicular Ad hoc Networks, Philadelphia, PA, USA, Oct. 2004, pp. 22-34. [14] Shastri A., R. Dadhich and Ramesh C. Poonia” Performance analysis of on- demand routing protocols for Vehicular Ad hoc Networks” International Journal of wireless and mobile networks, Vol. 3,2011, pp. 103-109. [15] Yamaguchi H., K. Yukimasa, and S. Kusumoto, “QoS routing Protocol for Vehicular Ad hoc Networks,” In Proceedings of IEEE International Workshop on Quality of Service, 2006, pp. 132-139. [16] Pooja Gupta and Rajesh Kumar Tyagi” A significant study and comparison of DSDV, AODV and DSR protocols in MANET using NS-2” In Proceeding of
  • 53. For more Https://www.ThesisScientist.com 53 International Journal of Engineering Research and technology, Vol. 2, Issue 3, 2013, pp. 1-8. [17] Manvi S., Kakkasageri M.S. and Mahapurush , “Performance Analysis of AODV, DSR, Routing Protocols In Vehicular Ad hoc Network Environment” In Proceedings of International conference on future Computer and Communication., April. 2009, pp. 21-26. [18] Artimy M.M., W. Robertson, and W. J. Phillips. “Connectivity in inter-vehicle ad hoc networks”. In Proceedings of Engineering Canadian Conference on Electrical and Computer, Volume: 1, May 2004, pp. 100-112. [19] Bernsen, J. Manivannan, “Routing Protocols for Vehicular Ad hoc Networks That Ensure Quality of Service” In Proceedings of the fourth international conference on Wireless and Mobile Communications, Aug. 2008, pp.1-6. [20] Narendra Mohan Mittal and Savita Choudhary,” Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)” International Journal of Emerging Technology and Advanced Engineering, vol. 4, Issue 4, April 2014, pp. 528-537. [21] Taleb T., E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing protocol to support its services in VANET” In Proceedings of IEEE Transactions on Vehicular Technology, vol. 56, no. 6, November 2007, pp.3337– 3347. [22] Goel A., Ramakrishnan K. G., D. Kataria, and D. Logothetis, “Efficient computation of delay-sensitive routes from one source to all destinations,” In Proceedings of IEEE Conference on Computer Communications, 2001, pp. 854-858. [23] Nzouonta J. R., Guiling N. and Wang Borcea C., “VANET Routing on City Roads Using Real-Time Vehicular Traffic Information,” In Proceedings of Vehicular Technology, IEEE Transactions on Vol. 58, Issue. 7, Sept. 2009, pp. 33-37. [24] Wang S. Y. “Predicting the lifetime of repairable unicast routing paths in vehicle formed mobile ad hoc networks on highways” In Proceedings of 15th IEEE
  • 54. For more Https://www.ThesisScientist.com 54 International Symposium on Personal, Indoor and Mobile Radio Communications, Volume: 4, Sept. 2005, pp. 2815-2819. [25] David B. Johnson, David A. Maltz, and Josh Broch, “The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, In Ad Hoc Networking, Editor: Charles E. Perkins, Addison-Wesley, Chapter 5, 2001 , pp. 139-172. [26] Ameur Bennaoul, Mustapha Guezouri and Mokhtar Keche,” Performance Evaluation of Routing protocols in Vehicular Networks” International Journal of Computer Network and Information Security,2013,pp. 11-16. [27] kamble P.A. and M.M. Kshirsagar, “ Improvement over AODV Routing Protocol in VANET” International Journal of Computer Engineering & Technology, Vol. 4, Issue 4, July 2013, pp. 315-320. [28] H. Wu, Fujimoto, R., Guensler, R., and Hunter, M, “MDDV: a mobility-centric data dissemination algorithm for vehicular network,” In Proceedings of the 1st ACM international Workshop on Vehicular Ad hoc Networks, October, 2004, pp. 47-56. [29] Sherali Zeadally, Ray hunt and Yuh Shayan Chan, “Vehicular Ad hoc Networks (VANETs): Status, Results and Challenges” In Proceeding of Springer Science, Dec. 2011, pp. 217-241. [30] Yang X., L. Liu, N.H. Vaidya, and F. Zhao, "A vehicle-to-vehicle communication protocol for cooperative collision warning in VANET," In Proceedings of the 1st International Conference on Networking and Services,2004, pp.114-123. [31] Balon N., and J. Guo, “Increasing Broadcast Reliability in Vehicular Ad hoc Networks(VANET),” In Proceeding of the 3rd ACM International Workshop on Vehicular Ad hoc Networks VANET, NY,USA,2006, pp. 104-105. [32] Jorjeta G. Jetcheva, Yih-Chun Hu, Amit Kumar Saha, and David B. Johnson. “Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network
  • 55. For more Https://www.ThesisScientist.com 55 Architecture in VANET”. In Proceedings of the Fifth IEEE Workshop on Mobile Computing Systems & Applications, Monterey, CA, Oct. 2003,pp 32-37. [33] Tseng Y.C., Y.S. Chen, and J.P. Sheu, "The broadcast storm problem in a mobile ad hoc network(MANET)," In Proceeding of the 5th ACM/IEEE International Conference on Mobile Computing and Networking, NY, USA, 1999, pp. 51-162. [34] H. Safa, H. Artail, and R. Shibli, “An Interoperability model for supporting reliability and power-efficient routing in mobile ad hoc network,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 4, 2009, pp. 74-83. [35] H.P. Glathe, L. Karlsson, G.P. Brusaglino, L. Calandrino, “The PROMETHEUS Programme– Objectives, Concepts and Technology for Future Road Traffic”, In Proceedings of12th conference of networking, May 1990, pp. 477-484. [36] T. Sawamura, K. Tanaka, M. Atajanov, N. Matsumoto, and N. Yoshida, “Adaptive router promotion and group forming in ad-hoc networks,” In Proceedings of International Journal of Ad Hoc and Ubiquitous Computing, Vol. 3, 2008, pp. 217- 223. [37] Heissenbüttel M., T. Braun, M. Wälchli, and T. Bernoulli, “Optimized stateless broadcasting in wireless multi-hop networks,” In proceeding of 4th IEEE international conference on Infocom Barcelona,2006,pp.234-240. [38] Sommer, C.; Dietrich, I.; Dressler, F. “Realistic Simulation of Network Protocols in VANET Scenarios” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 3, 2008, pp. 217-223. [39] Tseng Y.C., Y.S. Chen, and J.P. Sheu, "The broadcast storm problem in a mobile ad hoc network(MANET)," In Proceeding of the 5th ACM/IEEE International Conference on Mobile Computing and Networking, NY, USA, 1999, pp. 51-162. [40] Zhao J. C. and Josh Broch “Vehicle-Assisted Data Delivery in Vehicular Ad hoc Networks” In Proceedings of 25th IEEE International Conference on Computer Communications. Proceedings, April 2006, pp. 6-12.
  • 56. For more Https://www.ThesisScientist.com 56 [41] Korkmaz G., E. Ekici, F. Ozgüner, and U. Ozgüner, "Urban multi-hop broadcast protocol for inter-vehicle communication systems in VANET," In Proceeding of the 1st ACM International Workshop on Vehicular Ad hoc Networks, NY, USA, 2004,pp. 76-85. [42] Rajive Bagrodia, Richard Meyer, Mineo Takai, Yu an Chen, Xiang Zeng, Jay Martin, and Ha Yoon Song. “A parallel simulation environment for complex systems” In Proceedings of the 1st ACM international workshop on Vehicular Ad hoc Networks, 2004, pp. 66 – 75. [43] Dirk Reichardt, Maurizio Miglietta, and Wolfgang Schulz “CARTALK 2000 Safe and Comfortable Driving Based Inter-Vehicle-Communication in VANET”, In proceedings of IEEE Intelligent Vehicle Symposium, June 2002, pp.145-147. [45] Tsugawa, S.; Kato, S.; Tokuda, K.; Matsui, T.; Fujii, H., “A cooperative driving system with automated vehicles and inter-vehicle communications in Demo 2000”, In proceedings of IEEE Intelligent Transportation Systems,2006, pp.178-189. [46] Brian D. Noble, Jungkeun Yoon ,Mingyan Liu, Minkyong Kim, ”Building realistic mobility models in VANET”, In Proceeding of the ACM International Conference On Mobile Systems, Applications And Services,2006, pp. 177-190. [47] Robert E. Chandler, Robert Herman, Elliott W. Montroll, ”Traffic Dynamics: Studies in Car Following”, Operations Research, Vol. 6, 2004, pp. 165-184. [48] Fan Li and Yu Wang; “Survey of Routing in Vehicular Ad hoc Networks”, In Proceedings of IEEE Vehicular Technology Magazine, Volume 2, Issue 2, June 2007; pp. 12-22. [49] Jahanzeb Farooq and Bilal Rauf “ Implementation and Evaluation of IEEE 802.11e Wireless LAN in GloMoSim” In Proceeding of the 1st ACM International Workshop on Vehicular Ad hoc Networks, NY, USA, 2004,pp. 76-85.
  • 57. For more Https://www.ThesisScientist.com 57 [50] Skordylis A. and Trigoni N., “Delay-bounded routing in vehicular ad-hoc networks (VANET),” In Proceedings of ACM International Symposium on Mobile Ad hoc Networking and Computing, 2008, pp. 3020-3026. [51] Abedi Berangi and R.; Azgomi, M. A., "Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET," In Proceedings of 29th IEEE International Conference on Vehicular Ad hoc Networks, June 2009, pp.464- 467. [52] Robert E. Chandler, Robert Herman, Elliott W. Montroll, ”Traffic Dynamics: Studies in Car Following”, In proceeding of 4th IEEE International Conference on Infocom, Barcelona, 2006, pp.234-240. [53] Chowdhury S.I., Won-Il Lee, Youn-Sang Choi, and Guen-Young Kee "Performance evaluation of reactive routing protocols in VANET," In proceeding of Communications (APCC), 2011 17th Asia-Pacific Conference on Vehicular Ad hoc Networks ,2011, pp.559-564. [54] T. Taleb, E. Sakhaee, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing protocol to support ITS services in VANET networks,” In Proceedings of IEEE Transactions on Vehicular Technology, Vol. 56, 2007, pp. 3337-3347. [55] Nzouonta, J., Rajgure, N., Guiling Wang and Borcea, C., "VANET Routing on City Roads Using Real-Time Vehicular Traffic Information," In proceeding of Vehicular Technology, IEEE Transactions on on Vehicular Ad hoc Networks, vol.58, no.7, 2011,pp.3609-3626. [56] Vinod Namboodiri, Manish Agarwal and Lixin Gao; “A Study on the Feasibility of Mobile Gateways for Vehicular Ad-hoc Networks (VANET)”, In proceeding of Wireless Communications Networking and Mobile Computing 6th International Conference on 2010,Sept. 2010, pp. 23-25. [57] Yue Liu, Jun Bi and Ju Yang; “Research on Vehicular Ad hoc Networks” In Proceedings of Chinese Control and Decision Conference (CCDC), 2009, pp. 4430 – 4435.
  • 58. For more Https://www.ThesisScientist.com 58 [58] Tonguz, F. Bai and P. Mudalige, “Broadcasting in VANET,” In Proceedings of IEEE Mobile Networking for Vehicular Environments, 2007, pp. 7-12. [59] Blum J., Eskandarian A., and HoffmanL. "Performance Characteristics of Inter- Vehicle Ad Hoc Networks". In Proceedings of IEEE 6th International Conference on Intelligent Transportation Systems, Shanghai, China,2004, Pp. 115-119. [60] Manoharan R. and S. L. P. Thambidurai, “Energy efficient robust on-demand multicast routing protocol for mobile ad hoc network,” In Proceedings of International Journal of Ad Hoc and Ubiquitous Computing, Vol. 3, 2008, pp. 90-98.