SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
IMPORTANCE OF REALISTIC MOBILITY 
MODELS FOR VANET NETWORK 
SIMULATION 
Bahidja Boukenadil¹ 
¹Department of Telecommunication, Tlemcen University, Tlemcen,Algeria 
ABSTRACT 
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested 
under a realistic conditions including, representative data traffic models, and realistic movements of the 
mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two 
mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model 
generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe 
several mobility models for VANET simulations. 
In this paper we aim to show that the mobility models can significantly affect the simulation results in 
VANET networks. The results presented in this article prove the importance of choosing a suitable real 
world scenario for performances studies of routing protocols in this kind of network. 
KEYWORDS 
VANET; Mobility Model; Simulations; Real World; MOVE; SUMO; CityMob; NS-2 etc. 
1. INTRODUCTION 
The mobility is the principal constraint met in the vehicular networks, therefore the performance 
investigation of VANET network routing require the exact prediction of mobility of nodes 
forming the network, and this is realized by the good choice of the mobility model. 
Generally, the traces and the synthetic models [1] are two kinds of mobility patterns used for the 
simulation of networks .for simulating the complex and large scale networks that require more 
real world scenarios for a real modeling, the traces are used. But in several situations, these traces 
are created with difficulty, particularly for the networks of high mobility like the vehicular 
networks. In this case, the mobility of nodes (i.e., the vehicles nodes) are modeled with the 
synthetic patterns, these models try to really present the behavior of these environments of 
vehicles. 
A variety of synthetic mobility models for vehicular networks are discussed in Literature, some of 
them are presented in Section II. Section III illustrate that a mobility model has a large effect on 
the performance evaluation in simulation of VANET network. Finally, Section IV presents some 
concluding remarks. 
DOI : 10.5121/ijcnc.2014.6513 175
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
176 
2. MOBILITY MODEL FOR VEHICULAR NETWORKS 
Many models of mobility can be used to generate the movement of the vehicles instead of the 
traces which are difficult to create in the VANET environments . 
However, the behavior of these networks is very complex; the drivers must react to the high 
change of the road conditions like the congestion, traffic jam, works in the roads. The state of the 
roads in turn depends on the behaviors of the drivers. Thus, the choice of the mobility model 
affects the relevance and viability of the obtained results. 
In general, vehicular traffic simulators or mobility models can be classified in two great kinds, the 
microscopic and macroscopic simulators. The microscopic simulator is interested in the 
movement of each vehicle taking part in the road traffic. In contrast the macroscopic simulators 
are interested in all the vehicles forming the networks; it compute road capacity and the 
distribution of the traffic in the road net, by determining a certain parameters like traffic density 
(number of vehicles per km per lane) or traffic flow (number of vehicles per hour crossing some 
points of interest, usually an areas with a great density of nodes) . 
The literature present a large variety of mobility models for VANET networks. 
The work of Saha and Johnson [2] model vehicular traffic in real road topologies of the maps of 
USA available from TIGER (Topologically Integrated Geographic Encoding) [3] database. The 
mobility of nodes is random.Vehicles compute the shortest path to get their destination over the 
graph by weighting the cost of displacement on each road on its speed limit and the traffic jam. 
Huang et al. [4] studied taxi behavior. In this work, a Manhattan style grid with a uniform block 
size is modeled. The streets of simulation area are two-way, with one lane in each direction. 
These lanes constrain vehicle movements. A set of parameters characterize the vehicle behavior 
which are preferred velocity ,maximum acceleration and deceleration, a velocity variation 
associated with the preferred speed at steady state and a list of preferred destinations, i.e., the taxi 
stands. . The taxis assigne randomly one of three preferred speeds. 
In the work of Choffnes et al. [5] , an integrated mobility and traffic model is conceived, named 
STRAW.For modeling real traffic conditions ,this model incorporates a simple car-following 
model with traffic control. The road map of this pattern is constructed by street plans with one 
lane in each direction .The vehicles move in these lanes according to a random street placement 
model.Each vehicle enters the map is placed behind the existing one. 
In [6] Haerri et al. proposed a vehicular mobility simulator for VANET networks, called 
VanetMobiSim [7] .The speed of vehicles for this model is determined by the use of the 
Intelligent Driver Model (IDM). 
Three different models were presented in the work of Mahajan et al. [8]: Stop Sign Model (SSM), 
Traffic Light Model (TLM) and Probabilistic Traffic Sign Model (PTSM).In this models All 
roads are two-way, with one lane in each direction for the SSM and PTSM, whereas TLM model 
streets with multiple lanes. An algorithm is employed to reproduce stop signs for each model. 
Martinez et al [9] present CityMob [10] .This mobility model generate different mobility patterns 
in VANETs, Simple Model (SM), Manhattan Model (MM) and Downtown Model (DM).Each 
model has its own characteristics,For the SM,the plan of the road is very simple, neither 
semaphores nor direction changes.In constract, MM and DM simulates semaphores at crossing
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
and random positions in zones with different vehicle density. CityMob allows to simulate 
damaged cars and tries to prevent congestions. Figure 1 present the interface of this model. 
Karnadi et al. [12, 13, 14] develop a tool MOVE (MObility model generator for VEhicular 
networks) [11] .This model provide facility for the users to generate real world scénarios in 
VANET environments. This model contains two editors, one for road map and the second for 
vehicle movement .The user can manually and automatically create the road topology or import it 
from existing real world maps such as Google maps. For vehicle movement, the pattern can be 
manually created, generated automatically or specified based on a bus time table to simulate the 
movements of public transportations. Figure2 shows the interface of this model. 
177 
Figure 1. Interface of CityMob
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
178 
Figure 2: Mobility Model Generator 
3. INFLUENCE OF MOBILITY MODEL IN VANET 
SIMULATIONS 
. 
The simulation results are greatly affected by the mobility model selected .The results presented 
in this section illustrate the importance of choosing a suitable mobility model for performances 
evaluation of routing protocols in VANET network. 
We use ns-2 [34] to compare the performance of the CityMob Model and the MOVE tool via a 
simulation.The routing of packets is accomplished with the Ad hoc On Demand Distance Vector) 
(AODV) [20]. We have chosen the parameters for both mobility models in a manner to simulate 
the same path as possible. 
AODV (Ad hoc On Demand Distance Vector) [1] is a reactive protocol that does route discovery 
when needed by a node. The route discovery process is initiated only when a source node has data 
traffic to send to a destination node, that makes AODV a truly On- Demand routing protocol. 
In our simulations, we chose AODV since it behaves well in several of the performance 
evaluations of the routing protocols (e.g. [21, 22, 23]).
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
The ns-2 code used in our simulations of AODV was obtained from [24]. 
Each simulation run lasted for 300 seconds with a uniform block size of 500 x 500 meters; the 
maximum speed of vehicles is of 40 m/s. 
The number of vehicles nodes from 15 to 100. We chose the traffic sources at a constant rate 
CBR (Constant Bit Rate). Traffic between nodes is generated using a traffic generator which is 
characterized by the following parameters: Data packets Size is 512 bytes, Interval between 
packets is 0.25s , maximum of packets transmitted 1000. All nodes use IEEE 802.11 MAC 
operating at 2Mbps. The propagation model employed in the simulation is TwoRayGround 
reflextion. 
In our comparison of the two mobility models, we consider the following performance metrics 
obtained from the AODV protocol: throughput, end-to-end delay and protocol overhead. 
179 
0 20 40 60 80 100 
0,023 
0,022 
0,021 
0,020 
0,019 
0,018 
0,017 
0,016 
0,015 
0,014 
0,013 
0,012 
0,011 
0,010 
0,009 
Move 
CityMob 
Throughput (bits/s) 
Number of vehicles 
Figure 3 : Throughput vs. number of vehicles. 
0 20 40 60 80 100 
0,50 
0,45 
0,40 
0,35 
0,30 
0,25 
0,20 
MOVE 
CityMob 
Average End-to-End Delay (sec) 
Number of vehicles 
Figure 4 : End-to-end delay vs. number of vehicles.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
180 
0 20 40 60 80 100 
110 
100 
90 
80 
70 
60 
50 
40 
MOVE 
CityMob 
Overhead 
Number of vehicles 
Figure 5 : overhead vs. number of vehicles. 
Figures 3, 4 and 5 illustrate the performance (i.e., Throughput ratio, end-to-end delay and 
overhead) of AODV with the two mobility models chosen.The Throughput (in figure 3) of 
AODV when using MOVE mobility model is higher and more stable than when using CityMob 
model.The trace 4 shows that AODV causes a low stable delay with MOVE because the roads are 
more defined compared to CityMob. 
Figures 5 illustrate the overhead AODV required with each of the chosen mobility models. The 
vehicles moving with CityMob have a higher overhead, as a result this model requires a higher 
amount of overhead compared to MOVE.These results confirm the suitability of MOVE tool for 
simulating VANET. 
4.CONCLUSIONS 
In this paper, we compared the performance of two mobility models for VANET Simulation i.e. 
MOVE (MObility model generator for VEhicular networks) and CityMob (City 
Mobility).Simulation analysis using realistic mobility model for VANET environment show that 
the performance of the protocol is greatly affected by the mobility model. The performance of an 
ad hoc network protocol can vary significantly with different mobility models then, the choice of 
mobility model in simulating VANET is very important.The mobility models for VANET should 
be most closely match the expected real-world scenario. In fact, the realistic scenarios can aid the 
development of the routing protocols significantly. 
As future work we plan to compare other mobility models discussed above. Results obtained from 
these studies would certainly facilitate in meeting the challenges associated with future 
development and evaluation of suitable routing protocols in vehicular networks.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
181 
REFERENCES 
[1] M. Sanchez and P. Manzoni. “A java-based ad hoc networks simulator. In Proc. of the SCS 
Western Multiconference Web-based Simulation Track, Jan. 1999 
[2] A.K. Saha and D.B. Johnson, “Modeling mobility for vehicular ad hoc networks,” in ACM 
Workshop on Vehicular Ad Hoc Networks (VANET 2004), Philadelphia PA, October 2004. 
[3] U.S. Census Bureau - Topologically Integrated Geographic Encoding and Referencing (TIGER) 
system, http://www.census.gov/geo/www/tiger. 
[4] E. Huang,W. Hu, J. Crowcroft, and I.Wassell, “Towards commercial mobile ad hoc network 
applications: A radio dispatch system,” in Sixth ACM International Symposium on Mobile Ad 
Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, Illinois, May 2005 
[5] D.R. Choffnes and F.E. Bustamante, “An integrated mobility and traffic model for vehicular 
wireless networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2005), 
Cologne, Germany, September 2005. 
[6] J. Haerri, M. Fiore, F. Filali, and C. Bonnet, “Vanetmobisim: generating realistic mobility 
patterns for vanets,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los 
Angeles, California, September 2006. 
[7] VanetMobiSim.http://en.pudn.com/downloads160/sourcecode/app/detail720214_en.html 
[8] A. Mahajan, N. Potnis, K. Gopalan, and A.Wang, “Evaluation of mobility models for vehicular 
ad-hoc network simulations,” in IEEE International Workshop on Next Generation Wireless 
Networks (WoNGeN 2006), Bangalore, India, December 2006. 
[9] Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, “CityMob: a 
mobility model pattern generator for VANETs,” in the ICC 2008 workshop proceedings. 
[10] CityMob’s source code is available at http://www.grc.upv.es/ 
[11] F. Karnadi, Z. Mo, K.-C. Lan, .Rapid Generation of Realistic Mobility Models for VANET., 
Poster Session, 11th Annual International Conference on Mobile Computing and Networking 
(MobiCom 2005), Cologne, Germany, August 2005. 
[12] F. K. Karnadi, Z. H. Mo, and K. c. Lan, “Rapid generation of realistic mobility models for 
vanet,” in IEEE WCNC,2007, pp. 2506–2511. 
[13] Karnadi, F.K.; Zhi Hai Mo; Kun-chan Lan; Sch. of Comput. Sci. & Eng., New South Wales 
Univ., Sydney, NSW, “Rapid Generation of Realistic Mobility Models for VANET”. IEEE 
Xplore 
[14] MOVE http://www.cs.unsw.edu.au/klan/move/. 
[15] SUMO Simulation of Urban MObility. http://sumo.sourceforge.net/. 
[16] A. Uchiyama, .Mobile Ad-hoc Network Simulator based on Realistic Behavior Model, 6th ACM 
International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), 
Urbana Champaign, IL, USA, May 2005. 
[17] Deutsches Zentrum f¨ur Luft-und Raumfahrt e.V. (DLR). Sumo– simulation of urban mobility. 
http://sumo.sourceforge.net/. 
[18] The Network Simulator ns 2. http://www.isi.edu/nsnam/ns/index.html. 
[19] QualNet Network Simulator. http://www.scalable-networks.com/.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
[20] Perkins, C. and Royer, E. (1999). Ad hoc On Demand Distance Vector (AODV) Routing. In 
Proceedings 2nd Workshop on Mobile Computing Systems and Applications. New Orlean s, LA, 
USA: IEEE, February 1999, pp. 90–100. 
[21] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network 
routing protocols. In Proceedings of the ACM/IEEE International Conference on Mobile 
Computing and Networking (MOBICOM), pages 85–97, 1998. 
[22] B.Boukenadil, M.Feham, “Comparison between DSR, AODV and DSDV in VANET using 
CityMob”, in Proc. the 1th International Conference on New Technologies and Communication 
(ICNTC’2012), Chlef, Algeria, 05-06 December 2012. 
[23]P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. Routing protocols for 
mobile ad-hoc networks - a comparative performance analysis. In Proceedings of the ACM/IEEE 
International Conference on Mobile Computing and Networking (MOBICOM), pages 195–206, 
1999. 
[24]The Rice University Monarch Project. Monarch extensions to the ns simulator. URL: 
182 
http://www.monarch.cs.rice.edu/. Page accessed on May 30th, 2002

More Related Content

What's hot

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal OneRobot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
ijcsit
 
Study of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanetStudy of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanet
Alexander Decker
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
Milad Kiaee
 
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine LearningIRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET Journal
 
Scenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous DrivingScenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous Driving
Yu Huang
 
Traffic assignment
Traffic assignmentTraffic assignment
Traffic assignment
MNIT,JAIPUR
 
Driving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIIIDriving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIII
Yu Huang
 
Traffic model
Traffic modelTraffic model
Traffic model
Joseph Reiter
 
Modal split analysis
Modal split analysis Modal split analysis
Modal split analysis
ashahit
 
Driving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIIIDriving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIII
Yu Huang
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
IOSR Journals
 
Adamu muhammad isah
Adamu muhammad isahAdamu muhammad isah
Adamu muhammad isah
AdamuMuhammadIsah
 
Urban transportation system - methods of route assignment
Urban transportation system - methods of route assignmentUrban transportation system - methods of route assignment
Urban transportation system - methods of route assignment
Student
 
Fb4301931934
Fb4301931934Fb4301931934
Fb4301931934
IJERA Editor
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
eSAT Journals
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
eSAT Publishing House
 
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
srinivasanece7
 

What's hot (19)

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal OneRobot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
 
Study of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanetStudy of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanet
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
 
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine LearningIRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
 
Scenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous DrivingScenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous Driving
 
Traffic assignment
Traffic assignmentTraffic assignment
Traffic assignment
 
Driving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIIIDriving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIII
 
Traffic model
Traffic modelTraffic model
Traffic model
 
Modal split analysis
Modal split analysis Modal split analysis
Modal split analysis
 
Driving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIIIDriving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIII
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
 
Adamu muhammad isah
Adamu muhammad isahAdamu muhammad isah
Adamu muhammad isah
 
Urban transportation system - methods of route assignment
Urban transportation system - methods of route assignmentUrban transportation system - methods of route assignment
Urban transportation system - methods of route assignment
 
Fb4301931934
Fb4301931934Fb4301931934
Fb4301931934
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
 
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
 

Viewers also liked

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
IJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
IJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
IJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
IJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
IJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
IJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
IJCNCJournal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
IJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
IJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
IJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
IJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
IJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
IJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
IJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
IJCNCJournal
 

Viewers also liked (19)

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Similar to IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION

The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...
ijasuc
 
Modeling and simulation of vehicular networks
Modeling and simulation of vehicular networksModeling and simulation of vehicular networks
Modeling and simulation of vehicular networks
DaisyWatson5
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobility
IAEME Publication
 
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdfHighway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
duytan35
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined ModesA Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
Allison Koehn
 
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
iosrjce
 
E011113336
E011113336E011113336
E011113336
IOSR Journals
 
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIESMEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
cscpconf
 
Vanet report 2020 2nd semester
Vanet report 2020 2nd semesterVanet report 2020 2nd semester
Vanet report 2020 2nd semester
SudarshiniAuradkar
 
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
IJSRD
 
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
IJORCS
 
Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
IAEME Publication
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
ijngnjournal
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
CSCJournals
 
Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...
csandit
 
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptxREVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
NafisaBashir1
 
H046405864
H046405864H046405864
H046405864
IOSR-JEN
 
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCEREVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
AnikohAbraham
 

Similar to IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION (20)

The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...
 
Modeling and simulation of vehicular networks
Modeling and simulation of vehicular networksModeling and simulation of vehicular networks
Modeling and simulation of vehicular networks
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobility
 
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdfHighway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined ModesA Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
 
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
 
E011113336
E011113336E011113336
E011113336
 
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIESMEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
 
Vanet report 2020 2nd semester
Vanet report 2020 2nd semesterVanet report 2020 2nd semester
Vanet report 2020 2nd semester
 
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
 
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...
 
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptxREVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
 
H046405864
H046405864H046405864
H046405864
 
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCEREVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
 

More from IJCNCJournal

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
IJCNCJournal
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
IJCNCJournal
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
IJCNCJournal
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
IJCNCJournal
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 

More from IJCNCJournal (20)

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION Bahidja Boukenadil¹ ¹Department of Telecommunication, Tlemcen University, Tlemcen,Algeria ABSTRACT In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations. In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network. KEYWORDS VANET; Mobility Model; Simulations; Real World; MOVE; SUMO; CityMob; NS-2 etc. 1. INTRODUCTION The mobility is the principal constraint met in the vehicular networks, therefore the performance investigation of VANET network routing require the exact prediction of mobility of nodes forming the network, and this is realized by the good choice of the mobility model. Generally, the traces and the synthetic models [1] are two kinds of mobility patterns used for the simulation of networks .for simulating the complex and large scale networks that require more real world scenarios for a real modeling, the traces are used. But in several situations, these traces are created with difficulty, particularly for the networks of high mobility like the vehicular networks. In this case, the mobility of nodes (i.e., the vehicles nodes) are modeled with the synthetic patterns, these models try to really present the behavior of these environments of vehicles. A variety of synthetic mobility models for vehicular networks are discussed in Literature, some of them are presented in Section II. Section III illustrate that a mobility model has a large effect on the performance evaluation in simulation of VANET network. Finally, Section IV presents some concluding remarks. DOI : 10.5121/ijcnc.2014.6513 175
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 176 2. MOBILITY MODEL FOR VEHICULAR NETWORKS Many models of mobility can be used to generate the movement of the vehicles instead of the traces which are difficult to create in the VANET environments . However, the behavior of these networks is very complex; the drivers must react to the high change of the road conditions like the congestion, traffic jam, works in the roads. The state of the roads in turn depends on the behaviors of the drivers. Thus, the choice of the mobility model affects the relevance and viability of the obtained results. In general, vehicular traffic simulators or mobility models can be classified in two great kinds, the microscopic and macroscopic simulators. The microscopic simulator is interested in the movement of each vehicle taking part in the road traffic. In contrast the macroscopic simulators are interested in all the vehicles forming the networks; it compute road capacity and the distribution of the traffic in the road net, by determining a certain parameters like traffic density (number of vehicles per km per lane) or traffic flow (number of vehicles per hour crossing some points of interest, usually an areas with a great density of nodes) . The literature present a large variety of mobility models for VANET networks. The work of Saha and Johnson [2] model vehicular traffic in real road topologies of the maps of USA available from TIGER (Topologically Integrated Geographic Encoding) [3] database. The mobility of nodes is random.Vehicles compute the shortest path to get their destination over the graph by weighting the cost of displacement on each road on its speed limit and the traffic jam. Huang et al. [4] studied taxi behavior. In this work, a Manhattan style grid with a uniform block size is modeled. The streets of simulation area are two-way, with one lane in each direction. These lanes constrain vehicle movements. A set of parameters characterize the vehicle behavior which are preferred velocity ,maximum acceleration and deceleration, a velocity variation associated with the preferred speed at steady state and a list of preferred destinations, i.e., the taxi stands. . The taxis assigne randomly one of three preferred speeds. In the work of Choffnes et al. [5] , an integrated mobility and traffic model is conceived, named STRAW.For modeling real traffic conditions ,this model incorporates a simple car-following model with traffic control. The road map of this pattern is constructed by street plans with one lane in each direction .The vehicles move in these lanes according to a random street placement model.Each vehicle enters the map is placed behind the existing one. In [6] Haerri et al. proposed a vehicular mobility simulator for VANET networks, called VanetMobiSim [7] .The speed of vehicles for this model is determined by the use of the Intelligent Driver Model (IDM). Three different models were presented in the work of Mahajan et al. [8]: Stop Sign Model (SSM), Traffic Light Model (TLM) and Probabilistic Traffic Sign Model (PTSM).In this models All roads are two-way, with one lane in each direction for the SSM and PTSM, whereas TLM model streets with multiple lanes. An algorithm is employed to reproduce stop signs for each model. Martinez et al [9] present CityMob [10] .This mobility model generate different mobility patterns in VANETs, Simple Model (SM), Manhattan Model (MM) and Downtown Model (DM).Each model has its own characteristics,For the SM,the plan of the road is very simple, neither semaphores nor direction changes.In constract, MM and DM simulates semaphores at crossing
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 and random positions in zones with different vehicle density. CityMob allows to simulate damaged cars and tries to prevent congestions. Figure 1 present the interface of this model. Karnadi et al. [12, 13, 14] develop a tool MOVE (MObility model generator for VEhicular networks) [11] .This model provide facility for the users to generate real world scénarios in VANET environments. This model contains two editors, one for road map and the second for vehicle movement .The user can manually and automatically create the road topology or import it from existing real world maps such as Google maps. For vehicle movement, the pattern can be manually created, generated automatically or specified based on a bus time table to simulate the movements of public transportations. Figure2 shows the interface of this model. 177 Figure 1. Interface of CityMob
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 178 Figure 2: Mobility Model Generator 3. INFLUENCE OF MOBILITY MODEL IN VANET SIMULATIONS . The simulation results are greatly affected by the mobility model selected .The results presented in this section illustrate the importance of choosing a suitable mobility model for performances evaluation of routing protocols in VANET network. We use ns-2 [34] to compare the performance of the CityMob Model and the MOVE tool via a simulation.The routing of packets is accomplished with the Ad hoc On Demand Distance Vector) (AODV) [20]. We have chosen the parameters for both mobility models in a manner to simulate the same path as possible. AODV (Ad hoc On Demand Distance Vector) [1] is a reactive protocol that does route discovery when needed by a node. The route discovery process is initiated only when a source node has data traffic to send to a destination node, that makes AODV a truly On- Demand routing protocol. In our simulations, we chose AODV since it behaves well in several of the performance evaluations of the routing protocols (e.g. [21, 22, 23]).
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 The ns-2 code used in our simulations of AODV was obtained from [24]. Each simulation run lasted for 300 seconds with a uniform block size of 500 x 500 meters; the maximum speed of vehicles is of 40 m/s. The number of vehicles nodes from 15 to 100. We chose the traffic sources at a constant rate CBR (Constant Bit Rate). Traffic between nodes is generated using a traffic generator which is characterized by the following parameters: Data packets Size is 512 bytes, Interval between packets is 0.25s , maximum of packets transmitted 1000. All nodes use IEEE 802.11 MAC operating at 2Mbps. The propagation model employed in the simulation is TwoRayGround reflextion. In our comparison of the two mobility models, we consider the following performance metrics obtained from the AODV protocol: throughput, end-to-end delay and protocol overhead. 179 0 20 40 60 80 100 0,023 0,022 0,021 0,020 0,019 0,018 0,017 0,016 0,015 0,014 0,013 0,012 0,011 0,010 0,009 Move CityMob Throughput (bits/s) Number of vehicles Figure 3 : Throughput vs. number of vehicles. 0 20 40 60 80 100 0,50 0,45 0,40 0,35 0,30 0,25 0,20 MOVE CityMob Average End-to-End Delay (sec) Number of vehicles Figure 4 : End-to-end delay vs. number of vehicles.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 180 0 20 40 60 80 100 110 100 90 80 70 60 50 40 MOVE CityMob Overhead Number of vehicles Figure 5 : overhead vs. number of vehicles. Figures 3, 4 and 5 illustrate the performance (i.e., Throughput ratio, end-to-end delay and overhead) of AODV with the two mobility models chosen.The Throughput (in figure 3) of AODV when using MOVE mobility model is higher and more stable than when using CityMob model.The trace 4 shows that AODV causes a low stable delay with MOVE because the roads are more defined compared to CityMob. Figures 5 illustrate the overhead AODV required with each of the chosen mobility models. The vehicles moving with CityMob have a higher overhead, as a result this model requires a higher amount of overhead compared to MOVE.These results confirm the suitability of MOVE tool for simulating VANET. 4.CONCLUSIONS In this paper, we compared the performance of two mobility models for VANET Simulation i.e. MOVE (MObility model generator for VEhicular networks) and CityMob (City Mobility).Simulation analysis using realistic mobility model for VANET environment show that the performance of the protocol is greatly affected by the mobility model. The performance of an ad hoc network protocol can vary significantly with different mobility models then, the choice of mobility model in simulating VANET is very important.The mobility models for VANET should be most closely match the expected real-world scenario. In fact, the realistic scenarios can aid the development of the routing protocols significantly. As future work we plan to compare other mobility models discussed above. Results obtained from these studies would certainly facilitate in meeting the challenges associated with future development and evaluation of suitable routing protocols in vehicular networks.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 181 REFERENCES [1] M. Sanchez and P. Manzoni. “A java-based ad hoc networks simulator. In Proc. of the SCS Western Multiconference Web-based Simulation Track, Jan. 1999 [2] A.K. Saha and D.B. Johnson, “Modeling mobility for vehicular ad hoc networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004), Philadelphia PA, October 2004. [3] U.S. Census Bureau - Topologically Integrated Geographic Encoding and Referencing (TIGER) system, http://www.census.gov/geo/www/tiger. [4] E. Huang,W. Hu, J. Crowcroft, and I.Wassell, “Towards commercial mobile ad hoc network applications: A radio dispatch system,” in Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, Illinois, May 2005 [5] D.R. Choffnes and F.E. Bustamante, “An integrated mobility and traffic model for vehicular wireless networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2005), Cologne, Germany, September 2005. [6] J. Haerri, M. Fiore, F. Filali, and C. Bonnet, “Vanetmobisim: generating realistic mobility patterns for vanets,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los Angeles, California, September 2006. [7] VanetMobiSim.http://en.pudn.com/downloads160/sourcecode/app/detail720214_en.html [8] A. Mahajan, N. Potnis, K. Gopalan, and A.Wang, “Evaluation of mobility models for vehicular ad-hoc network simulations,” in IEEE International Workshop on Next Generation Wireless Networks (WoNGeN 2006), Bangalore, India, December 2006. [9] Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, “CityMob: a mobility model pattern generator for VANETs,” in the ICC 2008 workshop proceedings. [10] CityMob’s source code is available at http://www.grc.upv.es/ [11] F. Karnadi, Z. Mo, K.-C. Lan, .Rapid Generation of Realistic Mobility Models for VANET., Poster Session, 11th Annual International Conference on Mobile Computing and Networking (MobiCom 2005), Cologne, Germany, August 2005. [12] F. K. Karnadi, Z. H. Mo, and K. c. Lan, “Rapid generation of realistic mobility models for vanet,” in IEEE WCNC,2007, pp. 2506–2511. [13] Karnadi, F.K.; Zhi Hai Mo; Kun-chan Lan; Sch. of Comput. Sci. & Eng., New South Wales Univ., Sydney, NSW, “Rapid Generation of Realistic Mobility Models for VANET”. IEEE Xplore [14] MOVE http://www.cs.unsw.edu.au/klan/move/. [15] SUMO Simulation of Urban MObility. http://sumo.sourceforge.net/. [16] A. Uchiyama, .Mobile Ad-hoc Network Simulator based on Realistic Behavior Model, 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana Champaign, IL, USA, May 2005. [17] Deutsches Zentrum f¨ur Luft-und Raumfahrt e.V. (DLR). Sumo– simulation of urban mobility. http://sumo.sourceforge.net/. [18] The Network Simulator ns 2. http://www.isi.edu/nsnam/ns/index.html. [19] QualNet Network Simulator. http://www.scalable-networks.com/.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 [20] Perkins, C. and Royer, E. (1999). Ad hoc On Demand Distance Vector (AODV) Routing. In Proceedings 2nd Workshop on Mobile Computing Systems and Applications. New Orlean s, LA, USA: IEEE, February 1999, pp. 90–100. [21] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network routing protocols. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 85–97, 1998. [22] B.Boukenadil, M.Feham, “Comparison between DSR, AODV and DSDV in VANET using CityMob”, in Proc. the 1th International Conference on New Technologies and Communication (ICNTC’2012), Chlef, Algeria, 05-06 December 2012. [23]P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. Routing protocols for mobile ad-hoc networks - a comparative performance analysis. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 195–206, 1999. [24]The Rice University Monarch Project. Monarch extensions to the ns simulator. URL: 182 http://www.monarch.cs.rice.edu/. Page accessed on May 30th, 2002