This document summarizes a dissertation defense on multi-hop ad hoc networking and applications like MANET and VANET. The dissertation studied challenges in general multi-hop networks, proposed a new vehicular network architecture using mobility prediction, and conducted experiments comparing real networks to simulations. It explored routing protocols, cross-layer interactions, and applications like streaming video over multi-hop wireless networks. Future work is outlined on system design, algorithm analysis, and wireless resource scheduling for vehicular networks.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication ProjectsChinnasamy C
Hi,
Pantech ProEd Pvt Ltd, Provides Projects guidance for ME, M.Tech, Msc &MCA and all Electrical science Students......
Related to : final year project, Live project, Real time projects, Sensor Networks, Ad Hoc Network, Radio Networks, CRN, Multi Hop Network, etc....
Network Simulator – 2(NS2&NS3):
MANET Security
VANET Security
Wimax Security
Wireless Mesh network
Wireless Sensor Network
Wireless Network security
Cognitive wireless network
Wi-Fi based projects
cognitive radio project
Mobile network project
Contact:
Pantech ProEd Pvt Ltd.,
Ameerpet, Hyderabad-16
Ph:040-40077960/8897565645.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication ProjectsChinnasamy C
Hi,
Pantech ProEd Pvt Ltd, Provides Projects guidance for ME, M.Tech, Msc &MCA and all Electrical science Students......
Related to : final year project, Live project, Real time projects, Sensor Networks, Ad Hoc Network, Radio Networks, CRN, Multi Hop Network, etc....
Network Simulator – 2(NS2&NS3):
MANET Security
VANET Security
Wimax Security
Wireless Mesh network
Wireless Sensor Network
Wireless Network security
Cognitive wireless network
Wi-Fi based projects
cognitive radio project
Mobile network project
Contact:
Pantech ProEd Pvt Ltd.,
Ameerpet, Hyderabad-16
Ph:040-40077960/8897565645.
This ppt gives you a brief knowledge on protocols used in VANETs using real time vehicular traffic information. These have overruled the the existing MANET protocols. It also give you a description regarding forwarding optimisation
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
VANET is a branch of MANETS, where each vehicle is a node, and a wireless router will run. The vehicles are similar to each other will interact with a wide range of nodes or vehicles and establish a network. VANETs provide us with the infrastructure to build new solutions for improving safety and comfort for drivers and passengers. There are several routing protocols proposed and evaluated for improving VANET's performance. The simulator is preferred over external experience because it is easy, simple, and inexpensive. In this paper, we choose AODV protocol, DSDV protocol, and DSR protocol with five different nodes density. For each protocol, as regards specific parameters like (throughput, packet delivery ratio, and end- to- end delay). On simulators that allow users to build real-time navigation models of simulations using VANET. Tools (SUMO, MOVE, and NS-2) were used for this paper, then graphs were plotted for evaluation using Trace-graph. The results showed the DSR is much higher than AODV and DSDV, In terms of throughput. While DSDV is the best choice because of the low average end to end delay. From the above, we conclude that each strategy has its own negative and positive aspects that make it ideally suited to a particular scenario than other scenarios.
VANET is a decentralized network that allows the vehicles to communicate with each other for providingsafety warning, traffic management and driver assistance systems. Vehicular IP in Wireless Access in Vehicular Environments (VIP-WAVE)has characterized the IP configuration for extended andnon-extended IP services, and amobilitymanagement scheme supportedby Proxy Mobile IPv6 over WAVE.As the vehicular networks are formed even in remote areas with inadequate power source, the units have power constraints which are overcome by power control in the proposed system .The objective of the paper is to improve the quality of the network by providing internet accesswith transmit power control along which the distance between the RSU and on-board vehicular units(OBU)is determined i.e., power consumption is reduced when at least distance. Hence the RSU provides Distance Cautious Internet Protocol (DCIP) to the OBU for internet access.This paper analyses the WAVE standard and its support of IP based applications, and proposesDistance Cautious Internet Protocol in WAVE(DCIP-WAVE).
LTE is required to support communication with terminals moving at speeds of up to 350 km/h, or even up to 500 km/h depending on the frequency band. The primary scenario for operation at such high speeds is usage on high-speed trains – a scenario which is increasing in importance across the world as the number of high-speed rail lines increases and train operators aim to offer an attractive working environment to their passengers. These requirements mean that handover between cells has to be possible without interruption – in other words, with imperceptible delay and packet loss for voice calls, and with reliable transmission for data services.
This ppt gives you a brief knowledge on protocols used in VANETs using real time vehicular traffic information. These have overruled the the existing MANET protocols. It also give you a description regarding forwarding optimisation
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
VANET is a branch of MANETS, where each vehicle is a node, and a wireless router will run. The vehicles are similar to each other will interact with a wide range of nodes or vehicles and establish a network. VANETs provide us with the infrastructure to build new solutions for improving safety and comfort for drivers and passengers. There are several routing protocols proposed and evaluated for improving VANET's performance. The simulator is preferred over external experience because it is easy, simple, and inexpensive. In this paper, we choose AODV protocol, DSDV protocol, and DSR protocol with five different nodes density. For each protocol, as regards specific parameters like (throughput, packet delivery ratio, and end- to- end delay). On simulators that allow users to build real-time navigation models of simulations using VANET. Tools (SUMO, MOVE, and NS-2) were used for this paper, then graphs were plotted for evaluation using Trace-graph. The results showed the DSR is much higher than AODV and DSDV, In terms of throughput. While DSDV is the best choice because of the low average end to end delay. From the above, we conclude that each strategy has its own negative and positive aspects that make it ideally suited to a particular scenario than other scenarios.
VANET is a decentralized network that allows the vehicles to communicate with each other for providingsafety warning, traffic management and driver assistance systems. Vehicular IP in Wireless Access in Vehicular Environments (VIP-WAVE)has characterized the IP configuration for extended andnon-extended IP services, and amobilitymanagement scheme supportedby Proxy Mobile IPv6 over WAVE.As the vehicular networks are formed even in remote areas with inadequate power source, the units have power constraints which are overcome by power control in the proposed system .The objective of the paper is to improve the quality of the network by providing internet accesswith transmit power control along which the distance between the RSU and on-board vehicular units(OBU)is determined i.e., power consumption is reduced when at least distance. Hence the RSU provides Distance Cautious Internet Protocol (DCIP) to the OBU for internet access.This paper analyses the WAVE standard and its support of IP based applications, and proposesDistance Cautious Internet Protocol in WAVE(DCIP-WAVE).
LTE is required to support communication with terminals moving at speeds of up to 350 km/h, or even up to 500 km/h depending on the frequency band. The primary scenario for operation at such high speeds is usage on high-speed trains – a scenario which is increasing in importance across the world as the number of high-speed rail lines increases and train operators aim to offer an attractive working environment to their passengers. These requirements mean that handover between cells has to be possible without interruption – in other words, with imperceptible delay and packet loss for voice calls, and with reliable transmission for data services.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
ASON – Automatically Switched Optical Networks
Dynamically switch the light path
Enabler for many applications
Controlled by UNI and NNI – Allow applications to set the light path
Allow to add the intelligence into the optical core
ASON:
The Automatic Switched Optical Network (ASON) is both a framework and a technology capability.
As a framework that describes a control and management architecture for an automatic switched optical transport network.
As a technology, it refers to routing and signalling protocols applied to an optical network which enable dynamic path setup.
Recently changed names to Automatic Switched Transport Network (G.ASTN)
Significant amount of research and development has been made in the field of core network and it operates in hundreds Gigabits per second (Gbps) speed currently. But on seeing the growth in bandwidth demand in the access network which is exploding day by day, the only promising solution is to upgrade the access network. So it is essential to have an efficient access network that can operate at high functional speeds to support differentiated services like Video on Demand (VOD), High Definition TV, video conferencing, Telemedicine, Uploading and Downloading jumbo files. Apart from these access network always been sensitive to cost and geographical region of coverage it can handle. So internet service providers will have to make a tradeoff between capital expenditure (CAPEX), operational expenditure (OPEX) and geographical region of coverage.
There are mainly five types of access network APON, BPON, GPON, EPON and 10G-EPON. APON provides 622 Mbps of downstream bandwidth and 155 Mbps of upstream. GPON was the advanced version of the BPON and support at a rate of 2.444 Mbps and 1.42 Mbps in downstream and upstream data rate. EPON has symmetry of 1Gbps of upstream and downstream rates. EPON is totally data-centric based on voice, video and data. 10G-EPON is capable of providing broadband access to large number of customers in metropolitan area. Due to the advancement in the optical technology, 10G-EPON (IEEE 803.2av) provides 1Gbps and 10Gbps upstream and downstream data rate with distance more than 20 km.
At the recent ISR conference in London, Koen Willems, Product Marketing Manager at Newtec, presented his view on the challenges and solutions the satcom market has to offer for some government and defense applications: UAS, Manned Aircrafts and National Security,
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
Entendre els fonaments de la tecnologia i conèixer com ens impactarà el seu desplegament. Vam descobrir les diferents aplicacions que tindrà el 5G en el nostre dia a dia i el valor que aportarà
Evaluation of Virtualization Models for Optical Connectivity Service ProvidersADVA
Our Advanced Technology team was invited to present these slides at the Optical Network Design and Modeling (ONDM) conference in Stockholm, Sweden, along with a representative from the Technical University in Munich. Check out what they had to say about virtualization models
Similar to A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET and VANET (20)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET and VANET
1. A Comprehensive Study on
Multi-hop Ad hoc Networking and Applications:
MANET and VANET
Joarder Mohammad Mustafa Kamal
M.Res. Dissertation Defence
Staffordshire University
September 16, 2010
2. Introduction
• Multi-hopping with relay nodes • Decentralised coordination
• Network resource sharing • Infrastructure less
01/08/2011 2
3. Research Challenges
• General-purpose multi-hop ad hoc network
• Scalability and Interoperability
• Mobility and Internet – Applications and Scenarios
• Transport layer protocols – TCP/UDP enhancements
• Wireless PHY and MAC enhancements
• Suitable routing protocols
• Cross-layer protocol interactions
• Power and bandwidth consumption
Realism of reality
01/08/2011 3
4. Aim and Objectives
• Aim
• Real-life implementation and experimentations of Multi-hop
Ad hoc Network and its variations
• Develop a new ITS/WAVE network architecture based on
mobility prediction utilising the vehicular ad hoc networking
• Objectives
• Real-life Experimentations Vs. Simulation – Real MANET
• Propose guidelines for realistic simulation and analysis
• Explore and in-detail analysis of VANET/ITS/WAVE architecture
and realistic simulations – mobility models, routing, etc.
• Integration of VANET/WAVE and Mobility Data Mining – case
studies, simulations, mathematical analysis
01/08/2011 4
5. Multi-hop Ad hoc Networks
B
• Mobile Ad hoc Network
169.254.216.93
A D (MANET) – truly dynamic
169.254.172.66 C 169.254.93.156
169.254.74.133
OBU
OBU
• Vehicular Ad hoc OBU
Network (VANET) –
OBU
fixed/semi-fixed OBU OBU
patterns OBU
OBU
OBU (On-board Unit), RSU (Road-side Unit)
01/08/2011 5
7. Real Experiment Vs. Simulation: Cases
Case Scenario Source Network Protocol Used Experiment/
Destination Experiment Simulation Simulation Time
in sec.
Case-1 Scenario-1 A-D ICMP CBR over UDP 300
Case-2 Scenario-2 A-D ICMP CBR over UDP 120
Case-3 Scenario-3 A-D ICMP CBR over UDP 120
Case-4 Scenario-4 A-D ICMP CBR over UDP 120
Case-5 Scenario-1 A-B, C, D HTTP over TCP FTP over TCP 180
Case-6 Scenario-1 A-D HTTP over TCP FTP over TCP 300
• Open field experiment using Olsrd in IEEE 802.11g network
• Simulation – ns-2/UM-OLSR
• 100 ICMP/CBR packets of 1500 bytes size, bidirectional
• Performance metrics – throughput, PDR, E2E delay, etc.
• Shadowing propagation with path-loss; β=2.3 and σdB=6.0 dB
01/08/2011 7
14. VANET Simulation – Non-rush Scenarios
• Street Map of Washington, DC, USA (TIGER/Line 2006)
• VanetMobiSim/ns-2, urban scenario, 20/210 vehicles, TCP/UDP
• IEEE 802.11a Vs. 802.11p with AODV/DSR; then AODV Vs. OLSR
01/08/2011 14
15. IEEE 802.11a Vs. 802.11p with AODV, DSR
01/08/2011
• 20 vehicles in a non-rush scenarios 15
16. AODV Vs. OLSR in IEEE 802.11p draft
• 5 different traffic
patterns are used
• Non-rush hour scenario
with 210 vehicles
01/08/2011 16
17. WAVE/ITS Simulation with NCTUns-6.0
• UK M42 Motorway J4, Active Traffic Management (ATM)
• No. of Vehicles: 1/2/4
• Agent Controlled 802.11p cars
• Ricean fading (β=2.8 and σdB=6.0dB)
01/08/2011 17
18. ITS Scenarios in IEEE 1609/WAVE
• Data Rate: 3Mbps
• Simulation: 115, 60 sec
• 1500 bytes UDP data
01/08/2011 18
19. Mobility Prediction-based ITS Network
Vehicular Information
Management (VIM) Systems
Mobility Data Mining
Vehicle’s
Current Mobility Mobile Internet
Information Office/Home
Networks
On-demand service After Market Solutions
from roadside service Providers
providers Predictive Mobility
OBU Information Safe Distance Notification
Adaptive Cruise Control
RSU
Onboard Navigation
RSU
Network Packet
OBU
Routing and
Forwarding Decision
Blind Spot Notifications
Lane Departure Warning
Cooperative Forward Collision Warning Speed Limit Warning RSU – Roadside Unit
Pedestrian Crossing Notification OBU – Onboard Unit
Emergency Road Work Warning
20. POGR – Specialise Case Scenarios
Scenario-1 Scenario-2
Greedy Packet Forwarding
based on predictive mobility
information
Opportunistic
DTN is an
Routing is required
emerging
while OBUs are out
technology for
of the direct
future
communication
ubiquitous
range of any RSU
mobile
and need V2V
computing and
communication
communication
Scenario-3
01/08/2011 20
21. POGR: ns-2 Model for Specific Case Analysis
Centralised VIM and Prediction-based Opportunistic Greedy Routing
W(0) (POGR)
DM Engine
- Mobility Data Mining
- Mobility Prediction
RSU Gateway - Mobility Pattern Analysis
W(1)
POGR Case Analysis
• Greedy Forwarding
RSU(1) RSU(2)
• Opportunistic Routing
• Delay Tolerant Networking (DTN)
Car-C
Car-B
Car-D
Car-A
22. POGR Scenarios: AODV Vs. OLSR
ns-2 Simulation Model
• IEEE 802.11p MAC and PHY
• 5.8GHz Band with 20MHz channel
• 3Mbps data rate
• Mobile IP enabled OBU
01/08/2011 22
23. POGR – Mathematical Modelling
Time Space
NIP
ϬTi Time, t1 Time, t2 Time, t1 Time, t2
Time, t1
S I D
δt
I D
ϕ(distTSI, distGSI)δt
distTSI
• The value of time required to receive a data packet from node S to D through intermediate
node I for ith time over a time period [t1, t2] can be written as,
• ϕ(X, Y)δt is the cumulative change function of variable X and Y over a time of δt
• For nth time the above equation can be written as below,
• Number of time intervals required to know the predictive trajectory may be calculated as
• GLU is the frequency in time required for the on-board positioning system to update location
01/08/2011 23
24. Conclusion
• Summary of Contributions:
• Multi-hop ad hoc networking – real-life experimentations
provide appropriate guidelines and lessons learned to design
realistic simulation models
• VANET/WAVE – Mobility Data Mining Net. Architecture –
provide a new approach in ITS utilising prediction on vehicular
mobility - POGR routing algorithm
• Applications – Streaming audio/video over multi-hop wireless
mesh network (wireless video surveillance system), Internet
resource sharing and intelligent on-board navigation and
communication medium for vehicles
01/08/2011 24
25. Future Works
System design and basic building block for software architecture Roadside Units
Correctness and complexity analysis of POGR algorithm (RSU)
On-board Unit Router V2V and I2V
(OBU) Planner High Rate
Cooperative Communication
Location and Information
V2V
Mobility Exchange
Medium Rate
Information Multi-hop Communication
Wireless Vehicular Ad hoc I2V
On-board Communication Networking Low Rate
Sensors Interface Communication
Vehicle
Control
Mechanics Wireless channel
On-board Visualisation allocation and
for Information, application request
Warnings and scheduling based on
Notifications timing priority
26. Selective Reference
• Marco Conti, JC, Andrea Passarella (ed.) 2007, Multi-hop Ad Hoc Networks from
Theory to Reality, Nova Science Publishers, Inc., New York.
• C. Siva Ram Murthy, BSM 2004, Ad Hoc Wireless Networks Architectures and
Protocols, Prentice Hall.
• Hannes Hartenstein, KPL (ed.) 2010, VANET Vehicular Applicaitons and Inter-
Networking Technologies, John Wiley and Sons, Ltd, Publication.
• Stephan Olariu, MCW (ed.) 2009, Vehicular Networks From Theory to Practice, CRC
Press.
• Mobility, Data Mining and Privacy - Geographic Knowledge Discovery 2008,
Springer.
01/08/2011 26
27. Research Team
Joarder Dr. Mohammad Dr. Alison L Prof. Hongnian Yu,
Mohammad Shahidul Hasan, Carrington, Third Supervisor
Mustafa Kamal, First Supervisor Second Supervisor
Research Student
01/08/2011 27