SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 20
Back-Bone Assisted HOP Greedy Routing for VANET
Naresh Kumar1
D. Asha2
Dr. V. S. K. Reddy3
2
Assistant Professor 3
Principle
1,2,3
Department of Electronics and Communication Engineering
1,2,3
MRCET, Secunderabad, Telangana, India
Abstract— Using advanced wireless local area network
technologies, vehicular ad hoc networks (VANETs) have
become viable and valuable for their wide variety of novel
applications, such as road safety, multimedia content
sharing, commerce on wheels, etc., currently, geographic
routing protocols are widely adopted for VANETs as they
do not require route construction and route maintenance
phases. Again, with connectivity awareness, they perform
well in terms of reliable delivery. Further, in the case of
sparse and void regions, frequent use of the recovery
strategy elevates hop count. Some geographic routing
protocols adopt the minimum weighted algorithm based on
distance or connectivity to select intermediate intersections.
However, the shortest path or the path with higher
connectivity may include numerous intermediate
intersections. As a result, these protocols yield routing paths
with higher hop count. In this paper, we propose a hop
greedy routing scheme that yields a routing path with the
minimum number of intermediate intersection nodes while
taking connectivity into consideration. Moreover, we
introduce back-bone nodes that play a key role in providing
connectivity status around an intersection. Apart from this,
by tracking the movement of source as well as destination,
the back-bone nodes enable a packet to be forwarded in the
changed direction. Simulation results signify the benefits of
the proposed routing strategy in terms of high packet
delivery ratio and shorter end-to-end delay.
Key words: Greedy Routing, VANET, Back-Bone.
I. INTRODUCTION
Ad hoc networks also called infrastructure less networks are
complex distributed systems consist of wireless links
between the nodes and each node also works as a router to
forwards the data on behalf of other nodes. The nodes are
free to join or left the network without any restriction. Thus
the networks have no permanent infrastructure. In ad hoc
networks the nodes can be stationary or mobile. Therefore
one can say that ad hoc networks basically have three forms,
one is static ad hoc networks (SANET), mobile ad hoc
networks (MANET) and the other one is Vehicular ad hoc
networks (VANET).
VANET means vehicular Adhoc network and it is
the technology which is used to move vehicles as joint in
network to make a transportable network. Participating
vehicles become a wireless connection or router through
vanet and it allow the vehicles almost to connect 100 to 300
meters to each other and in order to create a wide range
network, other vehicles are connected to each other so the
mobile internet is made. It is supposed that the first
networks that will incorporate this technology are fire and
police mobiles to interact with one another for security
reasons. Brilliant way to use Vehicular Networking is
defined in VANET or Intelligent Vehicular Ad-Hoc
Networking. Multiple ad-hoc networking technologies
integrated in VANET such as, ZigBee, IRA, WiMAX IEEE,
and Wi-Fi IEEE for convenient, effective, exact, simple and
plain communication within automobiles on active mobility.
Useful procedures like communication of media within
automobiles can be allowed as well process to follow the
automotive automobiles are also favored. Security measures
are defined in vehicles by VANET, flowing communication
within automobiles, edutainment and telemetric.
II. SYSTEM ANALYSIS
A. Existing system
Originally, many routing protocols were solely designed for
mobile ad hoc networks and later enhanced to suit the
VANET scenarios. Number of Existing Routing protocols
like GPSR work well in city environments. However, these
protocols encounter different problems that motivate us to
design a new robust scheme.
1) Demerits
 Intersection Node Probing Problem
 Location Service Requirement Problem
B. Proposed system
In this section, we present a position-based connectivity
aware back-bone-assisted hop greedy routing protocol for
VANET’s city environments. The proposed routing protocol
finds a routing path consisting of the minimum of
intermediate intersections. The protocol is designed
considering certain features in a city map, such as road
segments, intersections, etc. To maintain connectivity at the
intersections and to detect void regions, we rely on a group
of nodes called back-bone nodes.
1) Merits:
 The zone wise partitioning of a city road network is
an important design frame- work for the efficient
functioning of the destination discovery procedure.
 The hop greedy algorithm finds the best possible
path in terms of both hop count and connectivity.
C. Routing Protocols
An ad-hoc routing protocol is a convention, or standard, that
controls how nodes decide which way to route packets
between computing devices in a mobile ad hoc network .In
ad-hoc networks, nodes are not familiar with the topology of
their networks. Instead, they have to discover it. The basic
idea is that a new node may announce its presence and
should listen for announcements broadcast by its neighbors.
Each node learns about nodes nearby and how to reach
them, and may announce that it, too, can reach them.
Note that in a wider sense, ad hoc protocol can also be used
literally, that is, to mean an improvised and often impromptu
protocol established for a specific purpose.
III. SYSTEM DESIGN
People communicate. One way or another, they exchange
some information among themselves all the times. In the
past several decades, many electronic technologies have
been invented to aid this process of exchanging information
in an efficient and creative way. Among these is the creation
Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 21
of fixed telephone networks, the broadcasting of television
and radio, the advent of computers, and the emergence of
wireless sensation. Originally, these technologies existed
and operated independently, serving their very own
purposes. Not until recently that these technological
wonders seem to converge, and it is a well-known fact that a
computer communication network is a result of this
convergence.
System modeling refers to an act of representing an
actual system in a simply way. System modeling is
extremely important in system design and development,
since it gives an idea of how the system would perform if
actually implemented.
Traditionally, there are two modeling approaches:
analytical approach and simulation approach.
Analytical Approach: The general concept of
analytical modeling approach is to first come up with a way
to describe a system mathematically with the help of applied
mathematical tools such as queuing and probability theories,
and then apply numerical methods to gain insight from the
developed mathematical model. When the system is simple
and relatively small, analytical modeling would be
preferable (over simulation). In this case, the model tends to
be mathematically tractable. The numerical solutions to this
model in effect require lightweight computational efforts.
If properly employed, analytical modeling can be
cost-effective and can provide an abstract view of the
components interacting with one another in the system.
However, if many simplifying assumptions on the system
are made during the modeling process, analytical models
may not give an accurate representation of the real system.
Simulation Approach: Simulation is a process of
designing a model of a real system and conducting
experiments with this model for the purpose of
understanding the behavior of the system and/or evaluating
various strategies for the operation of the system. Simulation
is widely-used in system modeling for applications ranging
from engineering research, business analysis, manufacturing
planning, and biological science experimentation, just to
name a few. Compared to analytical modeling, simulation
usually requires less abstraction in the model (i.e., fewer
simplifying assumptions) since almost every possible detail
of the specifications of the system can be put into the
simulation model to best describe the actual system. When
the system is rather large and complex, a straightforward
mathematical formulation may not be feasible. In this case,
the simulation approach is usually preferred to the analytical
approach.
In common with analytical modeling, simulation
modeling may leave out some details, since too many details
may result in an unmanageable simulation and substantial
computation effort. It is important to carefully consider a
measure under consideration and not to include irrelevant
detail into the simulation.
In this section, we present a position-based
connectivity aware back-bone-assisted hop greedy (BAHG)
routing protocol for VANET’s city environments. The
proposed routing protocol finds a routing path consisting of
the minimum of intermediate intersections. The protocol is
designed considering certain features in a city map, such as
road segments, intersections, etc. To maintain connectivity
at the intersections and to detect void regions, we rely on a
group of nodes called back-bone nodes. Basically, we adopt
a request-reply scheme to obtain destination position, which
is then used to compute the routing path.
To avoid the impact of mobility on routing
decisions, an update procedure is specifically designed to
supervise the movement of source as well as destination.
Overall, the objective of the hop greedy routing algorithm is
to reduce the hop count, which ultimately reduces the end-
to-end delay. In addition, the protocol also ensures
successful delivery of data packets to the destinations.
A. Zone Formation and Boundary Intersection Selection
This section explains how a city map is divided into several
zones and how some of the intersections are chosen to be the
boundary intersections that are located on the outline of a
zone. In city maps similar to those shown in below,it is
observed that major roads intersect each other, and many
polygons are formed out of it. By “major roads,” we mean
roads having more than two lanes. The polygonal areas are
termed as zones that are the building blocks of a city map.
These zones share major roads with the adjacent zones. One
such zone formed by four major roads is shown below.
Many minor roads are running inside a zone. By
“minor roads” we mean roads having less than or equal to
two lanes. The city map shown in below is divided into 20
zones. At the corner of each zone, wider intersections are
witnessed. As major roads meet there, it is highly probable
that at least one node will be present at that intersection.
Apart from the corner intersections, major roads may also
meet with a cluster of minor roads on the zone border,
creating wider intersections.Wider intersections at the corner
as well as on the zone border are termed as the boundary
intersections. Basically the boundary intersections will act
as the entry points for the packets sent to a zone. In our
system, intersections, major roads, and minor roads are
assigned unique IDs.
B. Back-Bone Nodes and Connectivity Preservation
Connectivity is the key requirement for any routing protocol
for reliable and fast delivery of packets. This section
describes mechanisms to ensure connectivity of a routing
path. A routing path involves many intermediate
intersections at which the packet direction is changed.
Selection of a wrong intermediate intersection may result in
the dropping of packets. Similarly, if the source or
destination changes its original position, the ongoing
communication may get disrupted. Apart from this, the high
mobility of vehicles may create temporary void regions on a
road segment.
As a result, routing paths passing through such road
segments are seriously impaired. In our approach, we allow
some of the nodes to take care of the foregoing connectivity
issues. Such nodes are called as back-bone nodes. Based on
the specific action they perform, they are classified into
back-bone nodes at intersection and back-bone nodes at road
segments.
C. Back-bone setup
Back-bone nodes of this kind are of three types, namely,
stable, primary, and secondary back bones. A stable back-
bone node is selected from the stream of vehicles waiting at
the intersection during red traffic signal. Among the waiting
vehicles, the vehicle closest to the intersection declares itself
Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 22
as the stable back bone. However, primary and secondary
back bones are selected from the fleet of vehicles crossing
the intersection when the signal turns green.
The primary back bone is the one located at the
intersection, whereas the secondary back bone is outside the
intersection. Initially, a random node declares itself as the
primary back bone. Then, the primary backbone node
selects a secondary back-bone node comparing the average
vehicle speed, the position, and the moving direction of all
its neighbors.
When the current primary back-bone node leaves
the intersection region, it notifies the secondary back bone
to become the new primary back bone. This notification also
informs vehicles at or around the intersection about the new
primary back bone.
1) Packet forwarding
When there is a need to choose a forwarding node from an
intersection, a back-bone node is always preferred. This is
because back-bone nodes can maintain the communication
history and store packet in the absence of a forwarder at the
intersection. A forwarding node checks its neighbor list to
probe the available back-bone nodes. It compares the packet
forwarding time with the staying time of each back-bone
node. If the forwarding node is moving, it prefers stable
back-bone nodes as the forwarder. Otherwise, it prefers the
moving back bones (i.e., primary and secondary).
The primary back bone has higher priority over the
secondary back bone. Among the stable back bones, the
back bone closest to the intersection has the highest priority.
2) Message queuing and retrieval
The stable back-bone nodes take the responsibility of packet
buffering. In the absence of a suitable forwarding node, the
packet is stored in a stable back-bone node. On availability
of a forwarding node in the desired direction, packet is
retrieved and forwarded. The stable back-bone nodes
maintain the database of all communications with a
timestamp. They store source and destination addresses
along with the time of arrival of packets. If a similar packet
arrives with a new timestamp, the previous database
information is updated. While a packet is being routed along
the selected path, either destination or source may change its
position and moves to a new road segment.To allow back-
bone nodes to keep track of the movements, both source and
destination inform about their identity in their beacons.
Whenever source or destination changes direction, the back-
bone node updates the corresponding entry in its
communication history. When a packet is being forwarded,
the back-bone nodes provide the updated information.
Figure.1 Road Segments and Intersection
This enables a packet to be forwarded in the new
direction. In below figure nodes B1, B2, B3, and B4
represent the back-bone nodes that take care of the activities
at intersections.
3) Back-bone nodes at road segment
If any part of a road segment longer than the transmission
range is devoid of nodes, it can be noticed by the nodes
present at the periphery of the void region. Nodes closest to
the void region from both directions declare themselves as
back-bone nodes. These backbone nodes are termed as
“void-guard” back-bone nodes. The purpose of a “void-
guard” back-bone node is to inform the presence of a void
region to the neighboring back-bone nodes stationed at
intersections. For all such transactions among the back-bone
nodes, a piggybacked beacon message is used. On being
aware of an unconnected road segment, the back-bone node
at the intersection prohibits packets from being forwarded to
the identified road segment. In this case, the packet is
forwarded by selecting a new route. In above fig, nodes R1
and R2 are back-bone nodes of this type.
4) BAHG Position Update
Before receiving the reply message, the source may change
its position. Some back-bone nodes must be aware of the
direction of the source movement. When a forwarder chosen
among the back-bone nodes learns about such changes, it
forwards the reply message toward the new direction.
Ultimately, the source is able to receive the reply message.
Likewise, the destination may change its position before
receiving the data packet, and its movements are tracked by
the back-bone nodes. The destination may move
substantially far from its original position.
In such cases, the hop count will be elevated if the packet is
forwarded using the updates received from the back-bone
nodes. Thus, a fresh reply message is forwarded to the
source if the destination changes its zone. On receiving this
reply message, the source can compute a better path to the
destination. This can marginalize the hop count, irrespective
of the destination movement.
IV. SOFTWARE REQUIREMENTS
A. Hardware:
 Single PC
 20 Gb Hard disc space
 1Gb RAM
 Mouse : Logitech
B. Software:
 Linux OS (Ubuntu 10.04)
 NS 2.34
C. Language:
 TCL (front end)
V. TESTING & DEBUGGING
Testing and debugging a program is one of the most tedious
parts of computer programming. The testing and debugging
phase of a project can easily take more time than it took to
write the application. Testing includes both checking that
the code runs at all, that it runs correctly under all
circumstances, and that it runs the same way it did before
you made changes.
Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 23
Tcl's error diagnostics make it easy to track down coding
errors; the modular nature of Tcl code makes it easy to do
unit testing of functions, and the tcl test package makes it
easy to write integrated regression test suites.
A. Debugging Code
The first step to debugging a Tcl script is to examine the Tcl
error output closely. Tcl provides verbose error information
that leads you to the exact line where a coding error occurs.
Tcl error messages consist of a set of lines. The first line
will describe the immediate cause of the error (Incorrect
number of arguments, invalid argument, undefined variable,
etc). The rest of the message describes more details about
where the error occurs.
B. Screenshots
1) The output is generated as NAM and X-graph
2) NAM output
3) Showing Ranges for Vehicles and RSU
4) Data transmission from one vehicle to another vehicle
via RSU
5) Xgraph Output 1
6) Xgraph output 2
VI. CONCLUSION
The VANET has witnessed several endeavors toward the
development of suitable routing solutions. Multi-hop
information dissemination in VANETs is constrained by the
high mobility of vehicles and the frequent disconnections.
In this paper, we propose a hop greedy routing scheme that
yields a routing path with the minimum number of
intermediate intersection nodes while taking connectivity
into consideration. Moreover, we introduce back-bone nodes
that play a key role in providing connectivity status around
an intersection. Apart from this, by tracking the movement
of source as well as destination, the back-bone nodes enable
a packet to be forwarded in the changed direction.
REFERENCES
[1] X. Jiang and T. Camp, “An efficient location server
for an ad hoc net- works” Colorado School Mines,
Golden, CO, Tech. Rep., MCS-03-06, May 2003.
[2] C. E. Perkins and E. M. Royer, “Ad-hoc on-
demand distance vector routing” in Proc. 2nd IEEE
Workshop Mob. Comput. Syst. Appl., 1999, pp.
90–100.
[3] J. Bernsern and D. Manivannan, “Unicast routing
protocols for vehicular ad hoc networks: A critical
comparison and classification” Pervasive Mob.
Comput., vol. 5, no. 1, pp. 1–18, Feb. 2009.
[4] C. Lochert, H. Hartenstein, J. Tian, H. Füßler, D.
Hermann, and M. Mauve, “A routing strategy for
vehicular ad hoc networks in city environments” in
Proc. IEEE Intell. Veh. Symp., 2003, pp. 156–161.
[5] B. Karp and H. T. Kung, “GPSR: Greedy perimeter
stateless routing for wireless networks” in Proc.
ACM MOBICOM, 2000, pp. 243–254.
[6] G. Liu, B. S. Lee, B. C. Seet, C. H. Foh, K. J.
Wong, and K. K. Lee,“A routing strategy for
metropolis vehicular communications” in Proc.
ICOIN, LNCS, Aug. 2004, pp. 134–143.

More Related Content

What's hot

MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
cscpconf
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
tsysglobalsolutions
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
IJCNCJournal
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
ijceronline
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
IOSR Journals
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
Improve MANET network performance using ESPS approach
Improve MANET network performance using ESPS approachImprove MANET network performance using ESPS approach
Improve MANET network performance using ESPS approach
Surbhi Sharma
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
ijasuc
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
paperpublications3
 
Li2009 chapter mobility_managementinmane_tsexpl
Li2009 chapter mobility_managementinmane_tsexplLi2009 chapter mobility_managementinmane_tsexpl
Li2009 chapter mobility_managementinmane_tsexpl
FadouaYkn1
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
INFOGAIN PUBLICATION
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Saad Bare
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
ijasuc
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
IJECEIAES
 

What's hot (20)

MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Improve MANET network performance using ESPS approach
Improve MANET network performance using ESPS approachImprove MANET network performance using ESPS approach
Improve MANET network performance using ESPS approach
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Li2009 chapter mobility_managementinmane_tsexpl
Li2009 chapter mobility_managementinmane_tsexplLi2009 chapter mobility_managementinmane_tsexpl
Li2009 chapter mobility_managementinmane_tsexpl
 
Ant
AntAnt
Ant
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
ant2
ant2ant2
ant2
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Mercury
MercuryMercury
Mercury
 

Viewers also liked

Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
A Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear CoverA Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear Cover
ijsrd.com
 
A Study on Quality of Work Life
A Study on Quality of Work LifeA Study on Quality of Work Life
A Study on Quality of Work Life
ijsrd.com
 
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
ijsrd.com
 
Involute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM ProcessInvolute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM Process
ijsrd.com
 
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
ijsrd.com
 
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC MachinesA Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
ijsrd.com
 
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
ijsrd.com
 
Real World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining ToolsReal World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining Tools
ijsrd.com
 
Review of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industryReview of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industry
ijsrd.com
 
Study of Case-Based Reasoning System
Study of Case-Based Reasoning SystemStudy of Case-Based Reasoning System
Study of Case-Based Reasoning System
ijsrd.com
 
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
ijsrd.com
 
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel CellGeneration of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
ijsrd.com
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
ijsrd.com
 
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
ijsrd.com
 
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICSpeed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
ijsrd.com
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...
ijsrd.com
 
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELCOMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
ijsrd.com
 
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDCombustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
ijsrd.com
 

Viewers also liked (19)

Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
A Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear CoverA Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear Cover
 
A Study on Quality of Work Life
A Study on Quality of Work LifeA Study on Quality of Work Life
A Study on Quality of Work Life
 
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
 
Involute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM ProcessInvolute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM Process
 
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
 
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC MachinesA Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
 
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
 
Real World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining ToolsReal World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining Tools
 
Review of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industryReview of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industry
 
Study of Case-Based Reasoning System
Study of Case-Based Reasoning SystemStudy of Case-Based Reasoning System
Study of Case-Based Reasoning System
 
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
 
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel CellGeneration of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
 
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
 
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICSpeed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...
 
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELCOMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
 
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDCombustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
 

Similar to Back-Bone Assisted HOP Greedy Routing for VANET

Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
IOSR Journals
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
IJARTES
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Natasha Barnett
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
International Journal of Computer and Communication System Engineering
 
A044030110
A044030110A044030110
A044030110
IJERA Editor
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
IJERA Editor
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
IRJET Journal
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
IJECEIAES
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
graphhoc
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
Iaetsd Iaetsd
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 

Similar to Back-Bone Assisted HOP Greedy Routing for VANET (20)

Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
A044030110
A044030110A044030110
A044030110
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
50120140506003
5012014050600350120140506003
50120140506003
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
eaodv
eaodveaodv
eaodv
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Back-Bone Assisted HOP Greedy Routing for VANET

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 20 Back-Bone Assisted HOP Greedy Routing for VANET Naresh Kumar1 D. Asha2 Dr. V. S. K. Reddy3 2 Assistant Professor 3 Principle 1,2,3 Department of Electronics and Communication Engineering 1,2,3 MRCET, Secunderabad, Telangana, India Abstract— Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay. Key words: Greedy Routing, VANET, Back-Bone. I. INTRODUCTION Ad hoc networks also called infrastructure less networks are complex distributed systems consist of wireless links between the nodes and each node also works as a router to forwards the data on behalf of other nodes. The nodes are free to join or left the network without any restriction. Thus the networks have no permanent infrastructure. In ad hoc networks the nodes can be stationary or mobile. Therefore one can say that ad hoc networks basically have three forms, one is static ad hoc networks (SANET), mobile ad hoc networks (MANET) and the other one is Vehicular ad hoc networks (VANET). VANET means vehicular Adhoc network and it is the technology which is used to move vehicles as joint in network to make a transportable network. Participating vehicles become a wireless connection or router through vanet and it allow the vehicles almost to connect 100 to 300 meters to each other and in order to create a wide range network, other vehicles are connected to each other so the mobile internet is made. It is supposed that the first networks that will incorporate this technology are fire and police mobiles to interact with one another for security reasons. Brilliant way to use Vehicular Networking is defined in VANET or Intelligent Vehicular Ad-Hoc Networking. Multiple ad-hoc networking technologies integrated in VANET such as, ZigBee, IRA, WiMAX IEEE, and Wi-Fi IEEE for convenient, effective, exact, simple and plain communication within automobiles on active mobility. Useful procedures like communication of media within automobiles can be allowed as well process to follow the automotive automobiles are also favored. Security measures are defined in vehicles by VANET, flowing communication within automobiles, edutainment and telemetric. II. SYSTEM ANALYSIS A. Existing system Originally, many routing protocols were solely designed for mobile ad hoc networks and later enhanced to suit the VANET scenarios. Number of Existing Routing protocols like GPSR work well in city environments. However, these protocols encounter different problems that motivate us to design a new robust scheme. 1) Demerits  Intersection Node Probing Problem  Location Service Requirement Problem B. Proposed system In this section, we present a position-based connectivity aware back-bone-assisted hop greedy routing protocol for VANET’s city environments. The proposed routing protocol finds a routing path consisting of the minimum of intermediate intersections. The protocol is designed considering certain features in a city map, such as road segments, intersections, etc. To maintain connectivity at the intersections and to detect void regions, we rely on a group of nodes called back-bone nodes. 1) Merits:  The zone wise partitioning of a city road network is an important design frame- work for the efficient functioning of the destination discovery procedure.  The hop greedy algorithm finds the best possible path in terms of both hop count and connectivity. C. Routing Protocols An ad-hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network .In ad-hoc networks, nodes are not familiar with the topology of their networks. Instead, they have to discover it. The basic idea is that a new node may announce its presence and should listen for announcements broadcast by its neighbors. Each node learns about nodes nearby and how to reach them, and may announce that it, too, can reach them. Note that in a wider sense, ad hoc protocol can also be used literally, that is, to mean an improvised and often impromptu protocol established for a specific purpose. III. SYSTEM DESIGN People communicate. One way or another, they exchange some information among themselves all the times. In the past several decades, many electronic technologies have been invented to aid this process of exchanging information in an efficient and creative way. Among these is the creation
  • 2. Back-Bone Assisted HOP Greedy Routing for VANET (IJSRD/Vol. 2/Issue 09/2014/005) All rights reserved by www.ijsrd.com 21 of fixed telephone networks, the broadcasting of television and radio, the advent of computers, and the emergence of wireless sensation. Originally, these technologies existed and operated independently, serving their very own purposes. Not until recently that these technological wonders seem to converge, and it is a well-known fact that a computer communication network is a result of this convergence. System modeling refers to an act of representing an actual system in a simply way. System modeling is extremely important in system design and development, since it gives an idea of how the system would perform if actually implemented. Traditionally, there are two modeling approaches: analytical approach and simulation approach. Analytical Approach: The general concept of analytical modeling approach is to first come up with a way to describe a system mathematically with the help of applied mathematical tools such as queuing and probability theories, and then apply numerical methods to gain insight from the developed mathematical model. When the system is simple and relatively small, analytical modeling would be preferable (over simulation). In this case, the model tends to be mathematically tractable. The numerical solutions to this model in effect require lightweight computational efforts. If properly employed, analytical modeling can be cost-effective and can provide an abstract view of the components interacting with one another in the system. However, if many simplifying assumptions on the system are made during the modeling process, analytical models may not give an accurate representation of the real system. Simulation Approach: Simulation is a process of designing a model of a real system and conducting experiments with this model for the purpose of understanding the behavior of the system and/or evaluating various strategies for the operation of the system. Simulation is widely-used in system modeling for applications ranging from engineering research, business analysis, manufacturing planning, and biological science experimentation, just to name a few. Compared to analytical modeling, simulation usually requires less abstraction in the model (i.e., fewer simplifying assumptions) since almost every possible detail of the specifications of the system can be put into the simulation model to best describe the actual system. When the system is rather large and complex, a straightforward mathematical formulation may not be feasible. In this case, the simulation approach is usually preferred to the analytical approach. In common with analytical modeling, simulation modeling may leave out some details, since too many details may result in an unmanageable simulation and substantial computation effort. It is important to carefully consider a measure under consideration and not to include irrelevant detail into the simulation. In this section, we present a position-based connectivity aware back-bone-assisted hop greedy (BAHG) routing protocol for VANET’s city environments. The proposed routing protocol finds a routing path consisting of the minimum of intermediate intersections. The protocol is designed considering certain features in a city map, such as road segments, intersections, etc. To maintain connectivity at the intersections and to detect void regions, we rely on a group of nodes called back-bone nodes. Basically, we adopt a request-reply scheme to obtain destination position, which is then used to compute the routing path. To avoid the impact of mobility on routing decisions, an update procedure is specifically designed to supervise the movement of source as well as destination. Overall, the objective of the hop greedy routing algorithm is to reduce the hop count, which ultimately reduces the end- to-end delay. In addition, the protocol also ensures successful delivery of data packets to the destinations. A. Zone Formation and Boundary Intersection Selection This section explains how a city map is divided into several zones and how some of the intersections are chosen to be the boundary intersections that are located on the outline of a zone. In city maps similar to those shown in below,it is observed that major roads intersect each other, and many polygons are formed out of it. By “major roads,” we mean roads having more than two lanes. The polygonal areas are termed as zones that are the building blocks of a city map. These zones share major roads with the adjacent zones. One such zone formed by four major roads is shown below. Many minor roads are running inside a zone. By “minor roads” we mean roads having less than or equal to two lanes. The city map shown in below is divided into 20 zones. At the corner of each zone, wider intersections are witnessed. As major roads meet there, it is highly probable that at least one node will be present at that intersection. Apart from the corner intersections, major roads may also meet with a cluster of minor roads on the zone border, creating wider intersections.Wider intersections at the corner as well as on the zone border are termed as the boundary intersections. Basically the boundary intersections will act as the entry points for the packets sent to a zone. In our system, intersections, major roads, and minor roads are assigned unique IDs. B. Back-Bone Nodes and Connectivity Preservation Connectivity is the key requirement for any routing protocol for reliable and fast delivery of packets. This section describes mechanisms to ensure connectivity of a routing path. A routing path involves many intermediate intersections at which the packet direction is changed. Selection of a wrong intermediate intersection may result in the dropping of packets. Similarly, if the source or destination changes its original position, the ongoing communication may get disrupted. Apart from this, the high mobility of vehicles may create temporary void regions on a road segment. As a result, routing paths passing through such road segments are seriously impaired. In our approach, we allow some of the nodes to take care of the foregoing connectivity issues. Such nodes are called as back-bone nodes. Based on the specific action they perform, they are classified into back-bone nodes at intersection and back-bone nodes at road segments. C. Back-bone setup Back-bone nodes of this kind are of three types, namely, stable, primary, and secondary back bones. A stable back- bone node is selected from the stream of vehicles waiting at the intersection during red traffic signal. Among the waiting vehicles, the vehicle closest to the intersection declares itself
  • 3. Back-Bone Assisted HOP Greedy Routing for VANET (IJSRD/Vol. 2/Issue 09/2014/005) All rights reserved by www.ijsrd.com 22 as the stable back bone. However, primary and secondary back bones are selected from the fleet of vehicles crossing the intersection when the signal turns green. The primary back bone is the one located at the intersection, whereas the secondary back bone is outside the intersection. Initially, a random node declares itself as the primary back bone. Then, the primary backbone node selects a secondary back-bone node comparing the average vehicle speed, the position, and the moving direction of all its neighbors. When the current primary back-bone node leaves the intersection region, it notifies the secondary back bone to become the new primary back bone. This notification also informs vehicles at or around the intersection about the new primary back bone. 1) Packet forwarding When there is a need to choose a forwarding node from an intersection, a back-bone node is always preferred. This is because back-bone nodes can maintain the communication history and store packet in the absence of a forwarder at the intersection. A forwarding node checks its neighbor list to probe the available back-bone nodes. It compares the packet forwarding time with the staying time of each back-bone node. If the forwarding node is moving, it prefers stable back-bone nodes as the forwarder. Otherwise, it prefers the moving back bones (i.e., primary and secondary). The primary back bone has higher priority over the secondary back bone. Among the stable back bones, the back bone closest to the intersection has the highest priority. 2) Message queuing and retrieval The stable back-bone nodes take the responsibility of packet buffering. In the absence of a suitable forwarding node, the packet is stored in a stable back-bone node. On availability of a forwarding node in the desired direction, packet is retrieved and forwarded. The stable back-bone nodes maintain the database of all communications with a timestamp. They store source and destination addresses along with the time of arrival of packets. If a similar packet arrives with a new timestamp, the previous database information is updated. While a packet is being routed along the selected path, either destination or source may change its position and moves to a new road segment.To allow back- bone nodes to keep track of the movements, both source and destination inform about their identity in their beacons. Whenever source or destination changes direction, the back- bone node updates the corresponding entry in its communication history. When a packet is being forwarded, the back-bone nodes provide the updated information. Figure.1 Road Segments and Intersection This enables a packet to be forwarded in the new direction. In below figure nodes B1, B2, B3, and B4 represent the back-bone nodes that take care of the activities at intersections. 3) Back-bone nodes at road segment If any part of a road segment longer than the transmission range is devoid of nodes, it can be noticed by the nodes present at the periphery of the void region. Nodes closest to the void region from both directions declare themselves as back-bone nodes. These backbone nodes are termed as “void-guard” back-bone nodes. The purpose of a “void- guard” back-bone node is to inform the presence of a void region to the neighboring back-bone nodes stationed at intersections. For all such transactions among the back-bone nodes, a piggybacked beacon message is used. On being aware of an unconnected road segment, the back-bone node at the intersection prohibits packets from being forwarded to the identified road segment. In this case, the packet is forwarded by selecting a new route. In above fig, nodes R1 and R2 are back-bone nodes of this type. 4) BAHG Position Update Before receiving the reply message, the source may change its position. Some back-bone nodes must be aware of the direction of the source movement. When a forwarder chosen among the back-bone nodes learns about such changes, it forwards the reply message toward the new direction. Ultimately, the source is able to receive the reply message. Likewise, the destination may change its position before receiving the data packet, and its movements are tracked by the back-bone nodes. The destination may move substantially far from its original position. In such cases, the hop count will be elevated if the packet is forwarded using the updates received from the back-bone nodes. Thus, a fresh reply message is forwarded to the source if the destination changes its zone. On receiving this reply message, the source can compute a better path to the destination. This can marginalize the hop count, irrespective of the destination movement. IV. SOFTWARE REQUIREMENTS A. Hardware:  Single PC  20 Gb Hard disc space  1Gb RAM  Mouse : Logitech B. Software:  Linux OS (Ubuntu 10.04)  NS 2.34 C. Language:  TCL (front end) V. TESTING & DEBUGGING Testing and debugging a program is one of the most tedious parts of computer programming. The testing and debugging phase of a project can easily take more time than it took to write the application. Testing includes both checking that the code runs at all, that it runs correctly under all circumstances, and that it runs the same way it did before you made changes.
  • 4. Back-Bone Assisted HOP Greedy Routing for VANET (IJSRD/Vol. 2/Issue 09/2014/005) All rights reserved by www.ijsrd.com 23 Tcl's error diagnostics make it easy to track down coding errors; the modular nature of Tcl code makes it easy to do unit testing of functions, and the tcl test package makes it easy to write integrated regression test suites. A. Debugging Code The first step to debugging a Tcl script is to examine the Tcl error output closely. Tcl provides verbose error information that leads you to the exact line where a coding error occurs. Tcl error messages consist of a set of lines. The first line will describe the immediate cause of the error (Incorrect number of arguments, invalid argument, undefined variable, etc). The rest of the message describes more details about where the error occurs. B. Screenshots 1) The output is generated as NAM and X-graph 2) NAM output 3) Showing Ranges for Vehicles and RSU 4) Data transmission from one vehicle to another vehicle via RSU 5) Xgraph Output 1 6) Xgraph output 2 VI. CONCLUSION The VANET has witnessed several endeavors toward the development of suitable routing solutions. Multi-hop information dissemination in VANETs is constrained by the high mobility of vehicles and the frequent disconnections. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. REFERENCES [1] X. Jiang and T. Camp, “An efficient location server for an ad hoc net- works” Colorado School Mines, Golden, CO, Tech. Rep., MCS-03-06, May 2003. [2] C. E. Perkins and E. M. Royer, “Ad-hoc on- demand distance vector routing” in Proc. 2nd IEEE Workshop Mob. Comput. Syst. Appl., 1999, pp. 90–100. [3] J. Bernsern and D. Manivannan, “Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification” Pervasive Mob. Comput., vol. 5, no. 1, pp. 1–18, Feb. 2009. [4] C. Lochert, H. Hartenstein, J. Tian, H. Füßler, D. Hermann, and M. Mauve, “A routing strategy for vehicular ad hoc networks in city environments” in Proc. IEEE Intell. Veh. Symp., 2003, pp. 156–161. [5] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks” in Proc. ACM MOBICOM, 2000, pp. 243–254. [6] G. Liu, B. S. Lee, B. C. Seet, C. H. Foh, K. J. Wong, and K. K. Lee,“A routing strategy for metropolis vehicular communications” in Proc. ICOIN, LNCS, Aug. 2004, pp. 134–143.