SlideShare a Scribd company logo
Cluster-based MAC in VANETs
for Safety Applications
Presented by
Md. Hasibur Rashid & Soniya Yeasmin
1
Introduction
In recent years, traffic accidents have increased by an enormous rate which had
led to a huge amount of grief and economic loss. This motivates to the
development of traffic safety applications using VANETs to avoid road accident.
VANETs comprises of vehicle to infrastructure (V2I) and vehicle to vehicle (V2V)
communication which can support exchange of safety and non-safety messages.
The messages exchanged by safety applications require predictable or low delay
and high reliability.
The delivery of messages after few tenths of a second delay may significantly
affect the performance of safety applications. In particular, the effectiveness of
active safety applications depends on the ability to disseminate messages as quick
as possible with high reliability, fair and scalable utilization of network resources. The
effectiveness of traffic safety applications using VANETs depends up on the
performance of medium access protocol (MAC).
2
Introduction
 The main challenge for the design of MAC protocol for VANETs is to achieve
reliable delivery of messages within the time limit even when the density of
vehicles varies rapidly in the network. Therefore, cluster-based MAC protocols that
can avoid or limit channel contention, provide fairness to channel access,
increases radio capacity by the spatial reuse of network resources and effectively
control the topology of the network.
 Clustering in VANETs means organizing the vehicles into small groups based on
some common characteristics such as vehicle position, speed, and direction etc.
 By clustering the vehicles into groups of minimum relative mobility. In this way, the
clustering algorithm can improve the lifetime of the cluster and decrease the
number of CH changes and the number of cluster reconfigurations.
 We propose two cluster based MAC protocols (D-CBM) based on contention
based carrier sense multiple access (CSMA) and collision free time division multiple
access (TDMA) in order to achieve high stability, and low or predictable delay, low
communication overhead and real time delivery of safety messages.
3
D-CBM Protocol
D-CBM (distributed cluster based mac protocol) employ, the distributed
technique for clustering in VANETs, where V2V and V2I communication are
considered. In the proposed scheme, each vehicle has a GPS installed which
gives the location information. RSU (Road site Unite) is fixed and uniformly
spaced in the side of the road. They are homogeneous in nature and assigned
with a unique identifier. They are able to function as a central coordinator to
collect and distribute the messages. Vehicles send periodic messages to
CHs(Cluster Head). In this scheme, each vehicle shares information about its
current position, speed, lane, and direction with only its one hop neighbors and
registered RSUs.
4
D-CBM Protocol 5
D-CBM Protocol
 Cluster Head : A vehicle in this mode gathers information regarding speed,
direction, lane, and location from its members and it uses TDMA technique for
allotting communication slots for its members and forwarding the data to the
RSUs. CH is then responsible to transmit these data towards the RSUs and
adjacent CHs. Inter cluster communication is between CH and its adjacent
CHs or RSUs.
 Cluster Member: A cluster member is a vehicle that belongs to a particular
cluster and it regularly transmits the data to its cluster head.
 Gateway Vehicle: This is a initial state when vehicle enters the network. In this
state, vehicle can be cluster member of two clusters or belong to no clusters.
6
D-CBM protocol is divided into two phases.
 The first is the setup phase, where members are classified into certain clusters
according to the speed, direction of motion, lane and position. In the initial start of
the phase the vehicles entering the road send beacon messages to the RSU and
registers in the RSU.
After waiting for certain period RSU elects the CH at a random time and after that CH
adds members to cluster. This increases the initial cluster stability of the network. After
initial selection of the cluster, cluster reconfiguration happens when one of the CH
goes below a threshold.
Next CH election will be based on combination of average relative speed between
the neighbors in the CH, relative distance to RSUs in the highway compared with itself
and its neighbors in cluster, and the relative distance between itself and all its
neighbors in cluster.
7D-CBM Protocol
 This equation represents average distance between all neighbors and itself. It means how
close are the neighbors to one vehicle.
S avg =
𝑆1+𝑆2+𝑆3+ ……….+𝑆𝑛
𝑛
 This equation represents the average difference of speed between one vehicle and all its
cluster members.
8
Dy a v g =
Dy1 + D y2 + D y3 + ...D y n
n
Dx a v g =
Dx1 + D x2 + D x3 + ...D x n
n
Di, neighbors = 𝐷 𝑥𝑖 − 𝐷𝑥𝑎𝑣𝑔 2 + |𝐷 𝑦𝑖 − 𝐷𝑦𝑎𝑣𝑔|2
Si, neighbors = |𝑆𝑖 − 𝑆𝑎𝑣𝑔|
 Equation 6 represents the distance between one of its cluster member and its registered RSU.
Additionally, equation 7 and 8 represents average distance of all its cluster members to the
registered RSU and the distance between one vehicle to its registered RSU.
 From equation 9 the relative distance between one vehicle and its all other cluster members
to registered RSU is calculated. Additionally, distance to RSU is considered here to elect a
CH neared to RSU in order to reduce the delivery time .
9
Rnei, rsu = 𝑅 𝑥𝑛𝑒𝑖 − 𝑅𝑥𝑟𝑠𝑢 2 + |𝑅𝑦𝑛𝑒𝑖 − 𝑅 𝑦𝑟𝑠𝑢|2 … … … . … . . (6)
Ri = 𝑅 𝑥𝑖 − 𝑅𝑥𝑟𝑠𝑢 2 + |𝑅𝑦𝑖 − 𝑅 𝑦𝑟𝑠𝑢|2 … … … … … … … … . (8)
Ri, rnei = 𝑅𝑖 − 𝑅𝑎𝑣𝑔 𝑛𝑒𝑖 … … … … … … … … … … … … … … … . … . (9)
R avgnei =
𝑅 𝑛𝑒𝑖1
,
𝑟𝑠𝑢
+𝑅𝑛𝑒𝑖2
,
𝑟𝑠𝑢
+𝑅𝑛𝑒𝑖3
,
𝑟𝑠𝑢
+⋯………..+ 𝑅𝑛𝑒𝑖𝑛
,
𝑟𝑠𝑢
𝑛
………………(7)
 Finally, the relative speed , distance to the neighbors and distance to the RSU is
combined using weighting factors W1 , W2 , W3 in this equation. The values of W1 , W2 ,
W3 are varied according to the application requirements. The vehicle with lowest value
for this equation is elected as CH.
10
Fi = W1 × D i, neighbors+ W2 × Si,neighbors + W3 × Ri,rnei
 In transmission phase, we propose two protocol
for CH to RSU communication. One is contention
based and other is contention free
communication.
 Contention free protocol is based on TDMA
communication. In this protocol, RSU assign time
slots to CHs and CH assign time slots to CMs and
gateway vehicle. From figure the RSU time frame
is divided into CH time slots, RSU down link, and
free period. Here we assume there is a time
synchronization between RSU, CH and CM.
 Here one CH can be in the range of maximum
two RSUs and CHs are registered to the nearest
RSUs.
 In CH time slots, the frame is divided into fixed
number of slots and each CH is assigned with a
transmission slot. In RSU down link, it sends
information to all its registered CHs and in free
period it assigns slots to gateway vehicles to
transmit information.
 Additionally, CH frame is also divided into four
sections. In first section, it assigns first time slot for
itself for communicating to the RSU. Secondly,
CH assign slots for cluster members in the CM
slots section.
11
 Second protocol proposed is based on
CSMA CA communication where the
CH wait for the channel to be free to
communicate with CM.
 The difference between two protocol is
the CH to RSU communication and that
it uses two transceiver. Furthermore, RSU
frame shown in figure, contention
period is considered for CH transmission.
 Here delay should be minimized by
selecting proper MAC protocol to
reduce the channel access time,
selection of stable CH nearer to the RSU.
12
 TRSU2CH are the average time delay for broadcasting message from RSU to
CH and vice versa. To assure the timely delivery of active safety messages,
the maximum delays for delivery with and without RSU should be less than
the required delivery delay of safety message i.e, Tdelay,RSU ≤ Tsafety
In this protocol, the frame length of CH and RSU is considered to be 100ms.
13
Tdelay,RSU = TCM2CH + TRSU2CH
Simulations
 In simulations, performance of the proposed protocol is evaluated in highway scenarios
generated by the micro traffic simulator SUMO.
 Figure 5, the density of vehicles increases, CH lifetime increases. Also CH lifetime increases
when the transmission range of each CH is increased from figure 6, the CH stability is high in
high transmission range.
14
Simulations
 Another important parameter to be considered is the packet delivery rate. The packet
delivery rate decreases as the number of CHs increases, but it shows better
performance as compared to SBCA(stability based clustering algorithm).
 Both D-CBM protocols perform better compared to SBCA. Furthermore, both protocols
achieve the deadline of 100ms but the delivery rate for CSMA/CA is compromised.
15
Conclusions
 This paper has presented a cluster based MAC protocol (DCBM) suitable for
traffic safety applications in VANETs. The goal was to define a protocol able to
scale over the number of vehicles and deliver the messages within the deadline.
Our algorithm elects stable cluster heads periodically by using a weighting
equation , which combines minimum relatived istance to all its neighbors, relative
speed and relative distance to registered RSU .
 Re-election can avoid the re-clustering of vehicles and increasing the stability of
the cluster.
 The RSU allocates time slots to the moving cluster head vehicles based on the
registration and cluster heads allocate time slots for CMs.
 The RSU and CH broadcast messages is heard by all the CH and CMs vehicles in
the cluster region and this solves the problem of hidden stations and results
efficient utilization of the allocated slot by avoiding contention . The
synchronization between RSU, CH, CM allows the protocol to ensure reliable and
timely delivery of safety messages.
 How ever, the protocol may not work in areas where the reare no RSUs deployed.
16
Thank You
Md. Hasibur Rashid & Soniya Yeasmin // MSc. In CSE, KUET, Bangladesh
17

More Related Content

What's hot

IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET Journal
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
IJECEIAES
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
Fuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication SystemsFuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication Systems
Queen's University
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
cscpconf
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
TELKOMNIKA JOURNAL
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
bheemsain
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
Ahmar Hashmi
 
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
ieijjournal
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
IJCNCJournal
 
Implementation of channel estimation algorithms in ofdm for 64 subcarriers
Implementation of channel estimation algorithms in ofdm for 64 subcarriersImplementation of channel estimation algorithms in ofdm for 64 subcarriers
Implementation of channel estimation algorithms in ofdm for 64 subcarriers
IAEME Publication
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performanceUwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
Emad ALmarday
 
Evolution of hsdpa
Evolution of hsdpaEvolution of hsdpa
Evolution of hsdpa
Mohan Akotkar
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithm
inventionjournals
 
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
IRJET Journal
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 

What's hot (19)

IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Fuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication SystemsFuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication Systems
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
Implementation of channel estimation algorithms in ofdm for 64 subcarriers
Implementation of channel estimation algorithms in ofdm for 64 subcarriersImplementation of channel estimation algorithms in ofdm for 64 subcarriers
Implementation of channel estimation algorithms in ofdm for 64 subcarriers
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performanceUwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
Uwicore vtc07 effect of channel-quality indicator delay on hsdpa performance
 
Evolution of hsdpa
Evolution of hsdpaEvolution of hsdpa
Evolution of hsdpa
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithm
 
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 

Viewers also liked

Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree compared
Md. Hasibur Rashid
 
Cluster grid cloud computing
Cluster grid cloud computingCluster grid cloud computing
Cluster grid cloud computing
Fajar Zain
 
The American Civil War
The American Civil WarThe American Civil War
The American Civil War
wendyinwendysclass
 
Music in the_1930s_in_alabama
Music in the_1930s_in_alabamaMusic in the_1930s_in_alabama
Music in the_1930s_in_alabama
wendyinwendysclass
 
1 xuân bính thân 13-zen meditation-hành trình.pps
1 xuân bính thân 13-zen meditation-hành trình.pps1 xuân bính thân 13-zen meditation-hành trình.pps
1 xuân bính thân 13-zen meditation-hành trình.pps
Sưong Lam Trần
 
Crane control
Crane controlCrane control
Crane control
Md. Hasibur Rashid
 
แข่งขัน Spelling bee
แข่งขัน Spelling beeแข่งขัน Spelling bee
แข่งขัน Spelling bee
ABELE Snvip
 
ซัมซุงไทยมั่นใจ
ซัมซุงไทยมั่นใจซัมซุงไทยมั่นใจ
ซัมซุงไทยมั่นใจABELE Snvip
 
Wizar 101 card ideas
Wizar 101 card ideasWizar 101 card ideas
Wizar 101 card ideas
mama1304
 
Программа достойное жильё
Программа достойное жильёПрограмма достойное жильё
Программа достойное жильёyudind
 
Программа магазин домов
Программа магазин домов Программа магазин домов
Программа магазин домов yudind
 
CV QAQC Manager Brf - Mngmt app.
CV QAQC Manager Brf - Mngmt app.CV QAQC Manager Brf - Mngmt app.
CV QAQC Manager Brf - Mngmt app.
gorg3337
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1ABELE Snvip
 
ppt hafiz 1 jadul
ppt hafiz 1 jadulppt hafiz 1 jadul
ppt hafiz 1 jadul
mama1304
 
Idioms
IdiomsIdioms
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
Md. Hasibur Rashid
 
Food english[1]
Food english[1]Food english[1]
Food english[1]
wendyinwendysclass
 
กระบวนการเทคโนโลยีสารสนเทศ
กระบวนการเทคโนโลยีสารสนเทศกระบวนการเทคโนโลยีสารสนเทศ
กระบวนการเทคโนโลยีสารสนเทศ
ABELE Snvip
 
Sekar file
Sekar fileSekar file
Sekar filemama1304
 
P1 tekken jr law
P1 tekken jr lawP1 tekken jr law
P1 tekken jr lawmama1304
 

Viewers also liked (20)

Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree compared
 
Cluster grid cloud computing
Cluster grid cloud computingCluster grid cloud computing
Cluster grid cloud computing
 
The American Civil War
The American Civil WarThe American Civil War
The American Civil War
 
Music in the_1930s_in_alabama
Music in the_1930s_in_alabamaMusic in the_1930s_in_alabama
Music in the_1930s_in_alabama
 
1 xuân bính thân 13-zen meditation-hành trình.pps
1 xuân bính thân 13-zen meditation-hành trình.pps1 xuân bính thân 13-zen meditation-hành trình.pps
1 xuân bính thân 13-zen meditation-hành trình.pps
 
Crane control
Crane controlCrane control
Crane control
 
แข่งขัน Spelling bee
แข่งขัน Spelling beeแข่งขัน Spelling bee
แข่งขัน Spelling bee
 
ซัมซุงไทยมั่นใจ
ซัมซุงไทยมั่นใจซัมซุงไทยมั่นใจ
ซัมซุงไทยมั่นใจ
 
Wizar 101 card ideas
Wizar 101 card ideasWizar 101 card ideas
Wizar 101 card ideas
 
Программа достойное жильё
Программа достойное жильёПрограмма достойное жильё
Программа достойное жильё
 
Программа магазин домов
Программа магазин домов Программа магазин домов
Программа магазин домов
 
CV QAQC Manager Brf - Mngmt app.
CV QAQC Manager Brf - Mngmt app.CV QAQC Manager Brf - Mngmt app.
CV QAQC Manager Brf - Mngmt app.
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
ppt hafiz 1 jadul
ppt hafiz 1 jadulppt hafiz 1 jadul
ppt hafiz 1 jadul
 
Idioms
IdiomsIdioms
Idioms
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
 
Food english[1]
Food english[1]Food english[1]
Food english[1]
 
กระบวนการเทคโนโลยีสารสนเทศ
กระบวนการเทคโนโลยีสารสนเทศกระบวนการเทคโนโลยีสารสนเทศ
กระบวนการเทคโนโลยีสารสนเทศ
 
Sekar file
Sekar fileSekar file
Sekar file
 
P1 tekken jr law
P1 tekken jr lawP1 tekken jr law
P1 tekken jr law
 

Similar to Cluster based mac in vane ts for safety applications

A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
University of Piraeus
 
Collision Warning....SAMRIDDHA SHIL & MY TEAM
Collision Warning....SAMRIDDHA SHIL & MY TEAMCollision Warning....SAMRIDDHA SHIL & MY TEAM
Collision Warning....SAMRIDDHA SHIL & MY TEAM
Samriddha Shil
 
A018210109
A018210109A018210109
A018210109
IOSR Journals
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
DhruvMarothi
 
A novel centralized tdma
A novel centralized tdmaA novel centralized tdma
A novel centralized tdma
Nexgen Technology
 
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular NetworksNovel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Nexgen Technology
 
1. A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
1.	A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks1.	A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
1. A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Nexgen Technology
 
A novel centralized tdma
A novel centralized tdmaA novel centralized tdma
A novel centralized tdma
Nexgen Technology
 
Ec34781784
Ec34781784Ec34781784
Ec34781784
IJERA Editor
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Eswar Publications
 
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
ijwmn
 
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
ijwmn
 
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
ijwmn
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
IRJET Journal
 
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
 
Multi-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON'sMulti-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON's
Mithileysh Sathiyanarayanan
 
Improving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering TechniqueImproving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering Technique
Kaushik Padmanabhan
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
ijwmn
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
IJSRED
 
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
ijwmn
 

Similar to Cluster based mac in vane ts for safety applications (20)

A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
 
Collision Warning....SAMRIDDHA SHIL & MY TEAM
Collision Warning....SAMRIDDHA SHIL & MY TEAMCollision Warning....SAMRIDDHA SHIL & MY TEAM
Collision Warning....SAMRIDDHA SHIL & MY TEAM
 
A018210109
A018210109A018210109
A018210109
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
A novel centralized tdma
A novel centralized tdmaA novel centralized tdma
A novel centralized tdma
 
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular NetworksNovel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
 
1. A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
1.	A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks1.	A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
1. A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks
 
A novel centralized tdma
A novel centralized tdmaA novel centralized tdma
A novel centralized tdma
 
Ec34781784
Ec34781784Ec34781784
Ec34781784
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
 
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
 
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
 
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
 
Multi-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON'sMulti-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON's
 
Improving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering TechniqueImproving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering Technique
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
 

More from Md. Hasibur Rashid

Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
Md. Hasibur Rashid
 
Crane control
Crane controlCrane control
Crane control
Md. Hasibur Rashid
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
Md. Hasibur Rashid
 
Resisting skew accumulation
Resisting skew accumulationResisting skew accumulation
Resisting skew accumulation
Md. Hasibur Rashid
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
Md. Hasibur Rashid
 
Renewable energy
Renewable energyRenewable energy
Renewable energy
Md. Hasibur Rashid
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 

More from Md. Hasibur Rashid (7)

Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
 
Crane control
Crane controlCrane control
Crane control
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
 
Resisting skew accumulation
Resisting skew accumulationResisting skew accumulation
Resisting skew accumulation
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
Renewable energy
Renewable energyRenewable energy
Renewable energy
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 

Recently uploaded

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Cluster based mac in vane ts for safety applications

  • 1. Cluster-based MAC in VANETs for Safety Applications Presented by Md. Hasibur Rashid & Soniya Yeasmin 1
  • 2. Introduction In recent years, traffic accidents have increased by an enormous rate which had led to a huge amount of grief and economic loss. This motivates to the development of traffic safety applications using VANETs to avoid road accident. VANETs comprises of vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication which can support exchange of safety and non-safety messages. The messages exchanged by safety applications require predictable or low delay and high reliability. The delivery of messages after few tenths of a second delay may significantly affect the performance of safety applications. In particular, the effectiveness of active safety applications depends on the ability to disseminate messages as quick as possible with high reliability, fair and scalable utilization of network resources. The effectiveness of traffic safety applications using VANETs depends up on the performance of medium access protocol (MAC). 2
  • 3. Introduction  The main challenge for the design of MAC protocol for VANETs is to achieve reliable delivery of messages within the time limit even when the density of vehicles varies rapidly in the network. Therefore, cluster-based MAC protocols that can avoid or limit channel contention, provide fairness to channel access, increases radio capacity by the spatial reuse of network resources and effectively control the topology of the network.  Clustering in VANETs means organizing the vehicles into small groups based on some common characteristics such as vehicle position, speed, and direction etc.  By clustering the vehicles into groups of minimum relative mobility. In this way, the clustering algorithm can improve the lifetime of the cluster and decrease the number of CH changes and the number of cluster reconfigurations.  We propose two cluster based MAC protocols (D-CBM) based on contention based carrier sense multiple access (CSMA) and collision free time division multiple access (TDMA) in order to achieve high stability, and low or predictable delay, low communication overhead and real time delivery of safety messages. 3
  • 4. D-CBM Protocol D-CBM (distributed cluster based mac protocol) employ, the distributed technique for clustering in VANETs, where V2V and V2I communication are considered. In the proposed scheme, each vehicle has a GPS installed which gives the location information. RSU (Road site Unite) is fixed and uniformly spaced in the side of the road. They are homogeneous in nature and assigned with a unique identifier. They are able to function as a central coordinator to collect and distribute the messages. Vehicles send periodic messages to CHs(Cluster Head). In this scheme, each vehicle shares information about its current position, speed, lane, and direction with only its one hop neighbors and registered RSUs. 4
  • 6. D-CBM Protocol  Cluster Head : A vehicle in this mode gathers information regarding speed, direction, lane, and location from its members and it uses TDMA technique for allotting communication slots for its members and forwarding the data to the RSUs. CH is then responsible to transmit these data towards the RSUs and adjacent CHs. Inter cluster communication is between CH and its adjacent CHs or RSUs.  Cluster Member: A cluster member is a vehicle that belongs to a particular cluster and it regularly transmits the data to its cluster head.  Gateway Vehicle: This is a initial state when vehicle enters the network. In this state, vehicle can be cluster member of two clusters or belong to no clusters. 6
  • 7. D-CBM protocol is divided into two phases.  The first is the setup phase, where members are classified into certain clusters according to the speed, direction of motion, lane and position. In the initial start of the phase the vehicles entering the road send beacon messages to the RSU and registers in the RSU. After waiting for certain period RSU elects the CH at a random time and after that CH adds members to cluster. This increases the initial cluster stability of the network. After initial selection of the cluster, cluster reconfiguration happens when one of the CH goes below a threshold. Next CH election will be based on combination of average relative speed between the neighbors in the CH, relative distance to RSUs in the highway compared with itself and its neighbors in cluster, and the relative distance between itself and all its neighbors in cluster. 7D-CBM Protocol
  • 8.  This equation represents average distance between all neighbors and itself. It means how close are the neighbors to one vehicle. S avg = 𝑆1+𝑆2+𝑆3+ ……….+𝑆𝑛 𝑛  This equation represents the average difference of speed between one vehicle and all its cluster members. 8 Dy a v g = Dy1 + D y2 + D y3 + ...D y n n Dx a v g = Dx1 + D x2 + D x3 + ...D x n n Di, neighbors = 𝐷 𝑥𝑖 − 𝐷𝑥𝑎𝑣𝑔 2 + |𝐷 𝑦𝑖 − 𝐷𝑦𝑎𝑣𝑔|2 Si, neighbors = |𝑆𝑖 − 𝑆𝑎𝑣𝑔|
  • 9.  Equation 6 represents the distance between one of its cluster member and its registered RSU. Additionally, equation 7 and 8 represents average distance of all its cluster members to the registered RSU and the distance between one vehicle to its registered RSU.  From equation 9 the relative distance between one vehicle and its all other cluster members to registered RSU is calculated. Additionally, distance to RSU is considered here to elect a CH neared to RSU in order to reduce the delivery time . 9 Rnei, rsu = 𝑅 𝑥𝑛𝑒𝑖 − 𝑅𝑥𝑟𝑠𝑢 2 + |𝑅𝑦𝑛𝑒𝑖 − 𝑅 𝑦𝑟𝑠𝑢|2 … … … . … . . (6) Ri = 𝑅 𝑥𝑖 − 𝑅𝑥𝑟𝑠𝑢 2 + |𝑅𝑦𝑖 − 𝑅 𝑦𝑟𝑠𝑢|2 … … … … … … … … . (8) Ri, rnei = 𝑅𝑖 − 𝑅𝑎𝑣𝑔 𝑛𝑒𝑖 … … … … … … … … … … … … … … … . … . (9) R avgnei = 𝑅 𝑛𝑒𝑖1 , 𝑟𝑠𝑢 +𝑅𝑛𝑒𝑖2 , 𝑟𝑠𝑢 +𝑅𝑛𝑒𝑖3 , 𝑟𝑠𝑢 +⋯………..+ 𝑅𝑛𝑒𝑖𝑛 , 𝑟𝑠𝑢 𝑛 ………………(7)
  • 10.  Finally, the relative speed , distance to the neighbors and distance to the RSU is combined using weighting factors W1 , W2 , W3 in this equation. The values of W1 , W2 , W3 are varied according to the application requirements. The vehicle with lowest value for this equation is elected as CH. 10 Fi = W1 × D i, neighbors+ W2 × Si,neighbors + W3 × Ri,rnei
  • 11.  In transmission phase, we propose two protocol for CH to RSU communication. One is contention based and other is contention free communication.  Contention free protocol is based on TDMA communication. In this protocol, RSU assign time slots to CHs and CH assign time slots to CMs and gateway vehicle. From figure the RSU time frame is divided into CH time slots, RSU down link, and free period. Here we assume there is a time synchronization between RSU, CH and CM.  Here one CH can be in the range of maximum two RSUs and CHs are registered to the nearest RSUs.  In CH time slots, the frame is divided into fixed number of slots and each CH is assigned with a transmission slot. In RSU down link, it sends information to all its registered CHs and in free period it assigns slots to gateway vehicles to transmit information.  Additionally, CH frame is also divided into four sections. In first section, it assigns first time slot for itself for communicating to the RSU. Secondly, CH assign slots for cluster members in the CM slots section. 11
  • 12.  Second protocol proposed is based on CSMA CA communication where the CH wait for the channel to be free to communicate with CM.  The difference between two protocol is the CH to RSU communication and that it uses two transceiver. Furthermore, RSU frame shown in figure, contention period is considered for CH transmission.  Here delay should be minimized by selecting proper MAC protocol to reduce the channel access time, selection of stable CH nearer to the RSU. 12
  • 13.  TRSU2CH are the average time delay for broadcasting message from RSU to CH and vice versa. To assure the timely delivery of active safety messages, the maximum delays for delivery with and without RSU should be less than the required delivery delay of safety message i.e, Tdelay,RSU ≤ Tsafety In this protocol, the frame length of CH and RSU is considered to be 100ms. 13 Tdelay,RSU = TCM2CH + TRSU2CH
  • 14. Simulations  In simulations, performance of the proposed protocol is evaluated in highway scenarios generated by the micro traffic simulator SUMO.  Figure 5, the density of vehicles increases, CH lifetime increases. Also CH lifetime increases when the transmission range of each CH is increased from figure 6, the CH stability is high in high transmission range. 14
  • 15. Simulations  Another important parameter to be considered is the packet delivery rate. The packet delivery rate decreases as the number of CHs increases, but it shows better performance as compared to SBCA(stability based clustering algorithm).  Both D-CBM protocols perform better compared to SBCA. Furthermore, both protocols achieve the deadline of 100ms but the delivery rate for CSMA/CA is compromised. 15
  • 16. Conclusions  This paper has presented a cluster based MAC protocol (DCBM) suitable for traffic safety applications in VANETs. The goal was to define a protocol able to scale over the number of vehicles and deliver the messages within the deadline. Our algorithm elects stable cluster heads periodically by using a weighting equation , which combines minimum relatived istance to all its neighbors, relative speed and relative distance to registered RSU .  Re-election can avoid the re-clustering of vehicles and increasing the stability of the cluster.  The RSU allocates time slots to the moving cluster head vehicles based on the registration and cluster heads allocate time slots for CMs.  The RSU and CH broadcast messages is heard by all the CH and CMs vehicles in the cluster region and this solves the problem of hidden stations and results efficient utilization of the allocated slot by avoiding contention . The synchronization between RSU, CH, CM allows the protocol to ensure reliable and timely delivery of safety messages.  How ever, the protocol may not work in areas where the reare no RSUs deployed. 16
  • 17. Thank You Md. Hasibur Rashid & Soniya Yeasmin // MSc. In CSE, KUET, Bangladesh 17