SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5388
VANET CONNECTION PERFORMANCE ANALYSIS USING GPSR PROTOCOL
Ms.K.Nithya, Mrs.M.Udhayavani, Dr.G.Selvakumar, Ms.S.Aruna Devi
1PG Scholar, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India
2Associate professor, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India
3Dean, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India
4Assistant Professor, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Vehicular ad hoc network (VANET)
permits automobiles in imitation of communication about
the street yet are turning into a powerfully built solution to
improve the visitor’s safety. Both have confidence
management yet privacy protection move standard roles of
VANET but there needs in imitation of stand a tradeoff within
them. To implement the greedy perimeter stateless router
protocol (GPSR) the high level exploit ofthatbillofexchangeis
an energy-aware about the everyday position based (GPSR)
protocol. In the proposed energy-aware GPSR protocol,
referred to as much GPSR, we optimize the greedy forwarding
models as follows: a forwarding nodeprecedingdeterminesan
accept of neighbor nodes the nodes to that amount according
to the vacation spot than itself. The ounce of every such
neighbor node is then computed after remain the volume
regarding the fraction of the initial energy currently on hand
at the close node then the development including the
resolution regarding the near node Stability. This algorithm
can be implemented to get more efficient and shortest path
solution.
Key Words: Global positioning System, personal digital
assistance, Bloom Filter, GreedyPerimeterStatelessRouting
Protocol, Access Points.
1. INTRODUCTION
Simply defined, it is the use of a wireless network
infrastructure provide anytime anywhere communications
and access to information. There are many aspectsofmobile
computing and, sometimes, different terms are used torefer
to them. This chapter gives an overview of what mobile
computing has to offer and how it improves the quality of
our lives. Later chapters discuss the underlying wireless
networks and technologies that make mobile computing
applications possible. Mobile computing ishuman-computer
interaction by which a computer is expected to be
transported during normal usage. Tomorrow’s cars will
comprise many wireless communication systems and
mobility aware applications
1.1 General Network Environment
Performing localization in a more general network
environment where no special hardware for ranging is
available, the prior deployment of seed nodes is unknown,
the seed density is low, the nodedistributionisirregular,and
where nodes and seeds can move uncontrollably. Although
mobility makes other localization techniques increasingly
less accurate
1.2 VANET NETWORK
Vehicular networks are a new class of wirelessnetworksthat
have emerged by means of advances in wireless technology
and the automotive industry. These networks also known
with nameof VANETs, whichareconsideredasoneofthereal
applications of ad hoc network, for communication between
adjacent vehicles also between vehicles and stationary
equipment. The objective of VANET networks is to apply
some notifications, such as dissemination of alert messages,
reporting an accident between vehicles to reduce the
probability ofcollision,themultimediareal-timeapplications
and many other applications.
2. EXISTING SYSTEM
2.1 BLOOM HOPPING
Recent workshop bear shown that such would liesuperiorfor
nodes in Wi-Fi networkstogetherwithatall dynamictopology
after hold a list on 2 hop neighbours, namely, the neighbours
regarding its neighbours. This is important, for example,
because routing, clustering, or advice broadcasting after
whole the nodes of a devoted geographic vicinity. In this
paper, a scheme that utilizes Bloom filters for maintaining 2-
hop information. Furthermore, advanced a young 2-hop
broadcast algorithm making use of the unique habit
concerning our Bloom filter encoded near information.
2.2 BLOOM HOPPING PERFORMANCE
Bloom Hopping workshop superior the use of 1 Hz
beaconing, achieving in relation to eighty percent regarding
every 2-hop nodes into entire scenarios. The lacking 20
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5389
percent come beside the truth that growing burden over the
Wi-Fi channel lowers the communication strip fit in
accordance with interference. These nodes hold no chance
reception the advice within reality.
Fig-1 Bloom filter size in byte
2.3 Cardinality Estimation about Bloom Filters
The performance of the various Monte-Carlo simulations in
conformitywithshowtheoverall performanceoncardinality
estimation, i.e., in accordance with broadly the number
concerning elements within a Bloom filter and the forged
high-quality rate .simulation setup consists concerning
couple Bloom filters A or B forlorn the equal pain range then
the usage of the same accept regarding ax functions.
Fig-2. Estimation of Bloom Filters
The cardinality on a Bloom filter |B|canremainapproximated
in contrast after the real aggregation about elements |B|
inserted between that specific Bloom filter. The
approximation intently matches the perfect behavior till in
accordance with the factor where the Bloom filter is filled,i.e.,
almost every bits are put in to 1. The randomly stuff each
Bloom filters and done absolute to that amount1⁄3aboutthe
entries is delivered after both filters, i.e., both Bloom filters
overlap to 50 %. We performed simulations becauseone-of-a-
kind Bloom filter sizes and repeated each scan at least a
hundred instances along specific seeds in imitation of attain
statistically huge results.
3. PROPOSED SYSTEM
3.1 GEOGRAPHICAL ROUTING PROTOCOL
Greedy forwarding passion in which packets are forwarded in
imitation of the nodes up to expectation are geographically
closer in accordance with the destination. If at that place is no
longer any node closer in imitation of the destination, the
grasping forwarding can also occur in imitation of a deadlock.
In certain condition, the forwarding node switches in
accordance with the 2nd mode.
Perimeter dye between which the nodeforwardsthecustom
after one about its neighbors primarily based over the right-
hand rule. The forwarding node continues within ambit dye
till such finds a near to that amount is nearer after the
destination. Somemechanismsusesnodesatintersectionsor
street topology in conformity with edit higher routing
decisions. For instance, GPCR exploits a cessation detection
mechanism using records over one- and two-hop neighbors.
Fig-3 Geographical Environment in VANETs
4.3 VANET ACCESS POINTS
Given a avenue network together with an Internet get right
of entry to point, the Research hassle is in accordance with
reduce the end-to-end delivery Delay regarding packets in
conformity with the Internet get admission to point. This
paper, focus on one-way statistics delivery which is useful
for the time-critical reports, certain as much vehicle
accidents, road floor monitoring, and driving risks
4. SYSTEM SPECIFICATION
4.1 NETWORK SIMULATOR DISCRIPTION
Network Simulator (NS2) is a discrete event driven
simulator developed at UC Berkeley. It is part of the VINT
project. The goal of NS2 is to support networking research
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5390
and education. It is suitable for designing new protocols,
comparing different protocols and traffic evaluations.NS2
is developed as a collaborative environment. It is
distributed freely and open source. A large amount of
institutes and people in development and research use,
maintain and develop NS2. This increases the confidence
in it. Versions are available for FreeBSD, Linux, Solaris,
Windows and Mac OS X.
4.2 CYGWIN TOOL DESCRIPTION
Cygwin is free software that provides a Unix-like
environment and software tool set to users of any modern
x86 32-bit and 64-bit versions of MS-Windows (XP with
SP3/Server 20xx/Vista/7/8) and (using older versions of
Cygwin) some obsolete versions (95/98/ME/NT/2000/XP
without SP3) as well. Cygwin consists of a UNIX system call
emulation library, cygwin1.dll, together with a vast set of
GNU and other free software applications organized into a
large number of optional packages.
4.3 THE BASIC WIRELESS MODEL IN NS
The wireless model essentially consists of the
Mobile Node at the core, with additional supportingfeatures
that allows simulations of multi-hop ad-hoc networks,
wireless LANs etc. The Mobile Node object is a split object.
The C++ class Mobile Node is derived from parent class
Node. A Mobile Node thus is the basic Node object with
added functionalities of a wireless and mobile node like
ability to move within a given topology,abilitytoreceive and
transmit signals to and from a wireless channel etc. A major
difference between them, though, is that a Mobile Node is
not connected by means of Links to other nodes or Mobile
nodes. . In this section we shall describe the internals of
Mobile Node, its routing mechanisms, the routing protocols
dsdv, aodv, tora and dsr, creation of network stack allowing
channel access in Mobile Node, brief description of each
stack component, trace support and movement/traffic
scenario generation for wireless simulations.
5. METHODOLOGIES
5.1 NETWORK FORMATION
We consider a VANET in which numbers of vehicles are
separatedbycertaindistance(betweenconsecutivevehicles).
The VANET is purelybasedonvehicle-to-vehiclearchitecture.
Assume that vehicles move on a road . All vehicles are
equipped with GPS. Each vehicle is loaded with a location
digital map and is concerned aboutroadinformationaheadof
it on its way to forward direction. A lane segment ends at an
intersection. Each vehicle is equipped with an agentplatform
to support the proposed agency.
5.2 TRAFFIC MONITORING
The protocol performs real-time traffic monitoring using an
active mechanism. The primary mechanism for active
monitoring is probe message. Probe messageisa packetthat
is periodically sent by each node in the network. A node
which is located near a street vertex sends a probe message
and it is forwarded to the next nodes along the street edges
that are incident to the street vertex. The probe message is
dropped if there is any network gap along the street edge. If
the probe message is delivered to the destination vertex
then nodes near that vertex become aware that the vertex is
traversable at that moment and a return probe message is
sent back to its original sender.
5.3 LINK PREDICTION
The vital part of the protocol is its ability to predict
approximately the lifetime of a particular street edge. This
helps to determine the most suitable path from a sender
node to a receiver node. The link in the street graph would
be the edge. Lifetime of the link is determined based on the
distance between the neighboringnodesalongtheparticular
edge. After identifying the neighboring nodes, distance
between each of them would be computed based on each
nodes position in every two seconds. The communication
link lifetime information would be updated in the routing
packet. The route request send by the sender node reaches
the destination node along the different available paths.
5.4 BLOOM FILTER IMPLEMENTATION
A novel probabilistic 2-hop neighbormanagementapproach
using Bloom filters for application in dynamic wireless
networks. Compared to alternative solutions, the use of
Bloom filters provides best scalability of the system that
comes at the cost of a small false positive rate. Analytically
explored the Bloom filter properties forthisapplicationfield
and determined best suited Bloom filter sizes to keep this
false positive rate marginally small. This also helps to
prevent overload on the wireless channel and also explored
the capabilities of our solution to build a fundamental basis
for higher layer protocols. As an example, designed the
multi-hop broadcast protocol Bloom Hopping, which very
efficiently selects forwarders using the Bloom filter encoded
neighbor information.
5.5 PERFORMANCE EVALUATIONS
The method to improve reliability in position based VANET
reliable routing protocol, Bloom filter, was discussed. The
analysis shows that reliability in RIVER protocol could be
improved by incorporating it with link lifetime prediction. It
provides higher data packet throughput and reduced
transmission time.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5391
6. CONCLUSION
With the increasing popularity of vehicular Ad-Hoc
networking, we believe that our forwarding scheme opens
the first door for exploiting the potential benefit of the
vehicle trajectoryfortheperformanceofVANETnetworking.
As a future work, we will develop a data forwarding scheme
from stationary nodes (i.e., Internetaccesspoints)tomoving
vehicles for supporting the Infrastructure-to-Vehicle data
delivery in vehicular networks. This reverse forwarding to
moving vehicles is needed to deliver the road condition
information such as the bumps and holes for the driving
safety. However, this reverse data forwarding is a more
challenging problem because we need to consider both the
destination vehicle’s mobility and the packet delivery delay.
REFERENCES
[1] K. Lee, U. Lee, and M. Gerla, “Geo-Opportunistic Routing
for Vehicular Networks,” IEEE Communications Magazine,
vol. 48, no. 5, pp. 164–170, May 2010
[2] C. Sommer and F. Dressler, Vehicular Networking.
Cambridge University Press, Nov. 2014.
[3] C. Sommer, O. K. Tonguz, and F. Dressler, “Traffic
Information Systems: Efficient Message Dissemination via
Adaptive Beaconing,” IEEE Communications Magazine, vol.
49, no. 5, pp. 173–179, May 2011.
[4] ETSI, “Intelligent Transport Systems(ITS);Decentralized
Congestion Control Mechanisms for Intelligent Transport
Systems operating in the 5 GHz range; Access layer part,”
ETSI, TS 102 687 V1.1.1, Jul. 2011.
[5] F. Dressler, F. Klingler, C. Sommer, and R. Cohen, “Not All
VANET BroadcastsAretheSame:Context-AwareClassBased
Broadcast,” IEEE/ACM Transactions on Networking, vol.26,
no. 1, pp. 17–30, Feb. 2018.
[6] I. Stojmenovic, M. Seddigh, and J. Zunic, “DominatingSets
and Neighbor Elimination-BasedBroadcastingAlgorithmsin
Wireless Networks,” IEEE Transactions on Parallel and
Distributed Systems, vol. 13, no. 1, pp. 14–25, Jan. 2002.
[7] A. Khan, I. Stojmenovic, and N. Zaguia, “Parameter less
broadcasting in static to highly mobile wireless ad hoc,
sensor and actuator networks,” in 22nd IEEE International
Conference on Advanced Information Networking and
Applications (AINA 2008), Okinawa, Japan, Mar. 2008, pp.
620–62/7.
[8] E. Van de Velde and C. Blondia,“AdaptiveREACTprotocol
for Emergency Applications in Vehicular Networks,”in32nd
IEEE Conference on Local Computer Networks (LCN 2007),
Dublin, Ireland: IEEE, Oct. 2007, pp. 613–619.
[9] H. A. Omar, W. Zhuang, and L. Li,“VeMAC:ATDMA-Based
MAC Protocol for Reliable Broadcast in VANETs,” IEEE
Transactions on Mobile Computing, vol. 12, no. 9, pp. 1724–
1736, Sep. 2013
[10] K. Lee, J. Haerri, U. Lee, and M. Gerla, “Enhanced
Perimeter Routing for Geographic Forwarding Protocols in
Urban Vehicular Scenarios,” in IEEE Global
Telecommunications Conference (GLOBECOM 2007), 2nd
IEEE WorkshoponAutomotiveNetworkingandApplications
(Auto Net 2007), Washington, DC: IEEE, Nov.2007,pp.1–10.
[11] K. Lee, U. Lee, and M. Gerla, “Geo-Opportunistic Routing
for Vehicular Networks,” IEEE Communications Magazine,
vol. 48, no. 5, pp. 164–170, May 2010.
[12] B. H. Bloom, “Space/time trade-offs in hash coding with
allowable errors,” Communications oftheACM,vol.13,no.7,
pp. 422–426, Jul. 1970.
[13] F.J.Ros, P.M.Ruiz, andI.Stojmenovic,“Acknowledgment-
Based Broadcast Protocol for Reliable and Efficient Data
Dissemination in Vehicular Ad Hoc Networks,” IEEE
Transactions on Mobile Computing, vol. 11, no. 1, pp. 33–46,
Jan. 2012.
[14] C. Sommer, S. Joerer, M. Segata, O. K. Tonguz, R. Lo
Cigno, and F. Dressler, “How Shadowing Hurts Vehicular
Communications and How Dynamic Beaconing Can Help,”
IEEE Transactions on Mobile Computing, vol. 14, no. 7, pp.
1411–1421, Jul. 2015.

More Related Content

What's hot

Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
International Journal of Technical Research & Application
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
IJECEIAES
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
IJCNCJournal
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)
MNIT Jaipur
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Conference Papers
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
IJCNC
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
IJCNCJournal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
IJECEIAES
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
ijwmn
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
Eswar Publications
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
ijtsrd
 

What's hot (20)

Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
 

Similar to IRJET- Vanet Connection Performance Analysis using GPSR Protocol

Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET Journal
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
IRJET Journal
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
IRJET Journal
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
IRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
IRJET Journal
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET Journal
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
IRJET Journal
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET Journal
 
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
ijwmn
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET Journal
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
IRJET Journal
 
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET Journal
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
IRJET Journal
 

Similar to IRJET- Vanet Connection Performance Analysis using GPSR Protocol (20)

Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 

IRJET- Vanet Connection Performance Analysis using GPSR Protocol

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5388 VANET CONNECTION PERFORMANCE ANALYSIS USING GPSR PROTOCOL Ms.K.Nithya, Mrs.M.Udhayavani, Dr.G.Selvakumar, Ms.S.Aruna Devi 1PG Scholar, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India 2Associate professor, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India 3Dean, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India 4Assistant Professor, Department of ECE, Muthayammal Engineering College, Rasipuram, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Vehicular ad hoc network (VANET) permits automobiles in imitation of communication about the street yet are turning into a powerfully built solution to improve the visitor’s safety. Both have confidence management yet privacy protection move standard roles of VANET but there needs in imitation of stand a tradeoff within them. To implement the greedy perimeter stateless router protocol (GPSR) the high level exploit ofthatbillofexchangeis an energy-aware about the everyday position based (GPSR) protocol. In the proposed energy-aware GPSR protocol, referred to as much GPSR, we optimize the greedy forwarding models as follows: a forwarding nodeprecedingdeterminesan accept of neighbor nodes the nodes to that amount according to the vacation spot than itself. The ounce of every such neighbor node is then computed after remain the volume regarding the fraction of the initial energy currently on hand at the close node then the development including the resolution regarding the near node Stability. This algorithm can be implemented to get more efficient and shortest path solution. Key Words: Global positioning System, personal digital assistance, Bloom Filter, GreedyPerimeterStatelessRouting Protocol, Access Points. 1. INTRODUCTION Simply defined, it is the use of a wireless network infrastructure provide anytime anywhere communications and access to information. There are many aspectsofmobile computing and, sometimes, different terms are used torefer to them. This chapter gives an overview of what mobile computing has to offer and how it improves the quality of our lives. Later chapters discuss the underlying wireless networks and technologies that make mobile computing applications possible. Mobile computing ishuman-computer interaction by which a computer is expected to be transported during normal usage. Tomorrow’s cars will comprise many wireless communication systems and mobility aware applications 1.1 General Network Environment Performing localization in a more general network environment where no special hardware for ranging is available, the prior deployment of seed nodes is unknown, the seed density is low, the nodedistributionisirregular,and where nodes and seeds can move uncontrollably. Although mobility makes other localization techniques increasingly less accurate 1.2 VANET NETWORK Vehicular networks are a new class of wirelessnetworksthat have emerged by means of advances in wireless technology and the automotive industry. These networks also known with nameof VANETs, whichareconsideredasoneofthereal applications of ad hoc network, for communication between adjacent vehicles also between vehicles and stationary equipment. The objective of VANET networks is to apply some notifications, such as dissemination of alert messages, reporting an accident between vehicles to reduce the probability ofcollision,themultimediareal-timeapplications and many other applications. 2. EXISTING SYSTEM 2.1 BLOOM HOPPING Recent workshop bear shown that such would liesuperiorfor nodes in Wi-Fi networkstogetherwithatall dynamictopology after hold a list on 2 hop neighbours, namely, the neighbours regarding its neighbours. This is important, for example, because routing, clustering, or advice broadcasting after whole the nodes of a devoted geographic vicinity. In this paper, a scheme that utilizes Bloom filters for maintaining 2- hop information. Furthermore, advanced a young 2-hop broadcast algorithm making use of the unique habit concerning our Bloom filter encoded near information. 2.2 BLOOM HOPPING PERFORMANCE Bloom Hopping workshop superior the use of 1 Hz beaconing, achieving in relation to eighty percent regarding every 2-hop nodes into entire scenarios. The lacking 20
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5389 percent come beside the truth that growing burden over the Wi-Fi channel lowers the communication strip fit in accordance with interference. These nodes hold no chance reception the advice within reality. Fig-1 Bloom filter size in byte 2.3 Cardinality Estimation about Bloom Filters The performance of the various Monte-Carlo simulations in conformitywithshowtheoverall performanceoncardinality estimation, i.e., in accordance with broadly the number concerning elements within a Bloom filter and the forged high-quality rate .simulation setup consists concerning couple Bloom filters A or B forlorn the equal pain range then the usage of the same accept regarding ax functions. Fig-2. Estimation of Bloom Filters The cardinality on a Bloom filter |B|canremainapproximated in contrast after the real aggregation about elements |B| inserted between that specific Bloom filter. The approximation intently matches the perfect behavior till in accordance with the factor where the Bloom filter is filled,i.e., almost every bits are put in to 1. The randomly stuff each Bloom filters and done absolute to that amount1⁄3aboutthe entries is delivered after both filters, i.e., both Bloom filters overlap to 50 %. We performed simulations becauseone-of-a- kind Bloom filter sizes and repeated each scan at least a hundred instances along specific seeds in imitation of attain statistically huge results. 3. PROPOSED SYSTEM 3.1 GEOGRAPHICAL ROUTING PROTOCOL Greedy forwarding passion in which packets are forwarded in imitation of the nodes up to expectation are geographically closer in accordance with the destination. If at that place is no longer any node closer in imitation of the destination, the grasping forwarding can also occur in imitation of a deadlock. In certain condition, the forwarding node switches in accordance with the 2nd mode. Perimeter dye between which the nodeforwardsthecustom after one about its neighbors primarily based over the right- hand rule. The forwarding node continues within ambit dye till such finds a near to that amount is nearer after the destination. Somemechanismsusesnodesatintersectionsor street topology in conformity with edit higher routing decisions. For instance, GPCR exploits a cessation detection mechanism using records over one- and two-hop neighbors. Fig-3 Geographical Environment in VANETs 4.3 VANET ACCESS POINTS Given a avenue network together with an Internet get right of entry to point, the Research hassle is in accordance with reduce the end-to-end delivery Delay regarding packets in conformity with the Internet get admission to point. This paper, focus on one-way statistics delivery which is useful for the time-critical reports, certain as much vehicle accidents, road floor monitoring, and driving risks 4. SYSTEM SPECIFICATION 4.1 NETWORK SIMULATOR DISCRIPTION Network Simulator (NS2) is a discrete event driven simulator developed at UC Berkeley. It is part of the VINT project. The goal of NS2 is to support networking research
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5390 and education. It is suitable for designing new protocols, comparing different protocols and traffic evaluations.NS2 is developed as a collaborative environment. It is distributed freely and open source. A large amount of institutes and people in development and research use, maintain and develop NS2. This increases the confidence in it. Versions are available for FreeBSD, Linux, Solaris, Windows and Mac OS X. 4.2 CYGWIN TOOL DESCRIPTION Cygwin is free software that provides a Unix-like environment and software tool set to users of any modern x86 32-bit and 64-bit versions of MS-Windows (XP with SP3/Server 20xx/Vista/7/8) and (using older versions of Cygwin) some obsolete versions (95/98/ME/NT/2000/XP without SP3) as well. Cygwin consists of a UNIX system call emulation library, cygwin1.dll, together with a vast set of GNU and other free software applications organized into a large number of optional packages. 4.3 THE BASIC WIRELESS MODEL IN NS The wireless model essentially consists of the Mobile Node at the core, with additional supportingfeatures that allows simulations of multi-hop ad-hoc networks, wireless LANs etc. The Mobile Node object is a split object. The C++ class Mobile Node is derived from parent class Node. A Mobile Node thus is the basic Node object with added functionalities of a wireless and mobile node like ability to move within a given topology,abilitytoreceive and transmit signals to and from a wireless channel etc. A major difference between them, though, is that a Mobile Node is not connected by means of Links to other nodes or Mobile nodes. . In this section we shall describe the internals of Mobile Node, its routing mechanisms, the routing protocols dsdv, aodv, tora and dsr, creation of network stack allowing channel access in Mobile Node, brief description of each stack component, trace support and movement/traffic scenario generation for wireless simulations. 5. METHODOLOGIES 5.1 NETWORK FORMATION We consider a VANET in which numbers of vehicles are separatedbycertaindistance(betweenconsecutivevehicles). The VANET is purelybasedonvehicle-to-vehiclearchitecture. Assume that vehicles move on a road . All vehicles are equipped with GPS. Each vehicle is loaded with a location digital map and is concerned aboutroadinformationaheadof it on its way to forward direction. A lane segment ends at an intersection. Each vehicle is equipped with an agentplatform to support the proposed agency. 5.2 TRAFFIC MONITORING The protocol performs real-time traffic monitoring using an active mechanism. The primary mechanism for active monitoring is probe message. Probe messageisa packetthat is periodically sent by each node in the network. A node which is located near a street vertex sends a probe message and it is forwarded to the next nodes along the street edges that are incident to the street vertex. The probe message is dropped if there is any network gap along the street edge. If the probe message is delivered to the destination vertex then nodes near that vertex become aware that the vertex is traversable at that moment and a return probe message is sent back to its original sender. 5.3 LINK PREDICTION The vital part of the protocol is its ability to predict approximately the lifetime of a particular street edge. This helps to determine the most suitable path from a sender node to a receiver node. The link in the street graph would be the edge. Lifetime of the link is determined based on the distance between the neighboringnodesalongtheparticular edge. After identifying the neighboring nodes, distance between each of them would be computed based on each nodes position in every two seconds. The communication link lifetime information would be updated in the routing packet. The route request send by the sender node reaches the destination node along the different available paths. 5.4 BLOOM FILTER IMPLEMENTATION A novel probabilistic 2-hop neighbormanagementapproach using Bloom filters for application in dynamic wireless networks. Compared to alternative solutions, the use of Bloom filters provides best scalability of the system that comes at the cost of a small false positive rate. Analytically explored the Bloom filter properties forthisapplicationfield and determined best suited Bloom filter sizes to keep this false positive rate marginally small. This also helps to prevent overload on the wireless channel and also explored the capabilities of our solution to build a fundamental basis for higher layer protocols. As an example, designed the multi-hop broadcast protocol Bloom Hopping, which very efficiently selects forwarders using the Bloom filter encoded neighbor information. 5.5 PERFORMANCE EVALUATIONS The method to improve reliability in position based VANET reliable routing protocol, Bloom filter, was discussed. The analysis shows that reliability in RIVER protocol could be improved by incorporating it with link lifetime prediction. It provides higher data packet throughput and reduced transmission time.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5391 6. CONCLUSION With the increasing popularity of vehicular Ad-Hoc networking, we believe that our forwarding scheme opens the first door for exploiting the potential benefit of the vehicle trajectoryfortheperformanceofVANETnetworking. As a future work, we will develop a data forwarding scheme from stationary nodes (i.e., Internetaccesspoints)tomoving vehicles for supporting the Infrastructure-to-Vehicle data delivery in vehicular networks. This reverse forwarding to moving vehicles is needed to deliver the road condition information such as the bumps and holes for the driving safety. However, this reverse data forwarding is a more challenging problem because we need to consider both the destination vehicle’s mobility and the packet delivery delay. REFERENCES [1] K. Lee, U. Lee, and M. Gerla, “Geo-Opportunistic Routing for Vehicular Networks,” IEEE Communications Magazine, vol. 48, no. 5, pp. 164–170, May 2010 [2] C. Sommer and F. Dressler, Vehicular Networking. Cambridge University Press, Nov. 2014. [3] C. Sommer, O. K. Tonguz, and F. Dressler, “Traffic Information Systems: Efficient Message Dissemination via Adaptive Beaconing,” IEEE Communications Magazine, vol. 49, no. 5, pp. 173–179, May 2011. [4] ETSI, “Intelligent Transport Systems(ITS);Decentralized Congestion Control Mechanisms for Intelligent Transport Systems operating in the 5 GHz range; Access layer part,” ETSI, TS 102 687 V1.1.1, Jul. 2011. [5] F. Dressler, F. Klingler, C. Sommer, and R. Cohen, “Not All VANET BroadcastsAretheSame:Context-AwareClassBased Broadcast,” IEEE/ACM Transactions on Networking, vol.26, no. 1, pp. 17–30, Feb. 2018. [6] I. Stojmenovic, M. Seddigh, and J. Zunic, “DominatingSets and Neighbor Elimination-BasedBroadcastingAlgorithmsin Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 1, pp. 14–25, Jan. 2002. [7] A. Khan, I. Stojmenovic, and N. Zaguia, “Parameter less broadcasting in static to highly mobile wireless ad hoc, sensor and actuator networks,” in 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan, Mar. 2008, pp. 620–62/7. [8] E. Van de Velde and C. Blondia,“AdaptiveREACTprotocol for Emergency Applications in Vehicular Networks,”in32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, Ireland: IEEE, Oct. 2007, pp. 613–619. [9] H. A. Omar, W. Zhuang, and L. Li,“VeMAC:ATDMA-Based MAC Protocol for Reliable Broadcast in VANETs,” IEEE Transactions on Mobile Computing, vol. 12, no. 9, pp. 1724– 1736, Sep. 2013 [10] K. Lee, J. Haerri, U. Lee, and M. Gerla, “Enhanced Perimeter Routing for Geographic Forwarding Protocols in Urban Vehicular Scenarios,” in IEEE Global Telecommunications Conference (GLOBECOM 2007), 2nd IEEE WorkshoponAutomotiveNetworkingandApplications (Auto Net 2007), Washington, DC: IEEE, Nov.2007,pp.1–10. [11] K. Lee, U. Lee, and M. Gerla, “Geo-Opportunistic Routing for Vehicular Networks,” IEEE Communications Magazine, vol. 48, no. 5, pp. 164–170, May 2010. [12] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications oftheACM,vol.13,no.7, pp. 422–426, Jul. 1970. [13] F.J.Ros, P.M.Ruiz, andI.Stojmenovic,“Acknowledgment- Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 11, no. 1, pp. 33–46, Jan. 2012. [14] C. Sommer, S. Joerer, M. Segata, O. K. Tonguz, R. Lo Cigno, and F. Dressler, “How Shadowing Hurts Vehicular Communications and How Dynamic Beaconing Can Help,” IEEE Transactions on Mobile Computing, vol. 14, no. 7, pp. 1411–1421, Jul. 2015.