Vehicular Ad-Hoc Networks (VANETs) are the networks of vehicles which are characterized with high mobility and dynamic changing topology. Most of the communication interchanges in VANETs take place in broadcasting mode, which is supposed to be the simplest way to disseminate (spread) emergency
messages all over the vehicular network. This broadcasting technique assures the optimal delivery of emergency messages all over the VANET. However, it also results in unwanted flooding of messages which causes severe contention and collisions in VANETs leading to Broadcast Storm Problem (BSP) and in turn affects the overall performance of VANETs. A Multitude of research work have proposed Broadcast Storm
Suppression Algorithms (BSSA) to control this Broadcast Storm. These mechanisms tried to control BSP by either reducing the number of rebroadcasting/ relaying nodes or by identifying the best relay node. The suppression mechanisms help to overcome BSP to certain extent, still there is need to still reduce the number of rebroadcasting nodes in existing mechanisms and also to identify the best possible rebroadcasting node.
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...ijmnct
Broadcasting is the process of sending a message from one node to all other nodes in an ad hoc network. It
is a fundamental operation for communication in ad hoc networks as it allows for the update of network
information, route discovery and other operations as well. In this paper, we review the pros and cons of
different broadcasting methods in VANET. Also, the broadcast storm problem and broadcast suppression
techniques for broadcasting in Vehicular Ad hoc Networks (VANET) are discussed, because blindly
broadcasting the packets cause several problems that affect the quality of service in VANET. In order to
avoid broadcast storm problem this paper provides a survey of some of the existing broadcast suppression
techniques in vehicular environment
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
Manjusha Deshmukh,Ratnadeep Deshmukh, Sangeeta Kakarwal, "Mobility Aware Refined Counter Based Broadcasting Model of MANET", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net ,published by Fast Track Publications
Abstract
The MANET is a special type of wireles mobile network in which mobile hosts can communicate without any aid of established infrastructure. Broadcast or flooding is a dissemination technique oparamount importance in mobile ad-hoc networks MANETs are generating lots of interest due to their dynamic topology and decentralized administration Due to the mobility of nodes there are many problem occurred during the packet transmission. Basic routing protocols such as Ad hoc on Demand Distance Vecto(AODV), Dynamic source routing (DSR) could lead toissues such as Broadcast Storm Problem, Large power consumption, link failure due to mobility. Counter based approaches inhibit a node from broadcasting a packet based on number of copies of the broadcaspacket received by the node within a random accessdelay time. It relies on the threshold value to decide whether or not to forward broadcast packet. In this paper, model is proposed which refines the counter based threshold based on network density and the mobility of nodes. The paper refined the sparse threshold as low sparse threshold and high sparse threshold and dense threshold as low dense threshold and high dense threshold.
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
User mobility in wireless data networks is increasing because of technological advances and the
desire for voice and multimedia applications. These applications, however, require fast handoffs
between base stations to maintain the quality of the connections. In this paper, the authors
describe the use of novel and efficient data structure which dynamically allocates guard channel
for handoffs and introduces the concept of channel borrowing strategy. The proposed scheme
allocates the guard channels for handoff requests dynamically, based on the traffic load for
certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and handoff calls. This approach maximizes the channel utilization. The simulation results prove that the channel borrowing scheme improves the overall throughput.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...ijmnct
Broadcasting is the process of sending a message from one node to all other nodes in an ad hoc network. It
is a fundamental operation for communication in ad hoc networks as it allows for the update of network
information, route discovery and other operations as well. In this paper, we review the pros and cons of
different broadcasting methods in VANET. Also, the broadcast storm problem and broadcast suppression
techniques for broadcasting in Vehicular Ad hoc Networks (VANET) are discussed, because blindly
broadcasting the packets cause several problems that affect the quality of service in VANET. In order to
avoid broadcast storm problem this paper provides a survey of some of the existing broadcast suppression
techniques in vehicular environment
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
Manjusha Deshmukh,Ratnadeep Deshmukh, Sangeeta Kakarwal, "Mobility Aware Refined Counter Based Broadcasting Model of MANET", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net ,published by Fast Track Publications
Abstract
The MANET is a special type of wireles mobile network in which mobile hosts can communicate without any aid of established infrastructure. Broadcast or flooding is a dissemination technique oparamount importance in mobile ad-hoc networks MANETs are generating lots of interest due to their dynamic topology and decentralized administration Due to the mobility of nodes there are many problem occurred during the packet transmission. Basic routing protocols such as Ad hoc on Demand Distance Vecto(AODV), Dynamic source routing (DSR) could lead toissues such as Broadcast Storm Problem, Large power consumption, link failure due to mobility. Counter based approaches inhibit a node from broadcasting a packet based on number of copies of the broadcaspacket received by the node within a random accessdelay time. It relies on the threshold value to decide whether or not to forward broadcast packet. In this paper, model is proposed which refines the counter based threshold based on network density and the mobility of nodes. The paper refined the sparse threshold as low sparse threshold and high sparse threshold and dense threshold as low dense threshold and high dense threshold.
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
User mobility in wireless data networks is increasing because of technological advances and the
desire for voice and multimedia applications. These applications, however, require fast handoffs
between base stations to maintain the quality of the connections. In this paper, the authors
describe the use of novel and efficient data structure which dynamically allocates guard channel
for handoffs and introduces the concept of channel borrowing strategy. The proposed scheme
allocates the guard channels for handoff requests dynamically, based on the traffic load for
certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and handoff calls. This approach maximizes the channel utilization. The simulation results prove that the channel borrowing scheme improves the overall throughput.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Network parameters impact on dynamic transmission power control in vehicular ...ijngnjournal
the throughput of the wireless vehicular network and decrease the delay of the message communication
between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability
of the communication in the vehicular network becomes so vital so that event created messages should
reach to all the moving network nodes. It becomes necessary that there should be no interference from
outside of the network and all the neighbor nodes should lie in the transmission range of the
reference vehicular node. Transmission range is directly proportional to the transmission power the
moving node. If the transmission power will be high, the interference increases that can cause higher
delay in message reception at receiver end, hence the performance of the network decreased. In this
paper, it is analyzed that how transmission power can be controlled by considering other different
parameter of the network such as; density, distance between moving nodes, different types of messages
dissemination with their priority, selection of an antenna also affects on the transmission power. The
dynamic control of transmission power in VANET serves also for the optimization of the resources
where it needs, can be decreased and increased depending on the circumstances of the network.
Different applications and events of different types also cause changes in transmission power to enhance
the reachability. The analysis in this paper is comprised of density, distance with single hop and multi
hop message broadcasting based dynamic transmission power control as well as antenna selection and
applications based. Some summarized tables are produced according to the respective parameters of
the vehicular network. At the end some valuable observations are made and discussed in detail. This
paper concludes with a grand summary of all the protocols discussed in it.
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL.
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...Eswar Publications
It is suggested that multi-path routing is advantageous for applications with high traffic data characteristics, especially in the WSN environment. Sensor networks which transmit video will have to respond to the high data characteristic inherent in video data. Throughput, delay and packet loss are important metrics when considering video traffic. This work measures the performance of four multi-path routing protocols, MAOMDV, AOMDV, AntHocNet and MP-DSR in the WSN environment. It is shown that MAOMDV outperforms the other multi-path routing protocols in terms of the aforementioned metrics.
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
Abstract— In mobile ad hoc networks multihop routing is performed in order to communicate the packets from the source to destination. The nodes within these networks are dynamic due which frequent path change occurs which can cause frequent link breakages and induces route discoveries. These route discoveries can introduce overhead in terms of contention, collision and rebroadcasts which are non-negligible. Here, the paper discusses a hexagonal based clustering for reducing rebroadcasts thus maximizing the lifetime of the networks and providing coverage area thus reducing the end – end delays.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Network parameters impact on dynamic transmission power control in vehicular ...ijngnjournal
the throughput of the wireless vehicular network and decrease the delay of the message communication
between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability
of the communication in the vehicular network becomes so vital so that event created messages should
reach to all the moving network nodes. It becomes necessary that there should be no interference from
outside of the network and all the neighbor nodes should lie in the transmission range of the
reference vehicular node. Transmission range is directly proportional to the transmission power the
moving node. If the transmission power will be high, the interference increases that can cause higher
delay in message reception at receiver end, hence the performance of the network decreased. In this
paper, it is analyzed that how transmission power can be controlled by considering other different
parameter of the network such as; density, distance between moving nodes, different types of messages
dissemination with their priority, selection of an antenna also affects on the transmission power. The
dynamic control of transmission power in VANET serves also for the optimization of the resources
where it needs, can be decreased and increased depending on the circumstances of the network.
Different applications and events of different types also cause changes in transmission power to enhance
the reachability. The analysis in this paper is comprised of density, distance with single hop and multi
hop message broadcasting based dynamic transmission power control as well as antenna selection and
applications based. Some summarized tables are produced according to the respective parameters of
the vehicular network. At the end some valuable observations are made and discussed in detail. This
paper concludes with a grand summary of all the protocols discussed in it.
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL.
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...Eswar Publications
It is suggested that multi-path routing is advantageous for applications with high traffic data characteristics, especially in the WSN environment. Sensor networks which transmit video will have to respond to the high data characteristic inherent in video data. Throughput, delay and packet loss are important metrics when considering video traffic. This work measures the performance of four multi-path routing protocols, MAOMDV, AOMDV, AntHocNet and MP-DSR in the WSN environment. It is shown that MAOMDV outperforms the other multi-path routing protocols in terms of the aforementioned metrics.
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
Abstract— In mobile ad hoc networks multihop routing is performed in order to communicate the packets from the source to destination. The nodes within these networks are dynamic due which frequent path change occurs which can cause frequent link breakages and induces route discoveries. These route discoveries can introduce overhead in terms of contention, collision and rebroadcasts which are non-negligible. Here, the paper discusses a hexagonal based clustering for reducing rebroadcasts thus maximizing the lifetime of the networks and providing coverage area thus reducing the end – end delays.
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...IJCNCJournal
The primary goal of Vehicular Ad Hoc Networks (VANETs) is to support the secure transmission of applications via vehicles. Broadcasting is an important form of communication in the VANET network. Since there is no recovery for broadcast frames in the VANET network, the rate of receiving safe messages can become very low, especially in dense network conditions. In this paper, we present a new broadcast coordination mechanism with the aim of adaptive control of CW size to improve the received rate of safety messages. Each vehicle in the VANET can identify current local conditions of the network such as collisions or congestion by analyzing recently successfully sent and received frames. Based on the analysis of the received frame rate at each vehicle, the proposed mechanism controls the CW size and uses the EDCA mechanism to prioritize the important data flows. Using a combination of simulation tools in VANET, we build simulation scenarios in different network conditions to evaluate the received rate of safety messages compared to the default mechanism in the 802.11p standard. Simulation results have demonstrated that the proposed mechanism improves the received rate of safety messages better than the default mechanism in the 802.11p standard in all cases.
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...IJCNCJournal
The primary goal of Vehicular Ad Hoc Networks (VANETs) is to support the secure transmission of applications via vehicles. Broadcasting is an important form of communication in the VANET network. Since there is no recovery for broadcast frames in the VANET network, the rate of receiving safe messages can become very low, especially in dense network conditions. In this paper, we present a new broadcast coordination mechanism with the aim of adaptive control of CW size to improve the received rate of safety messages. Each vehicle in the VANET can identify current local conditions of the network such as collisions or congestion by analyzing recently successfully sent and received frames. Based on the analysis of the received frame rate at each vehicle, the proposed mechanism controls the CW size and uses the EDCA mechanism to prioritize the important data flows. Using a combination of simulation tools in VANET, we build simulation scenarios in different network conditions to evaluate the received rate of safety messages compared to the default mechanism in the 802.11p standard. Simulation results have demonstrated that the proposed mechanism improves the received rate of safety messages better than the default mechanism in the 802.11p standard in all cases.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in each grid in WSN. In the proposed approach, sink select one node in each grid as Monitor Node. In addition, sink defines congestion candidate grids. Each Monitor Node in congestion candidate grids continually monitors the network and fetches the fuzzy controller inputs in order to determine level of congestion in each grid. Based on the congestion level, packets forward through the grid or relay nodes. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
Adaptive congestion control protocol (accp) for wireless sensor networksijwmn
In Wireless Sensor Networks (WSN) when an event is detected there is an increase in data traffic that might
lead to packets being transmitted through the network close to the packet handling capacity of the WSN.
The WSN experiences a decrease in network performance due to packet loss, long delays, and reduction in
throughput. In this paper we developed an adaptive congestion control algorithm that monitors network
utilization and adjust traffic levels and/or increases network resources to improve throughput and conserve
energy. The traffic congestion control protocol DelStatic is developed by introducing backpressure
mechanism into NOAH. We analyzed various routing protocols and established that DSR has a higher
resource congestion control capability. The proposed protocol, ACCP uses a sink switching algorithm to
trigger DelStatic or DSR feedback to a congested node based on its Node Rank. From the simulation
results, ACCP protocol does not only improve throughput but also conserves energy which is critical to
sensor application survivability on the field. Our Adaptive Congestion control achieved reliability, high
throughput and energy efficiency.
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...josephjonse
In vehicular ad hoc networks, the dynamic change in transmission power is very effective to increase the throughput of the wireless vehicular network and decrease the delay of the message communication between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability of the communication in the vehicular network becomes so vital so that event created messages should reach to all the moving network nodes. It becomes necessary that there should be no interference from outside of the network and all the neighbor nodes should lie in the transmission range of the reference vehicular node. Transmission range is directly proportional to the transmission power the moving node. If the transmission power will be high, the interference increases that can cause higher delay in message reception at receiver end, hence the performance of the network decreased. In this paper, it is analyzed that how transmission power can be controlled by considering other different parameter of the network such as; density, distance between moving nodes, different types of messages dissemination with their priority, selection of an antenna also affects on the transmission power. The dynamic control of transmission power in VANET serves also for the optimization of the resources where it needs, can be decreased and increased depending on the circumstances of the network. Different applications and events of different types also cause changes in transmission power to enhance the reachability. The analysis in this paper is comprised of density, distance with single hop and multi hop message broadcasting based dynamic transmission power control as well as antenna selection and applications based. Some summarized tables are produced according to the respective parameters of the vehicular network. At the end some valuable observations are made and discussed in detail. This paper concludes with a grand summary of all the protocols discussed in it.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...IJCNCJournal
Vehicular ad hoc network (VANET) is a subdivision of the mobile ad hoc networks which uses the moving
vehicles as mobile nodes to form the mobile network. In conventional vehicular communications, the
restricted radio frequency bandwidth affects the network performances. Therefore, Visible Light
Communication (VLC) is integrated with the growing vehicular ad hoc network to obtain high data rate
and less energy consumption during the communication. In this paper, vehicular communication is
integrated with visible light communication to avoid the issues caused by the restricted radio frequency
bandwidth. Moreover, the Routing using Biogeography Based Optimization (RBBO) is proposed to develop
an optimal route between the source vehicles to the destination. This research performs two different
communications such as vehicle to vehicle and vehicle to the infrastructure. The performance of the RBBOVLC-VANET method is analyzed by means of throughput, packet delivery ratio, delay and routing
overhead as well as these performances are compared with the existing method namely ant colony
optimization based routing protocol. The throughput of the routing using the biogeography based
optimization method is 589.763 kbps for 500 nodes which is high when compared to the existing method.
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...StevePrice20
Vehicular ad hoc network (VANET) is a subdivision of the mobile ad hoc networks which uses the moving vehicles as mobile nodes to form the mobile network. In conventional vehicular communications, the restricted radio frequency bandwidth affects the network performances. Therefore, Visible Light Communication (VLC) is integrated with the growing vehicular ad hoc network to obtain high data rate and less energy consumption during the communication. In this paper, vehicular communication is integrated with visible light communication to avoid the issues caused by the restricted radio frequency bandwidth. Moreover, the Routing using Biogeography Based Optimization (RBBO) is proposed to develop an optimal route between the source vehicles to the destination. This research performs two different communications such as vehicle to vehicle and vehicle to the infrastructure. The performance of the RBBOVLC-VANET method is analyzed by means of throughput, packet delivery ratio, delay and routing overhead as well as these performances are compared with the existing method namely ant colony optimization based routing protocol. The throughput of the routing using the biogeography based optimization method is 589.763 kbps for 500 nodes which is high when compared to the existing method.
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
Ad hoc networks was developed in the 2000s, they was highly used in dynamic environment, particularly
for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks. These were
motivated by the current vehicular industry trend that is leading to a new transport system generation
based on the use of new communication technologies in order to provide many services to passengers, the
fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination, such as the alert message emitting,
that be exchanged for drivers protection on the road. Sharing such information between vehicles helps to
anticipate potentially dangerous situations, as well as planning better routes during congestion situations.
The current paper attempts to model and simulate VANET Networks, aiming to analyze and evaluate
security information dissemination approaches and mechanisms used in this type of networks in several
exchanges conditions. The second objective is to identify their limitations and suggest a new improved
approach. This study was conducted as part of our research project entitled “Simulation & VANETs”,
where we justify and validate our approach using modeling and simulation techniques and tools used in
this domain.
Similar to ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR AD HOC NETWORKS (20)
THE PRESSURE SIGNAL CALIBRATION TECHNOLOGY OF THE COMPREHENSIVE TEST SYSTEMieijjournal
The pressure signal calibration technology of the comprehensive test system which involved pressure
sensors was studied in this paper. The melioration of pressure signal calibration methods was elaborated.
Compared with the calibration methods in the lab and after analyzing the relevant problems,the
calibration technology online was achieved. The test datum and reasons of measuring error analyzed,the
uncertainty evaluation was given and then this calibration method was proved to be feasible and accurate.
8 th International Conference on Education (EDU 2023)ieijjournal
8th International Conference on Education (EDU 2023) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and
applications impacts and challenges of education. The conference documents practical and
theoretical results which make a fundamental contribution for the development of
Educational research. The goal of this conference is to bring together researchers and
practitioners from academia and industry to focus on Educational advancements and
establishing new collaborations in these areas. Original research papers, state-of-the-art
reviews are invited for publication in all areas of Education
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is a rapidly developing the field. The study of informatics involves human-computer
interaction and how an interface can be built to maximize user efficiency. Due to the growth in IT,
individuals and organizations increasingly process information digitally. This has led to the study of
informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
The Informatics Engineering, an International Journal (IEIJ) is an open access peer-reviewed journal that
publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to
bring together researchers and practitioners from academia and industry to focus on the human use of
computing fields such as communication, mathematics, multimedia, and human-computer interaction
design and establishing new collaborations in these areas.
Big data is a prominent term which characterizes the improvement and availability of data in all three
formats like structure, unstructured and semi formats. Structure data is located in a fixed field of a record
or file and it is present in the relational data bases and spreadsheets whereas an unstructured data file
includes text and multimedia contents. The primary objective of this big data concept is to describe the
extreme volume of data sets i.e. both structured and unstructured. It is further defined with three “V”
dimensions namely Volume, Velocity and Variety, and two more “V” also added i.e. Value and Veracity.
Volume denotes the size of data, Velocity depends upon the speed of the data processing, Variety is
described with the types of the data, Value which derives the business value and Veracity describes about
the quality of the data and data understandability. Nowadays, big data has become unique and preferred
research areas in the field of computer science. Many open research problems are available in big data
and good solutions also been proposed by the researchers even though there is a need for development of
many new techniques and algorithms for big data analysis in order to get optimal solutions. In this paper,
a detailed study about big data, its basic concepts, history, applications, technique, research issues and
tools are discussed.
LOW POWER SI CLASS E POWER AMPLIFIER AND RF SWITCH FOR HEALTH CAREieijjournal
This research was to design a 2.4 GHz class E Power Amplifier (PA) for health care, with 0.18um
Semiconductor Manufacturing International Corporation CMOS technology by using Cadence software.
And also RF switch was designed at cadence software with power Jazz 180nm SOI process. The ultimate
goal for such application is to reach high performance and low cost, and between high performance and
low power consumption design. This paper introduces the design of a 2.4GHz class E power amplifier and
RF switch design. PA consists of cascade stage with negative capacitance. This power amplifier can
transmit 16dBm output power to a 50Ω load. The performance of the power amplifier and switch meet the
specification requirements of the desired
PRACTICE OF CALIBRATION TECHNOLOGY FOR THE SPECIAL TEST EQUIPMENT ieijjournal
For the issues encountered in the special test equipment calibration work, based on the characteristics of
special test equipment, the calibration point selection,classification of calibration parameters and
calibration method of special test equipment are briefly introduced in this paper, at the same time, the
preparation and management requirements of calibration specification are described.
8th International Conference on Signal, Image Processing and Embedded Systems...ieijjournal
8th International Conference on Signal, Image Processing and Embedded Systems (SIGEM 2022) is a forum for presenting new advances and research results in the fields of Digital Image Processing and Embedded Systems.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
International Conference on Artificial Intelligence Advances (AIAD 2022) ieijjournal
International Conference on Artificial Intelligence Advances (AIAD 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Call for papers...!!!
Informatics Engineering, an International Journal (IEIJ)
https://airccse.org/journal/ieij/index.html
Submission Deadline: July 02, 2022
Here's where you can reach us : ieijjournal@yahoo.com or ieij@aircconline.com
http://coneco2009.com/submissions/imagination/home.html
8th International Conference on Artificial Intelligence and Soft Computing (A...ieijjournal
Call for papers...!!!
8th International Conference on Artificial Intelligence and Soft Computing (AIS 2022)
August 20 ~ 21, 2022, Chennai, India
https://csit2022.org/ais/index
Submission Deadline: July 02, 2022
Here's where you can reach us : ais@csit2022.org or aisconf@yahoo.com
https://csit2022.org/submission/index.php
Informatics Engineering, an International Journal (IEIJ) ieijjournal
Informatics Engineering, an International Journal (IEIJ)
Submission Deadline : June 18, 2022
submission link
http://coneco2009.com/submissions/imagination/home.html
website link
https://airccse.org/journal/ieij/index.html
contact us
ieijjournal@yahoo.com or ieij@aircconline.com
International Conference on Artificial Intelligence Advances (AIAD 2022)ieijjournal
International Conference on Artificial Intelligence Advances (AIAD 2022)
August 27 ~ 28, 2022, Virtual Conference
Webpage URL:
https://www.aiad2022.org/
Submission Deadline: June 04, 2022
Contact us:
Here's where you can reach us: aiad@aiad2022.org (or) aiadconf@yahoo.com
Informatics Engineering, an International Journal (IEIJ)ieijjournal
call for paper
Informatics Engineering, an International Journal (IEIJ)
Submission Deadline : May 28, 2022
Submit your paper through online :
http://coneco2009.com/submissions/imagination/home.html
Submit your paper through mail:
ieijjournal@yahoo.com or ieij@aircconline.com
for more details:
https://airccse.org/journal/ieij/index.html
Informatics Engineering, an International Journal (IEIJ) ieijjournal
Call for paper
Informatics Engineering, an International Journal (IEIJ)
https://airccse.org/journal/ieij/index.html
Submission Deadline : May 14, 2022
Contact Us
Here's where you can reach us : ieijjournal@yahoo.com or ieij@aircconline.com
Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html
LOW POWER SI CLASS E POWER AMPLIFIER AND RF SWITCH FOR HEALTH CAREieijjournal
This research was to design a 2.4 GHz class E Power Amplifier (PA) for health care, with 0.18um
Semiconductor Manufacturing International Corporation CMOS technology by using Cadence software.
And also RF switch was designed at cadence software with power Jazz 180nm SOI process. The ultimate goal for such application is to reach high performance and low cost, and between high performance and low power consumption design. This paper introduces the design of a 2.4GHz class E power amplifier and
RF switch design. PA consists of cascade stage with negative capacitance. This power amplifier can
transmit 16dBm output power to a 50Ω load. The performance of the power amplifier and switch meet the specification requirements of the desired.
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONieijjournal
ASIC (Application Specific Integrated Circuit) design verification takes as long as the designers take to describe, synthesis and implement the design. The hybrid approach, where the design is first prototyped on an FPGA (Field-Programmable Gate Array) platform for functional validation and then implemented as
an ASIC allows earlier defect detection in the design process and thus allows a significant time saving.
This paper deals with a CMOS standard-cell ASIC implementation of a SoC (System on Chip) based on the
OpenRISC processor for Voice over IP (VoIP) application; where a hybrid approach is adopted. The
architecture of the design is mainly based on the reuse of IPs cores described at the RTL level. This RTL code is technology-independent; hence the design can be ported easily from FPGA to ASIC.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is a rapidly developing the field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR AD HOC NETWORKS
1. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
DOI : 10.5121/ieij.2015.3202 11
ISSUES AND CHALLENGES IN BROADCAST STORM
SUPPRESSION ALGORITHMS OF VEHICULAR AD
HOC NETWORKS
M. Chitra1
and S. Siva Sathya2
1,2
Department of Computer Science, Pondicherry University,
Kalapet, Puducherry – 605014
ABSTRACT
Vehicular Ad-Hoc Networks (VANETs) are the networks of vehicles which are characterized with high
mobility and dynamic changing topology. Most of the communication interchanges in VANETs take place
in broadcasting mode, which is supposed to be the simplest way to disseminate (spread) emergency
messages all over the vehicular network. This broadcasting technique assures the optimal delivery of
emergency messages all over the VANET. However, it also results in unwanted flooding of messages which
causes severe contention and collisions in VANETs leading to Broadcast Storm Problem (BSP) and in turn
affects the overall performance of VANETs. A Multitude of research work have proposed Broadcast Storm
Suppression Algorithms (BSSA) to control this Broadcast Storm. These mechanisms tried to control BSP by
either reducing the number of rebroadcasting/ relaying nodes or by identifying the best relay node. The
suppression mechanisms help to overcome BSP to certain extent, still there is need to still reduce the
number of rebroadcasting nodes in existing mechanisms and also to identify the best possible
rebroadcasting node. This would help to mitigate BSP completely and efficiently. This paper presents a
comparative analysis of various prominent BSSA in order to identify the underlying issues and challenges
in controlling BSP completely. The outcome of this paper would provide the requirements for developing
an efficient BSSA overcoming the identified issues and challenges.
KEYWORDS
VANET, BSP, Broadcast Suppression, Data Dissemination
1.INTRODUCTION
A Vehicular Ad hoc Network (VANET) is a collection of vehicles communicating through
wireless technology to improve road safety[1]. In VANET, every vehicle is equipped with
wireless communication infrastructure which could collaboratively disseminate data about any
road activity (viz. accidents, traffic jams, road construction warning, shadowing effect, bad
weather condition etc.) to other vehicles inside a Range of Broadcast (ROB) area [2]. The Data
Dissemination (communication among participant vehicles) in VANET within ROB is mostly
carried out through “Broadcasting” technique which could be as follows [3]:
1. Simple Broadcasting: The messages are simply broadcast to all the vehicles in the
network without using any BSSA. It is also referred to as blind flooding [4].
2. Probabilistic and Delay based Broadcasting: The messages are broadcast in a
probabilistic manner based on a certain value of probability. The value of probability is
calculated as a ratio between the distance of the sending &receiving vehicle and the
average transmission range [5].
2. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
12
3. Area based Broadcasting: The messages are broadcast based on the ROB of the
transmitting and receiving vehicle locations. In this method, distance information is used
to decide which nodes should rebroadcast [6].
4. Neighbour Knowledge based Broadcasting: The messages are broadcast based on the
knowledge of the neighboring nodes. In this method the vehicle needs to share 1-hop or
2-hop neighborhood information with other nodes via periodic exchange of hello
messages to decide on the next forwarding node. However, this method is not suitable for
vehicular environments since messages become outdated due to the high mobility of
vehicles [7].
These four types of Broadcasting help to reduce the road accidents and alert the drivers about any
emergency event in a particular area, thereby securing the safety in road transport [8].
Broadcasting assures for optimal delivery of emergency messages, by transmitting them
redundantly. This redundancy is a resultant of blindly broadcasting the same message in a ROB to
ensure its optimal delivery. However, this kind of blind broadcasting of ESM may lead to severe
contention and collisions within a ROB and this triggers for a Broadcast Strom Problem
(BSP).The Broadcast Strom Problem occurs when multiple vehicles attempt to transmit the ESM
at the same time, thereby causing high data traffic, network congestion, message collisions,
service disruption and extra delay in VANET [9]. The performance of VANET gets affected due
to BSP.
Existing Research proposed various Broadcast Storm Suppression Algorithms (BSSAs) to
mitigate BSP. Majority of these algorithms suppress Broadcast Storm by reducing the redundancy
of rebroadcasting messages either by limiting the number of rebroadcasting/relay nodes or
identifying the best rebroadcasting nodes. However, prominent BSSA poses certain issues and
challenges in reducing the number of rebroadcasting nodes in ROB and identifying the best
possible relaying node. These issues and challenges have to be addressed by which BSP is
thwarted completely and effective performance of VANET is ensured.
This paper is motivated to analyze the existing BSSAs along with their strategies in mitigating
BSP and also their limitations. The inference perceived from this comparative analysis would
help to draw the requirements for proposing an efficient BSSA that could enhance its scalability,
reliability, reachability, dissemination time etc. in a VANET, thereby reducing the number of
rebroadcasting nodes and identifying the best possible broadcasting node.
The remainder of this paper is organized as follows: Section 2 presents an overview of
Broadcasting techniques and Broadcast Storm problem. Existing BSSA and their classification
are discussed in Section 3 which details about Probabilistic, Timer and Locations based
Techniques and the prominent works available. A Comparative analysis and summary of
Probabilistic, Timer and Location based techniques are presented in Section 4. Section 5
discusses about the Outcome of the comparative analysis and finally the paper concludes with
pointers for further research.
2. BROADCAST STORM PROBLEM (BSP)
Broadcast communication is unreliable in VANET due to the lack of acknowledgements in
CSMA/CA mechanism present in the IEEE 802.11p standard [10]. The vehicular safety
application is improved by broadcasting a safety alert message in an emergent event for
3. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
13
preventing the accidents or to give the prior intimation to the drivers about the dangerous
situation [11].
In VANET, when multiple nodes available in the same transmission range (ROB) re-broadcast
the same message, then severe contention (contend for the channel) will occur that would lead to
collisions in the MAC layer [12]. This scenario is referred as Broadcast Strom Problem (BSP) as
shown in Figure 1. The circle in figure 1 represents the storm of rebroadcast messages. In this
figure each node initiates the rebroadcasting operation randomly. All the vehicles will contend for
the channel access; it creates severe congestion and collision.
Figure 1. Broadcast Storm Effect in high density VANET
2.1. BSP in Simple Flooding
BSP was very much prevalent in Simple Flooding Broadcast technique. According to flooding
technique, whenever a node receives an emergency message it will re-broadcast it to all other
nodes in the VANET [13]. This could result in redundant re-broadcasts because the neighbors of
the re-broadcasting node may already have received the same message especially in a dense
network scenario [14]. Since, this technique doesn’t facilitate for CTS/ RTS (Clear To send /
Read to send) and Collision Detection strategies, the available channel bandwidth is wasted by
sending redundant frames that will probably collide [15]. However, the other broadcasting
methods (discussed next) provided improved control over BSP.
2.2. BSP in Probabilistic and Delay based Broadcasting Technique
Probabilistic and Delay based Broadcasting technique does not recommend for rebroadcasting an
emergency message to all nodes available in a ROB. By this method, the nodes present at borders
of a ROB have the highest probability to be the next rebroadcasting node [16]. By this, the
number of rebroadcasting nodes get reduced thereby reducing BSP when compared to Simple
Flooding. However, if the number of nodes present at the Border of ROB is very much high, then
the situation is similar to Simple flooding.
2.3. BSP in Area based Broadcasting Technique
Area based Broadcasting techniques overcome the above said issue in Probabilistic based
broadcasting, by identifying a single node (Farthest node) within a ROB to rebroadcast the ESM
further [4]. However, this method relies completely upon GPS information to identify the farthest
node. GPS information may or may not be available and the information may be inaccurate many
times. Hence it is important to substantiate the position of the farthest node via an alternative
methodology [17].
2.4. BSP in Neighbour Knowledge based Broadcasting
4. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June
In neighbour knowledge based information broadcasting, the rebroadcast node is identified by a
sender by acquiring its information prior to its assignment. This method requires 1
n-hop neighbourhood information
methodology also relies on GPS information. However, this method is not suitable for vehicular
environments since messages become outdated due to the high mobility of vehicles.
In summary, the above explained broadcasting techniques showcased their strengt
limitations in suppressing BSP. The BSP should be reduced to improve the emergency data
dissemination efficiently and in a timely manner. The Emergency Safety Message (ESM) in
vehicular networks should reach within fraction of seconds without any del
improve the road safety in the ROB. The main requirements in broadcasting techniques are to
improve the reliability of message dissemination, to decrease dissemination delay time and to
increase the message delivery ratio
number of rebroadcasting nodes in a ROB and identifying the best possible rebroadcasting node.
The unnecessary redundant rebroadcasting of the ESM triggers the need for Broadcast Storm
Suppression Algorithms (BSSAs). The main working principle of major BSSAs is to curb the
rebroadcasting as maximum as possible.
BSSAs and prominent works that are available in every classification is discussed.
3. BROADCAST STORM SUPPRESSION
Broadcast Storm Suppression Algorithms are defined as the methodologies that aim to decrease
the number of rebroadcasting nodes so as to reduce the redundant packets and mitigate the
broadcast storm problem [19].The ultimate goal is to select only the set with the minimum
number of vehicles to rebroadcast and disseminate a message towards the ROB
be classified based on the different types of broadcasting techniques as given in the introduction
of this paper. The following figure
Figure 2. Taxonomy of Broadcast Storm Suppression Algorithms
The shaded portions in the given classification represent prominent BSSAs which are majorly
applied in many VANETs to suppress BSP
depth to understand their working strategy used to suppress BSP along with strengths and
limitations. Following sub-sections narrates the selected BSSAs in detail.
Simple
Broadcasting
Probabilistic and
Delay based
broadcasting
Timer based
Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
based information broadcasting, the rebroadcast node is identified by a
sender by acquiring its information prior to its assignment. This method requires 1-hop, 2
hop neighbourhood information [6]. Similar to Area based broadcast technique; this
ethodology also relies on GPS information. However, this method is not suitable for vehicular
environments since messages become outdated due to the high mobility of vehicles.
In summary, the above explained broadcasting techniques showcased their strengt
limitations in suppressing BSP. The BSP should be reduced to improve the emergency data
dissemination efficiently and in a timely manner. The Emergency Safety Message (ESM) in
vehicular networks should reach within fraction of seconds without any delay or message loss to
improve the road safety in the ROB. The main requirements in broadcasting techniques are to
improve the reliability of message dissemination, to decrease dissemination delay time and to
increase the message delivery ratio [18] .These requirements are achieved only by reducing the
number of rebroadcasting nodes in a ROB and identifying the best possible rebroadcasting node.
The unnecessary redundant rebroadcasting of the ESM triggers the need for Broadcast Storm
(BSSAs). The main working principle of major BSSAs is to curb the
rebroadcasting as maximum as possible. Next section details about the major classifications of
BSSAs and prominent works that are available in every classification is discussed.
UPPRESSION ALGORITHMS (BSSAS)
Broadcast Storm Suppression Algorithms are defined as the methodologies that aim to decrease
the number of rebroadcasting nodes so as to reduce the redundant packets and mitigate the
.The ultimate goal is to select only the set with the minimum
number of vehicles to rebroadcast and disseminate a message towards the ROB [20]
be classified based on the different types of broadcasting techniques as given in the introduction
f this paper. The following figure 2 shows the taxonomy of BSSAs.
Taxonomy of Broadcast Storm Suppression Algorithms
The shaded portions in the given classification represent prominent BSSAs which are majorly
suppress BSP [20][21][22][23][24]. These algorithms are studied in
depth to understand their working strategy used to suppress BSP along with strengths and
sections narrates the selected BSSAs in detail.
Broadcast Storm Suppression
Algorithms
Probabilistic and
Delay based
broadcasting
Probability
based
Timer based
Area based
broadcasting
Distance
based
Location
based
Neighbour knowledge
based broadcasting
Cluster based
Traffic based
2015
14
based information broadcasting, the rebroadcast node is identified by a
hop, 2-hop or
. Similar to Area based broadcast technique; this
ethodology also relies on GPS information. However, this method is not suitable for vehicular
In summary, the above explained broadcasting techniques showcased their strength and
limitations in suppressing BSP. The BSP should be reduced to improve the emergency data
dissemination efficiently and in a timely manner. The Emergency Safety Message (ESM) in
ay or message loss to
improve the road safety in the ROB. The main requirements in broadcasting techniques are to
improve the reliability of message dissemination, to decrease dissemination delay time and to
requirements are achieved only by reducing the
number of rebroadcasting nodes in a ROB and identifying the best possible rebroadcasting node.
The unnecessary redundant rebroadcasting of the ESM triggers the need for Broadcast Storm
(BSSAs). The main working principle of major BSSAs is to curb the
the major classifications of
Broadcast Storm Suppression Algorithms are defined as the methodologies that aim to decrease
the number of rebroadcasting nodes so as to reduce the redundant packets and mitigate the
.The ultimate goal is to select only the set with the minimum
[20]. BSSAs can
be classified based on the different types of broadcasting techniques as given in the introduction
The shaded portions in the given classification represent prominent BSSAs which are majorly
. These algorithms are studied in
depth to understand their working strategy used to suppress BSP along with strengths and
Neighbour knowledge
based broadcasting
Cluster based
Traffic based
5. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
15
3.1 Probabilistic Suppression Algorithms (PSAs)
Probabilistic suppression algorithms try to suppress BSP by broadcasting ESM only to selected
nodes based on a ‘value of probability’. The ‘value of probability’ identifies the rebroadcasting
nodes based on their availability at border locations in a ROB. The highest probability is assigned
to nodes that are at very farthest position from the sender node [5]. The following are some of the
noticeable works based on the PSAs.
• Weighted p-Persistence Broadcasting Algorithm (WPB)
• Adaptive Probability Alert Protocol (APAL)
• Probabilistic Inter Vehicle Geocast (p-IVG)
• The Nth Powered P-persistent Broadcast Protocol (NPPB)
The explanations of these algorithms are as follows:
3.1.1Weighted p-Persistence Broadcasting Algorithm (WPB) [25]
This algorithm works with the basic principle of forwarding the ESM to a node based on a value
of probability (Pij) which is defined to be the ratio between the relative distance Dij from the
source node (i) to another node (j) and average transmission range (R). When the node j receives
ESM from i for the first time, then it rebroadcasts the ESM with forwarding probability Pij which
is calculated per packet basis. In addition, the node j discards the repeated reception of ESMs.
The figure given below shows the worki ng of WPB algorithm.
Figure 3. Weighted p-Persistence Broadcasting [25]
In this algorithm, the number of rebroadcasting nodes proportionally depends on the density of
the traffic available at Border of ROB. Hence, the best possible rebroadcasting node(s) always
would be greater than a single node. This may lead to redundancy of ESM rebroadcasting.
In summary, WPB tries to reduce the BSP by using probability to decide the vehicle that will
rebroadcast the ESM. However, vehicle density is not considered in WPB. For e.g. when the
distance between any two nodes are very near, then both will rebroadcast the message at the same
probability and both will increase the broadcast storm rate.
3.1.2 Adaptive Probability Alert Protocol (APAL) [26]
According to this Protocol, the accident vehicle (AV) broadcasts an ESM (during an accident) to
all the other vehicles which are moving in the same direction as of the AV. A vehicle that has
received the ESM initially waits for a random time ∆t. At the expiry of ∆t, the vehicle checks
whether it has received the same ESM from some other source. If yes it discards the ESM
6. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
16
otherwise it rebroadcasts the ESM with high probability to the vehicles at ROB. Figure (4)
illustrates the working of APAL.
Figure 4. Adaptive Probability Alert Protocol [26]
In summary, APAL controls BSP efficiently than WPB by introducing the concept of waiting
time along with the value of probability. However, the randomness of waiting time meant for
multiple sources have a risk of duplication of ESMs.
3.1.3 Probabilistic Inter Vehicle Geocast (p-IVG) [27]
Probabilistic Inter Vehicle Geocast is a BSSA algorithm that considers vehicle density of
VANETs to control BSP. p-IVG adapts itself according to the current traffic density to minimize
the number of vehicles to re-broadcast the received message at the same time minimizing the
probability of failing to re-broadcast the received message. The vehicle density is detected
through a light-weight local topology sensing utility. In IVG, each vehicle starts a timer for each
ESM it receives. If the timer expires and the ESM associated with this timer has not been
rebroadcast by any other vehicle within ROB, the vehicle re-broadcasts ESM. The timer value Tx
for vehicle x is
= Tmax.
R∈
− Dsx
∈
R∈
where R is the transmission range and Dsx is the distance between vehicle x and vehicle s, the
sender of the ESM. This algorithm improves packet reception rate and channel contention. When
a vehicle receives a new ESM, it first selects a random number between [0, 1]. When the selected
number is less than 1/vehicle density, the timer will be started otherwise ESM will not be
rebroadcasted by this vehicle.
Figure 5. Probabilistic Inter Vehicle Geocast [27]
However, in this algorithm BSP is controlled only in the border of ROB and BSP is not controlled
within ROB.
7. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
17
3. 1.4 The Nth Powered p-Persistent Broadcast Protocol (NPPB) [28]
This algorithm is similar to WPB. This algorithm allows rebroadcast nodes to concentrate
towards the border of the source node’s coverage area, which will increase the additional
coverage area of the next hop with less rebroadcast. Pi (value of probability) is calculated based
on the value of ‘n’ which is not available in WPB. By this new probability, the rebroadcasting
redundancy is controlled.
Figure 6. NPPB [29]
The following formula provides the calculation of Pi.
= × 100%
This algorithm improves the source nodes coverage area by minimizing the rebroadcasting nodes.
However similar to WPB the border nodes will increase the collision rate.
Thus the Probability Suppression Algorithms (PSAs) tries to control BSP based on the value of
probability, but mostly do not consider the vehicle density.
3.2 Timer based Suppression Algorithms (TSAs)
TSA algorithms broadcast ESM to particular nodes that are available within a slot defined in
ROB. ROB is divided into multiple slots based on the geographical area. By dividing the slots,
the vehicle density problem available in PSAs is limited. The slots near ROB have highest
priority to receive ESM for further rebroadcasting. The following list presents certain major
works based on this principle.
• Slotted 1-Persistence Algorithm (SOB)
• Slotted p-Persistence Algorithm (SPB)
• Distributed Optimized Time (DOT)
• Adaptive Multi-directional Data Dissemination (AMD)
• Time-Slotted Multi-hop Broadcast Protocol (TSM)
• Virtual Slotted p-Persistence Broadcasting (VSPB)
•
3.2.1 Slotted 1-Persistence Broadcasting Algorithm (SOB) [25]
8. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
18
In SOB upon receiving a ESM , a vehicle checks the ESM ID and rebroadcasts with probability 1
at the assigned time slot (T) if it receives the ESM for the first time and has not received any
duplicates before its assigned time slot; otherwise it discards the ESM.
Figure 7. Slotted 1-Persistence Broadcasting [25]
= 1 − !
" #$ , &
' (
3.2.2 Slotted p-Persistence Broadcasting Algorithm (SPB) [25]
In SPB, upon receiving a ESM a vehicle checks the ESM ID and rebroadcasts with the pre-
determined probability ‘p’ at the assigned time slot, if it receives the ESM for the first time and
has not received any duplicates before its assigned time slot; otherwise it discards the ESM.
Figure 8. Slotted p-Persistence Broadcasting [25]
[25] The drawback of both these schemes are: In dense scenario, multiple vehicles may
rebroadcast the message simultaneously and causes severe collisions. In sparse network scenario
it increases the waiting time (slot with empty nodes). In [44] the performance of SPB is highly
dependent on the vehicle density and distribution.
2.2.3 Distributed Optimized Time (DOT) [30]
[30] DOT solves the scalability issues in the presence of beacons and periodic hello messages to
provide cooperative awareness in safety applications. It uses GPS receiver to know the one hop
neighbors within it transmission range. The ESM header contains the following details Vehicle
ID, Message ID, Time Stamp, Vehicle’s Geographical Coordinates, Power Level.
9. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
19
Figure 9. DOT [30]
3.2.4 Adaptive Multi-directional Data Dissemination (AMD) [1]
The infrastructure-less Adaptive Multi-directional data Dissemination (AMD) protocol proposed
in [1] works both in highway and urban scenarios. There are two types of messages generated
namely data message and beacon message. The data messages are transmitted at the time
emergent event and the beacon messages are transmitted at a certain interval. These messages
consist of data rate, channel number, and the transmission power level employed and position,
speed, and acceleration. Each vehicle is required to include a message list in their beacons,
containing their last k data messages received to prevent loops in the network.
Figure 10. AMD [1]
3.2.5 Time-Slotted Multi-hop Broadcast Protocol (TSM) [22]
Time-Slotted Multi-hop Broadcast Protocol (TSM) [22] proposed to avoid BSP by selecting only
a subset of vehicles on the road to serve as the relay node. The segment leader is responsible for
forwarding the warning messages in its road segment. TSM allocates separate time slots for the
warning messages to avoid interfering with the safety messages. The signaling mechanism
ensures the reliable delivery of the multi-hop messages. In TSM each vehicle is equipped with a
differential global positioning system (DGPS) to measure its position on the road.
This algorithm introduces the following new features: (i) segment leader based message
forwarding approach to reduce the number of relay vehicles. (ii) Separate multi-hop time slots are
allocated for the warning messages to overcome the interference with the single-hop safety
message (iii) Handles the scenario of lost acknowledgment (ACK) by the unnecessary
retransmissions of the warning messages and improves reliability through receiving ACK.
10. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
20
Figure 11. Warning Message Dissemination in TSM on highway [22]
3.2.6 Virtual Slotted p-Persistence Broadcasting (VSPB) [31]
Virtual Slotted p-Persistence Broadcasting (VSPB) technique is proposed in [31]. In VSPB the
number of vehicles in a slot can be controlled regardless of the vehicle density and distribution. In
sparse network, the proposed scheme can avoid unnecessary waiting before rebroadcasting by
eliminating the empty slots that occur with the slotted p-persistence scheme [3]. In the virtual
slotted p-persistence scheme, upon receiving a ESM, a vehicle checks the ESM ID and
determines its virtual slot number and waiting time. If the ESM is received for the first time and
the vehicle does not receive any duplicates before its assigned time slot, it then rebroadcasts using
the probability p at the assigned time slot. If no vehicle in a previous virtual slot rebroadcasts the
ESM, the vehicles in the next virtual slot rebroadcast the ESM using probability p.
Figure 12. Virtual Slotted p-Persistence Broadcasting [31]
The VSPB uses hello messages to periodically exchange basic information between any two
vehicles. Each vehicle maintains its own neighbor table through the received hello messages. The
number of neighboring vehicles can be easily obtained from its neighbor table. The hello message
consists of vehicle ID, position information, and moving direction. The grouping is formed by
position information and moving direction of the vehicle in its neighbor table. This kind of
grouping is called as virtual slot. After receiving the ESM, each vehicle in the virtual slot
rebroadcast the ESM which will increase the collision.
3.3 Locations based Suppression Algorithms (LSAs)
The following are majority of LSA to solve the effect of BSP in accident zone.
• Adaptive approach for Information Dissemination (AID)
• Relative Position based Message Dissemination (RPB-MD)
11. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
21
• A Data Dissemination (ADD)
• Data dissemination pRotocol In VEhicular networks (DRIVE)
• Automatic Dissemination Method (ADM)
3.3.1 Adaptive approach for Information Dissemination (AID) [32]
Adaptive approach for Information Dissemination (AID) proposed in [32] allows nodes to
efficiently rebroadcast received messages. AID selects an appropriate action (re-broadcast or
discard) in a distributed manner without the aid of a central controller. In AID, each individual
vehicle can dynamically, based on the number of ESM received from its neighbors, decide on
rebroadcasting. On receiving an ESM for the first time, the vehicle initializes a local counter c to
1 to keep track of the number of times the ESM is received and waits for a random number of
slots t. Another counter s, initialized to 0, is used to help vehicles for deciding on the rebroadcast.
AID [33] protocol is not suitable for intermittently connected network problem.
The speed of vehicles is fixed to 1, 5, 15, and 25 m/s and the number of vehicles is fixed to 25,
50, 100, and 150, respectively. At a crossover, vehicles choose to turn left or right with equal
probability, 0.5. At an intersection of a horizontal and a vertical street, each vehicle chooses to
keep moving in the same direction with probability 1/2 and to turn left or right with probability
1/4.
Figure 13. Structure of each Intersection [32]
3.3.2 Relative Position Based Message Dissemination (RPB-MD) [34]
The Relative position based addressing model is proposed in [34]to ensure robust message
dissemination in VANETs. First, the Directional Greedy Broadcast Routing (DGBR) is proposed
to make a group of upstream vehicles hold ESM to improve the dissemination reliability. Second,
it can adjust the time parameters intelligently according to the ESM attributes and local vehicular
densities. Finally, under various traffic densities, RPB-MD ensure that the ESM will be
disseminated efficiently.
Figure 14. Directional greedy broadcast routing [34]
12. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
22
In RPB-MD, only the message head can forward the message, while the message holders can be
the candidate message head. The message head goes through the following two phases: (i) The
‘‘Omni-directional Winner Rebroadcasting’’ which ensures the message is disseminated with the
most progress. (ii) The ‘‘Back-Directional ACK Broadcasting’’ which acknowledges the old
message holders that the message has been transmitted to another group successfully. In the
forwarding process, RPB-MD forms a group of vehicles to carry and forward the message with
no control message exchange. To improve the transmission reliability, all the message holders
will carry this message with certain probability until some conditions are satisfied to drop the
message.
3.3.3 A Data Dissemination (ADD) [35]
In [35] a data dissemination scheme is proposed to solve BSP in highway scenario. This protocol
consists of two mechanisms: (i) broadcast suppression and (ii) delay desynchronization. It
eliminates synchronization problem caused by 802.11p protocol. Because at each 100ms the
control and service channels must be synchronized to receive safety related information and then
back to control channel and vice versa. The preference zone is used to define an area in which the
vehicles receive the message at a high rate. The algorithm is compared with AID, SRD and
Simple Flooding using OMNT++ simulator under low, medium and high traffic conditions. The
results show that ADD achieves 95% delivery ratio in dense case and it is 35% to 65% in simple
flooding and 30% in other algorithms. It improves reliability in terms of high delivery ratio.
Figure 15. ADD Highway Scenario [35]
In ADD broadcast suppression is improved by reducing the collision rate to less than 40%, the
less number of collision rate shows the broadcast storm suppression by utilizing the bandwidth
efficiently. It improves delivery ratio up to 95% in dense highway scenario. The delay
synchronization mechanism adds an extra time in transmission to eliminate the synchronization
effect caused by 802.11p and it efficiently reduces the collisions to solve BSP.
3.3.4 Data dissemination pRotocol In VEhicular networks (DRIVE) [8]
In [8] a novel Data dissemination pRotocol In VEhicular networks (DRIVE) is proposed to solve
BSP in VANET. DRIVE relies on local one-hop neighbor information to deliver messages under
dense and sparse networks. In dense case, it selects vehicles inside a sweet spot to rebroadcast
messages to further vehicles and employs implicit acknowledgements to guarantee robustness in
message delivery under sparse scenarios. DRIVE eliminates the BSP and maximizes data
dissemination capabilities across network partitions with short delays and low overhead [36]. A
sweet spot is defined as an area in which its vehicles are best suited to continue performing data
dissemination. Among all vehicles that received data to be forwarded, the transmission of a single
vehicle within the sweet spot is sufficient to perform data dissemination efficiently. Vehicles
13. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
23
located within the sweet spots are more likely to spread the message further and to reach a larger
number of neighbors.
Figure 16. Sweet Spot Scenario in DRIVE [8]
3.3.5 Autonomic Dissemination Method (ADM) [37]
[37] Autonomic Dissemination Method (ADM) protocol delivers messages according to the
message priority and network density levels. This scheme is based on (i) an offline optimization
process and (ii) an online adaptation to the network characteristics. ADM allows each vehicle to
dynamically adapt its broadcasting strategy with respect to the network density and priority of the
message to send: ADM assigns high priority to emergency messages, medium-priority to road-
traffic messages and low-priority to comfort messages. This algorithm increases the efficiency of
the broadcast process in terms of message delivery ratio, latency and interferences reduction and
improves the robustness of protocols.
In summary, the reviewed BSSAs use different methodologies to tackle BSPs. However, most of
them rely upon GPS information alone to identify the farthest node(s). This poses severe
drawback as GSP information may or may not be available and also may or may not be accurate.
This motivates to compare the reviewed BSSAs based upon certain qualitative abilities that could
help to identify the issues and challenges with respect to identifying the next rebroadcasting node.
This would motivate for an efficient BSSA that could possibly identify the best possible farthest
node.
4. COMPARATIVE ANALYSIS OF BSSAS
The reviewed BSSAs aim to disseminate ESMs with low propagation delay and without
redundancy. They try to achieve this objective by different strategies as explained in previous
sections. This section compares all the reviewed BSSAs with respect to certain qualitative
abilities that are defined with respect to their performance in identifying the farthest node and
reducing redundancy of ESM transfer. The qualitative abilities are considered from various work
[6] which are defined as the requirements to be satisfied by a broadcasting technique. They are
defined as follows:
4.1 Qualitative abilities used to analyze BSSAs [6][29]
Scalability: It is defined as the ability of the BSSA to handle high density scenario (More number
of vehicles).This ability is also defined in terms of overhead required to transfer the ESM, the
number of rebroadcasting nodes and also the redundancy ratio.
14. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
24
Robustness: It is defined as the ability of BSSA to cope with ESM losses in order to assure the
correct functioning of vehicular safety applications. This ability is measured in terms of Packet
Loss Rate (PLR) i.e. number of packets lost per unit of time.
Effectiveness: It is the qualitative attribute that ensures all vehicles at ROB receives the ESM.
Efficiency: This ability defines the quality attribute measured for a BSSA in terms of its
capability to eliminate ESM redundancy. This quality attribute can be achieved by minimizing the
forwarding rate, while assuring the reception of an ESM by all nodes in a specific geographic
region.
Dissemination Delay: It is defined as the time ESM takes to be successfully received. It is
measured by the following metrics:
• End-to-End Delay – Time taken by ESM to traverse from source to destination.
• Latency – Time taken by ESM to be successfully received by next vehicle.
Delay-Tolerant Dissemination: This quality attribute of a BSSAs recommends to cache ESM in
frequent partitioning scenarios and disseminate them later when new vehicles are available in the
ROB. Otherwise important ESM can be lost when the network in the ROB is not fully connected.
Reach ability: It is defined as the number of vehicles that could be reached by the ESM when
flooding is used. It is measured by the metric called Reception Rate (RR).
• RR – The ratio between the number of vehicles that actually received the message
and that could receive it if flooding is used.
•
Reliability: It defines the ability of the ESM to be delivered in despite of some link failure. It is
measured by the metric called Packet Delivery Ratio (PDR). Repetition of ESM is needed to
improve reliability.
• PDR – It is defined as the ratio of the vehicles in the network that have successfully
received the message.
•
Channel Fading: This qualitative attribute is measured by the probability of ESM possessing
error.
Every broadcast suppression algorithm should possess the above explained abilities in order to
control BSP efficiently [38] .Table 1 shows the qualitative analysis of broadcast suppression
algorithms to fulfill the requirements of broadcasting techniques.
The following section details the qualitative analysis of PSA, TSA and LSA.
4.2 Qualitative Analysis of PSA, TSA and LSA
Based upon the qualitative attributes explained in previous section, the reviewed BSSAs are
analyzed and the results are as follows:
15. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
25
Table 1. Qualitative Analysis of broadcast suppression techniques to achieve the broadcasting requirements
Metrics Probability based
algorithms
Timer based
algorithms
Area based algorithms
Scalability (Overhead,
forward Ratio,
broadcast Overhead)
Maximizes the
broadcast overhead at
the border of the
broadcast range.
Minimize the forward
ratio in empty slots.
Maximizes the overhead
in high density network.
Robustness
(Packet Loss Rate )
Maximizes the packet
loss rate in the
disconnected network.
Robustness is not
within the scope of
these algorithms
Maximizes the packet
loss at low density
network.
Effectiveness
(Packet Received Rate)
Maximizes the
broadcast packet
received rate at the
border of the
broadcast range.
Packet received rate
increased in medium
density network
Minimizes the
Received rate in high
density area.
Dissemination
Delay(E2E delay&
Latency)
Dissemination delay is
not within the scope of
these algorithms.
Maximizes the waiting
time in empty slot.
High vehicle density
maximizes end to end
connectivity.
Reach ability
(Reception Rate)
The border nodes
increases the reception
rate
Not within the scope Reception rate is
increased by selecting an
appropriate area of
interest.
Reliability (Packet
Delivery Ratio)
Not within the scope PDR is improved by
assigning equal
number of vehicles
distribution in each
slot.
PDR is improved by
receiving an ACK.
Channel Fading and
shadowing
(Packet Error
Probability)
Not within the scope Not considered about
this problem
Not within the scope
Total Performance
Does not consider
about E2E delay,
reliability of the
message and channel
fading and shadowing.
Does not consider
about robustness and
reachability issues.
Does not consider about
channel fading and E2E
delay.
5. CONCLUSION
This paper presents an exhaustive survey of all the existing BSSA to solve Broadcast Storm
Problem in VANET. The aim of this paper is to list out the functioning and limitations of the
existing Broadcast Storm Suppression Algorithms which will help in proposing a new storm
suppression algorithm that alleviates the existing problems. Several categories of algorithms were
discussed in depth and especially three major categories of broadcasting algorithms have been
chosen, namely the location, timer and probabilistic based schemes to solve BSP.
16. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
26
ACKNOWLEDGEMENTS
This research work was supported by University Grants Commission under Junior
Research Fellowship (UGC-JRF) from the year 2011.
REFERENCES
[1] Hans Scholten, Paul Havinga Ramon S Schwartz, "A scalable data dissemination protocol for both
highway and urban vehicular environments ," EURASIP Journal on Wireless Communications and
Networking, 2013.
[2] T.,Sjöberg, K., Karedal, J., & Tufvesson, F. Abbas, "A measurement based shadow fading model for
vehicle-to-vehicle network simulations," arXiv preprint arXiv, p. 1203.3370, 2012.
[3] Yifiei Hong and Jennifer Hou, Chunya Hu, "On Mitigating the Broadcast Storm Problem with
Directional Antennas," IEEE, 2003.
[4] K., & Pomavalai, C Suriyapaibonwattana, "An effective safety alert broadcast algorithm for
VANET," International Symposium on. IEEE, pp. 247-250, 2008.
[5] Nawaporn Wisitpongphan, Jayendra S. Parikh, Fan Bai Ozan K. Tonguz, "On the Broadcast Storm
Problem in Ad Hoc Wireless Networks," IEEE, 2006.
[6] M.Chitra and S. Siva Sathya, "Efficient Broadcasting Mechanisms for Data Dissemination in
Vehicular Ad Hoc Networks," International Journal of Mobile Network Communications &
Telematics (IJMNCT), p. 17, June 2013.
[7] Sharifah H Shereen A.M. AHemed, "Survey on Broadcasting in VANETs," Research Journal of
Applied Sciences, Engineering and Technology, 2014.
[8] L. A., Boukerche, A., Maia, G., Pazzi, R. W., & Loureiro, A. A Villas, "DRIVE: An efficient and
robust data dissemination protocol for highway and urban vehicular ad hoc networks. ," Computer
Networks, Elsvier, pp. 381-394, 2014.
[9] Claudia Campolo , Antonella Molinaro Marica Amadeo, "Enhancing IEEE 802.11p/WAVE to
provide infotainment applications," Ad Hoc Networks Elsvier, pp. 253-269, 2012.
[10] Tamer, Pravin Shankar, and Liviu Iftode Nadeem, "A comparative study of data dissemination
models for VANETs," Mobile and Ubiquitous Systems-Workshops, 2006. 3rd Annual International
Conference on. IEEE, pp. 1-10, 2006.
[11] *, Imad Mahgoub a,b, Mohammed M. Alwakeel a Michael Slavik a, "Analysis and evaluation of
distance-to-mean broadcast method for VANET," Journal of King Saud University – Computer and
Information Sciences, pp. 153–160, 2014.
[12] Aylin Deljavan Ghodrati1, "Reduces Broadcast Storm Using Clustering in VANETs," International
Research Journal of Applied and Basic Sciences Science Explorer Publications, vol. Vol, 7 , pp. 979-
987, 2013.
[13] Khaled Ibrahim, "DATA AGGREGATION AND DISSEMINATION IN VEHICULAR AD-HOC
NETWORKS," 2011.
[14] ⇑, Kai Zeng b, Wenjing Lou a Ming Li a, "Opportunistic broadcast of event-driven warning messages
in Vehicular Ad Hoc Networks with lossy links," Computer Networks Elsvier, pp. 2443–2464, 2011.
[15] Rafael R. R. Barbosa, Nirvana Meratnia, Geert Heijenk and Hans Scholten Ramon S. Schwartz, "A
directional data dissemination protocol for vehicular environments," Computer Communications,
Elsvier, 2011.
[16] *, Imad Mahgoub a,b, Mohammed M. Alwakeel a Michael Slavik a, "Analysis and evaluation of
distance-to-mean broadcast method for VANET," Journal of King Saud University – Computer and
Information Sciences, pp. 153–160, 2014.
[17] Panguo Fan Yuguang Li Guoqing Zhang Jinghua Li Dejun Mu, "Packet Reachability of VANET in
Bidirectional Road Scenario," Communication Technology (ICCT), 2010 12th IEEE International
Conference on. IEEE, pp. 80-83, 2010.
[18] R. S., Barbosa, R. R., Meratnia, N., Heijenk, G., & Scholten, H. ( Schwartz, "A simple and robust
dissemination protocol for VANETs. ," In Wireless Conference (EW), European. IEEE., pp. 214-222,
2010.
17. Informatics Engineering, an International Journal (IEIJ), Vol.3, No.2, June 2015
27
[19] M., Garrido, P., Martinez, F. J., Cano, J. C., Calafate, C. T., & Manzoni, P. Fogue, "Evaluating the
impact of the enhanced Street Broadcast Reduction scheme using real maps in VANETs," Elsvier.
[20] Shou-Chih, Jhih-Siao Gao, and Chih-Cheng Tseng Lo, "A water-wave broadcast scheme for
emergency messages in VANET," Wireless personal communications , pp. 217-241, 2013.
[21] Xiaomin, Xiaoyan Yin, and T. Trivedi Ma, "A Robust Broadcast Scheme for VANET One-Hop
Emergency Services," Vehicular Technology Conference (VTC Fall), IEEE. , 2011.
[22] Muhammad Awais, Duy Trong Ngo, and Jamil Yusuf Khan Javed, "A multi-hop broadcast protocol
design for emergency warning notification in highway VANETs," EURASIP Journal on Wireless
Communications and Networking , pp. 1-15, 2014.
[23] Giovanni, et al Ciccarese, "A timer-based intelligent flooding scheme for VANETs," International
Journal of Vehicle Information and Communication Systems , pp. 177-192. , 2011.
[24] X., Zheng, J., Tong, H., & Mitton, N. Wu, "DAYcast: A dynamic transmission delay based broadcast
protocol for vehicular ad hoc networks," In Communications (ICC), 2014 IEEE International
Conference on (pp. 563-567). IEEE, pp. 563-567, 2014.
[25] CARNEGIE MELLON UNIVERSITY N. WISITPONGPHAN AND O. K. TONGUZ,
"BROADCAST STORM MITIGATION TECHNIQUES IN VEHICULAR AD HOC NETWORKS,"
IEEE Wireless Communications, pp. 84-94, 2007.
[26] Padmanaban Elumalai Prabhakaran Murukanantham, "Reliable Data Dissemination for Car Safety
Application in VANET".
[27] Khaled, Michele C. Weigle, and Mahmoud Abuelela Ibrahim, "p-IVG: Probabilistic inter-vehicle
geocast for dense vehicular networks," In Vehicular Technology Conference, 2009. VTC Spring
2009. IEEE, pp. 1-5, VTC Spring 2009.
[28] G. Cui, H. Liu. Wu and D. Luo L.Zhou, "NPPB: A Broadcast Scheme in Dense VANETs ,"
Information Technology Journal, 2010.
[29] Si-Ho Cha, "A Survey of Broadcast Protocols for Vehicular Ad-hoc Networks," Smart Computing
Review, pp. 246-255, 2014.
[30] Ramon S., et al. Schwartz, "Exploiting beacons for scalable broadcast data dissemination in VANETs
," Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and
applications. ACM, 2012.
[31] Jae-Choong Nam and You-Ze Cho, Jae-In Choi, "Robust broadcast scheme regardless of vehicle
distribution in vehicular ad hoc networks," Springer, 2014.
[32] Mohamed, Jaafar Gaber, and Pascal Lorenz Bakhouya, "An adaptive approach for information
dissemination in Vehicular Ad hoc Networks," Journal of Network and Computer Applications , pp.
1971-1978, 2011.
[33] Seytkamal, et al Medetov, "A decentralized approach for information dissemination in Vehicular Ad
hoc Networks." ," Journal of Network and Computer Applications, Elsvier , pp. 154-165.
[34] Chunxiao Chigan, Congyi Liu, "RPB-MD: Providing robust message dissemination for vehicular ad
hoc networks," Ad Hoc Networks, Elsvier, 2011.
[35] Allan M., Guilerme Maia, and Leandro A. Villas Souza, "ADD: A Data Dissemination Solution for
Highly Dynamic Highway Environments. ," Network Computing and Applications (NCA),IEEE 13th
International Symposium on. IEEE, 2014.
[36] L., Boukerche, A., Araujo, R. B., Loureiro, A., & Ueyama, J. Villas, "Network partition-aware
geographical data dissemination," In Communications (ICC),IEEE International Conference on
IEEE., pp. 1439-1443, 2013.
[37] Benoit Darties, Nader Mbarek Wahabou Abdou, "ADM : A Density And Priority Levels Aware
Protocol," 2014.
[38] Sharifah H.S. Ariffin, Norsheila Fisal, S.K. Syed-Yusof and N.M.A. Latif Shereen A.M. Ahmed,
"Survey on Broadcasting in VANETs," Research Journal of Applied Sciences, Engineering and
Technology, pp. 3733-3739, 2014.