Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. A simulation tool was developed, using the actual WMATA schedule, to determine performance metrics such as end-to-end packet delivery delay. In addition, a web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including inclement weather, traffic congestion, and more.
This document studies the US long-haul fiber-optic infrastructure by mapping out the existing infrastructure using publicly available data. It finds a high degree of infrastructure sharing between providers due to the large costs of deploying new fiber. It then identifies high-risk links that experience both a lot of sharing and carry high traffic volumes. Finally, it analyzes how deploying new fiber links along unused transportation corridors could improve the network's resilience to failures and reduce propagation delays.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
The document describes Mercury, a messaging system for intelligent transportation systems that aims to provide reliable, low-latency communication between vehicles and infrastructure. Mercury uses a publish/subscribe model with a centralized broker that aggregates data and calculates relevant message recipients based on location. The system was prototyped and evaluated on a testbed, demonstrating its functional capabilities and latency performance.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
This document summarizes a research paper that proposes a traffic control system using message forwarding in vehicular ad hoc networks (VANETs). The system incorporates scanners that detect abnormal traffic conditions and activate transmitters to broadcast congestion notifications using a reliable directional greedy routing algorithm. The system is simulated using the VEINS simulator. Key aspects of the system include establishing vehicle-to-vehicle and vehicle-to-roadside communication, calculating a roadway congestion index to detect abnormalities, and enabling transmitters to forward messages about detected events to improve traffic flow and safety.
Message Propagation in Vehicular Ad hoc Networks under free flow and congeste...ijasuc
. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a
promising approach for the intelligent transportation system (ITS). The key difference of VANET and
MANET is the special mobility pattern and rapidly changeable topology. Temporary network
fragmentation problem and the broadcast storm problem are further considered for designing Message
propagation in VANETs. The temporary network fragmentation problem which happens in free flow caused
by rapidly changeable topology influence on the performance of data transmissions. The broadcast storm
problem in congested flow network seriously affects the successful rate of message delivery in VANETs.
This paper presents a connectivity analysis under free flow and congested flow scenario in Vehicular Ad
hoc Networks.
This document discusses routing metrics in wireless mesh networks. It begins by outlining four key requirements for routing metrics: route stability, finding minimum weight paths, efficient path calculation algorithms, and loop-free routing. It then evaluates several existing routing metrics based on these requirements. These include hop count, RTT, PktPair, ETX, ETT, WCETT, and others. Each metric is described and its advantages and disadvantages are discussed in relation to wireless mesh network characteristics like interference, mobility, and multi-channel usage. The document aims to analyze existing routing metrics to help identify appropriate metrics for wireless mesh networks that conform to their characteristics.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
This document studies the US long-haul fiber-optic infrastructure by mapping out the existing infrastructure using publicly available data. It finds a high degree of infrastructure sharing between providers due to the large costs of deploying new fiber. It then identifies high-risk links that experience both a lot of sharing and carry high traffic volumes. Finally, it analyzes how deploying new fiber links along unused transportation corridors could improve the network's resilience to failures and reduce propagation delays.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
The document describes Mercury, a messaging system for intelligent transportation systems that aims to provide reliable, low-latency communication between vehicles and infrastructure. Mercury uses a publish/subscribe model with a centralized broker that aggregates data and calculates relevant message recipients based on location. The system was prototyped and evaluated on a testbed, demonstrating its functional capabilities and latency performance.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
This document summarizes a research paper that proposes a traffic control system using message forwarding in vehicular ad hoc networks (VANETs). The system incorporates scanners that detect abnormal traffic conditions and activate transmitters to broadcast congestion notifications using a reliable directional greedy routing algorithm. The system is simulated using the VEINS simulator. Key aspects of the system include establishing vehicle-to-vehicle and vehicle-to-roadside communication, calculating a roadway congestion index to detect abnormalities, and enabling transmitters to forward messages about detected events to improve traffic flow and safety.
Message Propagation in Vehicular Ad hoc Networks under free flow and congeste...ijasuc
. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a
promising approach for the intelligent transportation system (ITS). The key difference of VANET and
MANET is the special mobility pattern and rapidly changeable topology. Temporary network
fragmentation problem and the broadcast storm problem are further considered for designing Message
propagation in VANETs. The temporary network fragmentation problem which happens in free flow caused
by rapidly changeable topology influence on the performance of data transmissions. The broadcast storm
problem in congested flow network seriously affects the successful rate of message delivery in VANETs.
This paper presents a connectivity analysis under free flow and congested flow scenario in Vehicular Ad
hoc Networks.
This document discusses routing metrics in wireless mesh networks. It begins by outlining four key requirements for routing metrics: route stability, finding minimum weight paths, efficient path calculation algorithms, and loop-free routing. It then evaluates several existing routing metrics based on these requirements. These include hop count, RTT, PktPair, ETX, ETT, WCETT, and others. Each metric is described and its advantages and disadvantages are discussed in relation to wireless mesh network characteristics like interference, mobility, and multi-channel usage. The document aims to analyze existing routing metrics to help identify appropriate metrics for wireless mesh networks that conform to their characteristics.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
Studies towards heterogeneous Mobile Adhoc Network (MANET) as well as inter-domain routing is still in much infancy stage. After reviewing the existing literaturs, it was found that problems associated with scalability, interoperability, and security is not defined up to the mark as it should be part of pervasive computing in future networks. Moreover, it was found that existing studies do not consider the complexities associated with heterogeneous MANET to a large extent leading to narrowed research scope. Hence, this paper introduces a novel scheme called as Secure, Scalable and Interoperable (SSI )routing, where a joint algorithm is designed, developed, and implemented. The outcome exhibits the correctness of this scheme by simulation assisted by analysis for inter-domain routing.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
A Data Collection Scheme with Multi-Agent Based Approach for VSNSIRJET Journal
This document discusses a proposed multi-agent based approach for data collection in vehicular sensor networks (VSNs). VSNs consist of sensor nodes in vehicles and roadside units that collect and share data. It is challenging to manage these dynamic networks. The document reviews single mobile agent approaches and proposes deploying multiple mobile agents to more efficiently collect sensor readings across urban areas. This three-layer network architecture uses mobile agents to achieve higher network coverage and reduce energy and delay issues compared to previous approaches.
Predictive Data Dissemination in VanetDhruvMarothi
Predictive Data Dissemination in Vanet aims to efficiently disseminate data in vehicular ad hoc networks (VANETs) by using predictive mechanisms. The presented techniques take advantage of GPS and map data to select vehicles that will further broadcast information to designated areas. Simulation results showed these techniques can alleviate broadcast storms while effectively disseminating data in both urban and highway scenarios. The document discusses several challenges for future work, including intermittent connectivity, high mobility, heterogeneous vehicles, privacy and security, and enabling network intelligence in large-scale VANETs.
Improving transport in Malta using GIS and LBSMatthew Pulis
A presentation prepared to the University of Malta as part of my MSc. Informatics. This seminar discusses ways and improvements how can a GIS driven system help and improve the current situation in Malta. This presentation also provides a survey discussing how the Maltese view the public transport and gives out interesting conclusions as to where the GIS needs to tackle. The study focuses mainly on ways as to where and how to improve the routes, promoting cultural places, buses ETA and taxi fleet handling amongst others.
This document proposes a prototype for archiving and mining ITS data using UML, XML, and object-oriented database design. The prototype aims to address issues with existing methods for data archiving, mining, sharing and ensuring accuracy. It will be tested through surveys of transportation professionals to determine if the prototype improves upon current practices. Chi-square analysis will be used to analyze the survey results and test hypotheses about the prototype.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Towards a new approach of data dissemination in vanets networkscsandit
In the 2000s, ad hoc networks was developed and highly used in dynamic environment,
particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks.
This was motivated by the current vehicular industry trend that is leading to a new transport
system generation based on the use of new communication technologies in order to provide
many services to passengers, the fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination the example as the case
alert message emitting allowing the driver to minimize driving risks. Sharing such information
between vehicles helps to anticipate potentially dangerous situations, as well as planning better
routes during congestion situations.
In this context, we are trying in this paper to model and simulate VANET Networks in order to
analyze and evaluate security information dissemination approaches and mechanisms used in
this type of networks in several exchanges conditions.This in order to identify their limitations
and suggest a new improved approach. This study was conducted as part of our research
project entitled “Simulation & VANETs”, where we justify and validate our approach using
modeling and simulation techniques and tools used in this domain.
Traffic assignment of motorized private transport in OmniTRANS transport plan...Luuk Brederode
Traffic assignment methods available in OmniTRANS transport planning software, categorized using the framework described in https://www.tandfonline.com/doi/abs/10.1080/01441647.2016.1207211
.
This document discusses congestion control techniques for vehicular ad hoc networks (VANETs). It first provides background on VANETs, noting their use of vehicle-to-vehicle communication to share information. Congestion can occur when there is a sudden increase in data from nodes in the network. The document then reviews different existing congestion control schemes, which vary in how they adjust source sending rates and handle transient congestion. It proposes a priority-based congestion control technique using dual queues, one for transit packets and one for locally generated packets. This approach aims to route packets along less congested paths when congestion is detected based on buffer occupancy.
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
Routing in Wireless Sensor Network (WSN) aims to interconnect sensor nodes via single or multi-hop
paths. The routes are established to forward data packets from sensor nodes to the sink. Establishing a
single path to report each data packet results in increasing energy consumption in WSN, hence, data
aggregation routing is used to combine data packets and consequently reduce the number of transmissions.
This reduces the routing overhead by eliminating redundant and meaningless data. There are two models
for data aggregation routing in WSN: mobile agent and client/server. This paper describes data
aggregation routing and classifies then the routing protocols according to the network architecture and
routing models. The key issues of the data aggregation routing models (client/server and mobile agent) are
highlighted and discussed.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
2013 RMIT Guest Lecture in Integrated Transport Accessibility: GIS Tools for ...Patrick Sunter
This document summarizes a guest lecture on using GIS tools to plan for more transit-accessible cities. The lecture discussed:
1) Using GIS and computer models to design integrated, multimodal transit networks. This includes travel time maps and open data sources.
2) How transit-oriented developments (TODs) rely on good transit access and network quality to avoid "pseudo-TODs".
3) Examples of analyzing Melbourne's transit network using the OpenTripPlanner tool, including routes from RMIT and Chadstone.
The document summarizes the author's research experience in two main areas: 1) network protocols for traditional distributed systems focusing on requirements like scalability and security for applications like smart grids and transportation systems, and 2) network protocols for mobile distributed systems addressing mobility and wireless characteristics for applications like VANETs and wireless sensor networks. The author has published papers on proposing and evaluating protocols for smart grid communications and highly mobile ad hoc networks. Going forward, their research will focus on applying SDN and NFV to cyber-physical systems, and exploring cooperative communication protocols with increasing 4G/5G bandwidth.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
This document summarizes a research article about using vehicle-to-vehicle (V2V) communication systems to enable safe navigation at intersections and increase traffic throughput. It describes how V2V communication allows vehicles to broadcast their position and intentions to surrounding vehicles using technologies like DSRC. Simulation results showed this approach can reasonably improve safety and throughput at intersections. The document also provides background on vehicle communication standards and issues like latency, knowledge of surrounding vehicles, message usefulness, simulation challenges, and system penetration rates.
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead. For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths.
The Insider's Guide to Networking at an EventPRAMEJSHRESTHA
Networking can be very exciting for some and it can be daunting for others. To make your life easy, I have listed out steps you can take be an effective networker at an event.
Studies towards heterogeneous Mobile Adhoc Network (MANET) as well as inter-domain routing is still in much infancy stage. After reviewing the existing literaturs, it was found that problems associated with scalability, interoperability, and security is not defined up to the mark as it should be part of pervasive computing in future networks. Moreover, it was found that existing studies do not consider the complexities associated with heterogeneous MANET to a large extent leading to narrowed research scope. Hence, this paper introduces a novel scheme called as Secure, Scalable and Interoperable (SSI )routing, where a joint algorithm is designed, developed, and implemented. The outcome exhibits the correctness of this scheme by simulation assisted by analysis for inter-domain routing.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
A Data Collection Scheme with Multi-Agent Based Approach for VSNSIRJET Journal
This document discusses a proposed multi-agent based approach for data collection in vehicular sensor networks (VSNs). VSNs consist of sensor nodes in vehicles and roadside units that collect and share data. It is challenging to manage these dynamic networks. The document reviews single mobile agent approaches and proposes deploying multiple mobile agents to more efficiently collect sensor readings across urban areas. This three-layer network architecture uses mobile agents to achieve higher network coverage and reduce energy and delay issues compared to previous approaches.
Predictive Data Dissemination in VanetDhruvMarothi
Predictive Data Dissemination in Vanet aims to efficiently disseminate data in vehicular ad hoc networks (VANETs) by using predictive mechanisms. The presented techniques take advantage of GPS and map data to select vehicles that will further broadcast information to designated areas. Simulation results showed these techniques can alleviate broadcast storms while effectively disseminating data in both urban and highway scenarios. The document discusses several challenges for future work, including intermittent connectivity, high mobility, heterogeneous vehicles, privacy and security, and enabling network intelligence in large-scale VANETs.
Improving transport in Malta using GIS and LBSMatthew Pulis
A presentation prepared to the University of Malta as part of my MSc. Informatics. This seminar discusses ways and improvements how can a GIS driven system help and improve the current situation in Malta. This presentation also provides a survey discussing how the Maltese view the public transport and gives out interesting conclusions as to where the GIS needs to tackle. The study focuses mainly on ways as to where and how to improve the routes, promoting cultural places, buses ETA and taxi fleet handling amongst others.
This document proposes a prototype for archiving and mining ITS data using UML, XML, and object-oriented database design. The prototype aims to address issues with existing methods for data archiving, mining, sharing and ensuring accuracy. It will be tested through surveys of transportation professionals to determine if the prototype improves upon current practices. Chi-square analysis will be used to analyze the survey results and test hypotheses about the prototype.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Towards a new approach of data dissemination in vanets networkscsandit
In the 2000s, ad hoc networks was developed and highly used in dynamic environment,
particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks.
This was motivated by the current vehicular industry trend that is leading to a new transport
system generation based on the use of new communication technologies in order to provide
many services to passengers, the fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination the example as the case
alert message emitting allowing the driver to minimize driving risks. Sharing such information
between vehicles helps to anticipate potentially dangerous situations, as well as planning better
routes during congestion situations.
In this context, we are trying in this paper to model and simulate VANET Networks in order to
analyze and evaluate security information dissemination approaches and mechanisms used in
this type of networks in several exchanges conditions.This in order to identify their limitations
and suggest a new improved approach. This study was conducted as part of our research
project entitled “Simulation & VANETs”, where we justify and validate our approach using
modeling and simulation techniques and tools used in this domain.
Traffic assignment of motorized private transport in OmniTRANS transport plan...Luuk Brederode
Traffic assignment methods available in OmniTRANS transport planning software, categorized using the framework described in https://www.tandfonline.com/doi/abs/10.1080/01441647.2016.1207211
.
This document discusses congestion control techniques for vehicular ad hoc networks (VANETs). It first provides background on VANETs, noting their use of vehicle-to-vehicle communication to share information. Congestion can occur when there is a sudden increase in data from nodes in the network. The document then reviews different existing congestion control schemes, which vary in how they adjust source sending rates and handle transient congestion. It proposes a priority-based congestion control technique using dual queues, one for transit packets and one for locally generated packets. This approach aims to route packets along less congested paths when congestion is detected based on buffer occupancy.
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
Routing in Wireless Sensor Network (WSN) aims to interconnect sensor nodes via single or multi-hop
paths. The routes are established to forward data packets from sensor nodes to the sink. Establishing a
single path to report each data packet results in increasing energy consumption in WSN, hence, data
aggregation routing is used to combine data packets and consequently reduce the number of transmissions.
This reduces the routing overhead by eliminating redundant and meaningless data. There are two models
for data aggregation routing in WSN: mobile agent and client/server. This paper describes data
aggregation routing and classifies then the routing protocols according to the network architecture and
routing models. The key issues of the data aggregation routing models (client/server and mobile agent) are
highlighted and discussed.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
2013 RMIT Guest Lecture in Integrated Transport Accessibility: GIS Tools for ...Patrick Sunter
This document summarizes a guest lecture on using GIS tools to plan for more transit-accessible cities. The lecture discussed:
1) Using GIS and computer models to design integrated, multimodal transit networks. This includes travel time maps and open data sources.
2) How transit-oriented developments (TODs) rely on good transit access and network quality to avoid "pseudo-TODs".
3) Examples of analyzing Melbourne's transit network using the OpenTripPlanner tool, including routes from RMIT and Chadstone.
The document summarizes the author's research experience in two main areas: 1) network protocols for traditional distributed systems focusing on requirements like scalability and security for applications like smart grids and transportation systems, and 2) network protocols for mobile distributed systems addressing mobility and wireless characteristics for applications like VANETs and wireless sensor networks. The author has published papers on proposing and evaluating protocols for smart grid communications and highly mobile ad hoc networks. Going forward, their research will focus on applying SDN and NFV to cyber-physical systems, and exploring cooperative communication protocols with increasing 4G/5G bandwidth.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
This document summarizes a research article about using vehicle-to-vehicle (V2V) communication systems to enable safe navigation at intersections and increase traffic throughput. It describes how V2V communication allows vehicles to broadcast their position and intentions to surrounding vehicles using technologies like DSRC. Simulation results showed this approach can reasonably improve safety and throughput at intersections. The document also provides background on vehicle communication standards and issues like latency, knowledge of surrounding vehicles, message usefulness, simulation challenges, and system penetration rates.
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead. For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths.
The Insider's Guide to Networking at an EventPRAMEJSHRESTHA
Networking can be very exciting for some and it can be daunting for others. To make your life easy, I have listed out steps you can take be an effective networker at an event.
El documento define un proyecto como un conjunto de acciones planificadas para lograr un objetivo y satisfacer una necesidad. Explica que un proyecto debe especificar claramente su objetivo, metodología, cronograma, recursos, presupuesto y forma de evaluación. Además, señala que el trabajo por proyectos es importante porque permite desarrollar capacidades a través de procesos prácticos de identificación y resolución de problemas.
Welcome to Family Dental Care Practice | Best Cosmetic Dentistry in Cary, North Carolina
Welcome to our caring, friendly and relaxing dental practice. We are totally focussed on your oral health needs, our practice has been designed with patient comfort in mind to ensure that your dental experience is a pleasurable one.
Mongolian Mining Services AIDD Group is a leading Mongolian mining services company founded in 2004 that provides drilling and mining services. It has over 250 employees across Mongolia and Kazakhstan and offers a complete range of exploration, mining, and support services including diamond drilling, rotary drilling, grade control, and supply chain management. The company aims to focus on health, safety, and environmental excellence to help its clients in the Mongolian mining industry balance costs with production, quality, and profitability.
El documento define los conceptos de integral indefinida, primitiva y métodos de integración. Explica que la integral indefinida de una función f(x) representa el conjunto de sus primitivas, que son funciones F(x) tales que F'(x)=f(x). También indica que una función puede tener infinitas primitivas que difieren solo en una constante, llamada constante de integración. Por último, señala que los métodos de integración son técnicas para calcular las primitivas de una función.
Four Cal State LA students, Ebony Anthony, Ethan Chen, Ernesto Covarrubias, and Doris Guzman, were each awarded $5,000 per year by The Ebell of Los Angeles through the Ebell/Flint Scholarship. The scholarship recognizes outstanding academic achievement and community dedication. The students are pursuing degrees in civil engineering, biology, mechanical engineering, and education, respectively, and plan to give back to their communities through careers in infrastructure, healthcare, engineering education, and special education teaching.
This document appears to be a link to the website www.powtoon.com but does not contain any other text, images or context to summarize. The link is for an animation and presentation creation website but without visiting the site or having more context from the document, I am unable to provide a meaningful 3 sentence summary.
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
International Journal of Computational Engineering Research (IJCER) ijceronline
The document summarizes several routing protocols for Vehicular Ad hoc NETworks (VANETs) that utilize Vehicle-to-Infrastructure (V2I) communication. It first provides background on VANETs and the different types of communication (V2V and V2I). It then overviews 5 specific V2I routing protocols, describing how each protocol utilizes Roadside Units (RSUs) to establish routes for packet forwarding between vehicles and infrastructure. Finally, it discusses challenges and future perspectives for better exploiting RSUs' potential in routing, such as using them as anchors to improve path robustness and load balancing traffic. The document aims to survey V2I routing protocols and analyze the role
Big data traffic management in vehicular ad-hoc network IJECEIAES
Today, the world has experienced a new trend with regard to data system management, traditional database management tools have become outdated and they will no longer be able to process the mass of data generated by different systems, that's why big data is there to process this mass of data to bring out crucial information hidden in this data, and without big data technologies the treatment is very difficult to manage; among the domains that uses big data technologies is vehicular ad-hoc network to manage their voluminous data. In this article, we establish in the first step a method that allow to detect anomalies or accidents within the road and compute the time spent in each road section in real time, which permit us to obtain a database having the estimated time spent in all sections in real time, this will serve us to send to the vehicles the right estimated time of arrival all along their journey and the optimal route to attain their destination. This database is useful to utilize it like inputs for machine learning to predict the places and times where the probability of accidents is higher. The experimental results prove that our method permits us to avoid congestions and apportion the load of vehicles in all roads effectively, also it contributes to road safety.
Optimal Content Downloading in Vehicular Network with Density MeasurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will
easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications
of vehicular communication proliferate, and range from the updating of road maps to the repossession of
nearby points of interest, downloading of touristic information and multimedia files. This content
downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile
customers. By this approach communication-enabled vehicles are paying attention in downloading
different contents from Internet-based servers. We summarize the performance limits of such a vehicular
multimedia content downloading system by modeling the content downloading process as an effective
problem and developing the overall system throughput with density measurement. Results highlight the
methods where the Roadside infrastructure i.e., access points are working at different capabilities
irrespective of vehicle density, the vehicle-to-vehicle communication.
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
The document discusses efficient and secure communication in vehicular ad hoc networks (VANETs). It proposes a Cluster based reliable routing (CRR) protocol. Vehicles are clustered based on their velocity, and a Cluster Controller (CC) is elected based on transmitter heights and position to manage communication among cluster members. The CRR protocol aims to address the challenging routing issues posed by the highly dynamic topology of VANETs.
This document discusses differential evolution based secured routing protocols for VANETs (vehicular ad hoc networks). It begins with an introduction to VANETs and discusses some of their key characteristics and applications. It then discusses some of the main attacks against VANETs, including identification/authentication attacks, privacy attacks, availability attacks, and routing attacks. It proposes using a differential evolution algorithm and distance bounding technique to design a secure routing protocol to detect and mitigate routing attacks from malicious nodes in VANETs. The paper reviews several related works on security issues and solutions for VANETs and aims to improve routing security through the proposed differential evolution based approach.
GEOCAST ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS: A SURVEYijwmn
Geocast routing is considered to be advantageous in VANETs, as most of the safety applications are location-based and are relevant to a particular geographical area rather than individual vehicles. Hence, the geocast routing approach where data packets are delivered to a specific geographic area or zone of relevance has become an important research area among researchers and academicians. This article surveys the existing geocast routing protocols for the vehicular environment and compares them qualitatively based on various parameters. The pros and cons of each routing protocol are discussed. Certain directions for future research related to geocast routing protocols are also presented.
GEOCAST ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS: A SURVEYijwmn
Geocast routing is considered to be advantageous in VANETs, as most of the safety applications are
location-based and are relevant to a particular geographical area rather than individual vehicles. Hence,
the geocast routing approach where data packets are delivered to a specific geographic area or zone of
relevance has become an important research area among researchers and academicians. This article
surveys the existing geocast routing protocols for the vehicular environment and compares them
qualitatively based on various parameters. The pros and cons of each routing protocol are discussed.
Certain directions for future research related to geocast routing protocols are also presented.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
This document summarizes a research paper on improving traffic detection algorithms using an extended floating car data (xFCD) system. The xFCD system collects data from vehicles including location, speed, direction and visual data from a forward-facing camera. It is tested under different lighting and traffic conditions. The paper investigates using xFCD data and information from road sensors to construct a hybrid model characterizing traffic states. A traffic detection algorithm is proposed to improve network performance metrics like throughput, delivery ratio and packet delay. Simulation results show the proposed approach improves these metrics compared to existing methods.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great
interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET)
communications environment as a part of ITS opens the way for a wide range of applications such as safety
applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a
smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS
such as modelling of wireless transmission and routing issues. These research issues have become more
critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network
topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET
environment which considers as one of a stringent communications environment is a challenging task. The
selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different
propagation models allow calculating the Received Signal Strength (RSS) based on key environmental
properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna
height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a
specific propagation model and then these values can be used later for routing decision in order to find the
best path with high SNR. This paper evaluates the performance of different transmission models (free-
space, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of
such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is
evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using
MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it
indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic
density is decreased
CREATING DATA OUTPUTS FROM MULTI AGENT TRAFFIC MICRO SIMULATION TO ASSIMILATI...cscpconf
The intensive development of traffic engineering and technologies that are integrated into vehicles, roads and their surroundings, bring opportunities of real time transport mobility modeling. Based on such model it is then possible to establish a predictive layer that is capable of predicting short and long term traffic flow behavior. It is possible to create the real time model of traffic mobility based on generated data. However, data may have different geographical, temporal or other constraints, or failures. It is therefore appropriate to develop tools that artificially create missing data, which can then be assimilated with real data. This paper presents a mechanism describing strategies of generating artificial data using microsimulations. It describes traffic microsimulation based on our solution of multiagent framework over which a system for generating traffic data is built. The system generates data of a structure corresponding to the data acquired in the real world.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...iosrjce
This document provides an analytical review of algorithms that control congestion in vehicular networks (VANETs). It begins with an introduction to VANETs and the issues they face with congestion due to high volumes of broadcast safety and non-safety messages. It then reviews several proposed hop-by-hop congestion control algorithms, including one that uses a utility-based approach where packets are prioritized based on encoded utility information. The document analyzes the characteristics and limitations of different algorithms to maintain efficient network operation while preventing overloads during congestion.
This document provides an analytical review of algorithms that control congestion in vehicular networks (VANETs). It begins with an introduction to VANETs and the issues they face with congestion due to frequent broadcasting of safety and non-safety messages. It then discusses several proposed congestion control algorithms for VANETs, including a utility-based approach that encodes utility information in packets to prioritize them. The document analyzes the characteristics of different hop-by-hop congestion control approaches and highlights their advantages over end-to-end approaches for VANETs. Finally, it provides a comparison of various proposed algorithms for VANET congestion control.
CREATING DATA OUTPUTS FROM MULTI AGENT TRAFFIC MICRO SIMULATION TO ASSIMILATI...csandit
interface for communication between agents.
class for communication management.
Agent Factory: class for agent creation.
Agent Directory: class for agent registration.
Agent Behavior: abstract class for agent behavior definition.
Concrete Agent: concrete agent implementation.
The core of the architecture is based on three main classes:
- Manager - represents the highest level of hierarchy, manages lower level agents.
- Agent - represents basic autonomous entity, encapsulates behavior and communication.
- Structure - represents geographical area, contains reference to lower level agents.
Agents are organized hierarchically according to geographical areas they represent. Manager is
the root of hierarchy, structures represent areas and agents are located
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
This document discusses a dual Arti-Q system for efficient call taxi management in vehicular ad hoc networks (VANETs). The existing Artigence system uses an Arti-Q algorithm with two components: Arti-Q main and Arti-Q proxy. The dual Arti-Q system proposes distributing the functionalities of scheduling and message transmission between separate servers to process requests in parallel and reduce response times. By separating these functions, the dual Arti-Q system aims to improve efficiency over the existing Artigence approach for managing taxi reservations and communications in VANETs.
Communication cost minimization in wireless sensor and actor networks for roa...ambitlick
1) The document discusses minimizing communication costs in wireless sensor and actor networks (WSANs) used for road surveillance.
2) It formulates the problem of choosing a set of working actors to coordinate data transmission as an optimization problem aimed at minimizing total communication costs.
3) The authors propose both a dynamic programming solution and a graph-based solution to solve the optimization problem and find optimal solutions, evaluating their performance through simulations.
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...IOSR Journals
1) The document proposes two novel routing algorithms, delay-bounded greedy forwarding and delay-bounded minimum cost forwarding, for efficient traffic monitoring and data propagation in vehicular ad-hoc networks.
2) It aims to minimize bandwidth utilization while adhering to user-defined data freshness requirements. The algorithms leverage locally and globally available traffic information to optimize data acquisition and delivery.
3) A framework is proposed that jointly optimizes data acquisition from vehicles and data delivery to access points to meet freshness requirements with minimum communication costs.
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
The most important stages in designing a
computer
network
in a
wider geographical area include:
definition of requirements, topological description
,
identification and calculation of relevant parameters
(
i
.
e
.
traffic matrix
)
, determining the shortest path between nodes, quantification of the effect of various
levels
of technical and technological development of urban areas involved, the cost of technology
,
and the
cost of services. The
se
parameters differ for WAN networks in different regions
–
their calculation depends
directly
on
the data “
i
n the field
”
: number of inhabitants, distance between populated areas,
network
traffic
density
,
as well as
available
bandwidth
. The
main
reason for identification and evaluation of these
parameters
is
to develop a model that could
meet the
constraints
im
posed by poten
tial beneficiaries.
In this
paper
,
we develop a methodology for planning and cost
-
modeling of a wide area network
and
validate it
in
a case study,
under the
supposition
that
behavioral interactions of individuals and groups play a significant
role and have
to be taken into consideration
by employing either simple or composite indicators of
socioeconomic status
.
Similar to The Design of a Simulation for the Modeling and Analysis of Public Transportation Systems as Opportunistic Networks (20)
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Walmart Business+ and Spark Good for Nonprofits.pdf
The Design of a Simulation for the Modeling and Analysis of Public Transportation Systems as Opportunistic Networks
1. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 173
The Design of a Simulation for the Modeling and Analysis of Public
Transportation Systems as Opportunistic Networks
Rotimi Iziduh riziduh@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
Jamahrae Jackson j_m_jackson@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
Howard Sueing hsueing@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
A. Nicki Washington a_n_washington@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
Robert Rwebangira mugizi@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
Legand Burge lburge@howard.edu
Department of Systems and Computer Science
Howard University Washington,
DC 20059 USA
Abstract
Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in
a variety of solutions for commercial, urban, and metropolitan areas, including
emergency response, traffic, and environmental monitoring. In this work, we model
buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a
network of vehicular nodes equipped with wireless sensors. A simulation tool was
developed, to determine performance metrics such as end-to-end packet delivery delay.
Keywords: Opportunistic networks, Vehicular networks, Simulation, Network simulation
2. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 174
1. INTRODUCTION
Mobile ad hoc networks (MANET) have provided technological connectivity in areas where various
constraints, including environmental, financial, cultural, time, and government prohibited the
establishment of infrastructure-based networks. Nodes may be static or mobile, leading to a dynamic
network topology. Routing of data occurs as nodes relay information to each other. Traditional ad hoc
routing protocols assume the network is fully connected. In addition, the end-to-end source-destination
path is assumed to be known prior to transmission.
The need for increased connectivity extends from urbanized areas to remote and rural areas previously
unreachable via standard telecommunication networks. In either of these cases, the establishment or use
of an infrastructure-based network is not always feasible, due to various constraints, including time,
financial, cultural, government, and environmental. In addition, certain catastrophic events can render
infrastructure networks useless.
Opportunistic or disruption tolerant networks (DTN) are special types of MANETs where no end-to-end
path exists between source and destination nodes, due to a number of potential factors, including node
mobility, physical obstructions, etc. Packet transmission occurs in a store-and-forward fashion, where
nodes relay packets to neighboring nodes as they come in contact with each other, until the packet
ultimately reaches its destination. As a result, packets must endure longer delays.
Vehicular ad-hoc networks (VANETs) are a special type MANET where cars or buses are equipped with
devices that allow them to communicate with each other and any stationary equipment they may pass.
These vehicles, referred to as nodes, are restricted to movement on streets or designated paths. In a
major metropolitan area, public transportation systems can be utilized to provide opportunistic routing and
delivery of data via buses. When equipped with wireless sensors, these networks can be used for a
number of purposes, including health, environmental, habitat, and traffic monitoring, emergency
response, and disaster relief [4, 10, 11, 15, 16, 20, 22].
In this work, we develop a simulation tool for modeling and analyzing a DTN comprised of buses in a
public transportation system. Using real bus information and schedules, the simulation provides a realistic
model of the entire network. This tool can be used to study various routing protocols and network
performance metrics, such as end-to-end packet delay, packet copy distribution, and more. In addition,
we provide a web-based front-end, using the Google Maps API, that provides a user-friendly interface for
updating the network to account for a number of parameters and conditions, including inclement weather,
traffic congestion, and other adverse conditions.
We note that, while this work uses the Washington Metropolitan Area Transit Authority (WMATA) system,
the simulation can model any public transportation system that subscribes to the defined specification. It
is the ultimate goal that this simulation will be used not only to study the use of the public transportation
systems of cities for various societal and research purposes, but also to provide a means for any
organization or individual to utilize this tool to gather relevant data.
The remainder of this work is organized as follows. In section 2, we discuss related work on DTN
simulation models. In section 3, we present the network model. In section 4, we present the simulation
model and web-based front end. In section 5, we present numerical results and a snapshot of our
simulation application. In section 6, we conclude our findings.
2. RELATED WORK
Opportunistic or delay tolerant networks (DTN) have been suggested as a viable solution for a number of
non-traditional mobile ad-hoc networks. These include providing connectivity in rural or remote areas,
wildlife tracking and monitoring, and military battlefields, to name a few. A large majority of the work has
focused on the development and analysis of routing protocols to measure a number of performance
metrics, including end-to-end delay and packet copy distribution.
3. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 175
Recently, work in the area of DTN has shifted to include urban environments and the capabilities in these
areas [2, 8, 10, 15, 19, 23]. Specifically, the use of vehicular nodes has been studied. These networks are
assumed to perform a number of tasks, including traffic and environment monitoring, and emergency
response, and disaster recovery. A large amount of work has focused on various routing strategies for
these networks [1, 2, 3, 5, 7, 9, 11, 15, 16, 17, 18].
In these networks, there are a number of attempts to model various protocols using testbeds [12, 13, 14,
15, 23]. These testbeds range from small networks of robots emulating the movement of vehicles to
actual buses equipped with processing capabilities. In each of these cases, there are limitations to the
implementation. Mainly, the size of the actual networks can make the creation of an exact replica
extremely difficult, if not impossible. Second, the implementation of these studies on the actual network
can be difficult to implement, due to financial, regulatory, and time constraints.
Simulations are a viable solution to modeling and analyzing opportunistic networks exploiting vehicular
nodes in urban areas [15, 16, 19]. These networks can be analyzed, in full, prior to implementation. The
benefit in this research is the ability to study the performance of the network using a number of protocols
and parameters. While these are easier to implement than physical testbeds, creating such a large-scale
simulation, that incorporates a large number of nodes and data movement can quickly become complex.
This requires adequate emulation of vehicular movement, data transmission, schedules, and more.
To the best of our knowledge, there is still much open research in the area of simulations of DTN in urban
environments. Specifically, the use of public transportation (i.e. buses, subway, etc.) as vehicular nodes
has only recently begun to receive attention. The complexity of such networks, due to the aforementioned
schedules, number of nodes, etc. can make this type of network difficult to accurately simulate.
In addition, the aforementioned simulations are designed to address a specific network representation.
Our simulation allows for various public transportation networks to be studied using the Google Transit
Feed Specification. Simulation parameters do not require modification when studying various cities.
Our research focuses on developing a simulation tool that can be used to study DTN in urban
environments exploiting the public bus system of any city. The novelty of our research is the development
of a tool that can be used to study various protocols and metrics of interest by providing a common format
for modeling any city, using a Google-developed specification for transit data. While simulations have
been developed, to the best of our knowledge, our work is the first that incorporates real data, including
schedules, sing Google Transit Feed Specification. The benefit of using this that the tool can be used to
study any city whose public transportation information is provided via the specification. Furthermore, the
web-based front-end provides a simplified mechanism for manipulating and executing the simulation.
3. NETWORK MODEL
The network is composed of all streets that comprise the WMATA public transportation grid, including
Washington, DC-proper and adjacent cities in both Maryland and Virginia. A node in the network is
represented by a bus. Each station and node is assumed to be equipped with processing capabilities and
a small buffer. Each bus belongs to a bus (node) line, which has a pre-determined path comprised of a
set of streets. We note that a single line contains multiple buses traveling in opposite directions, referred
to as upstream and downstream. In addition, every bus on every line has an expected arrival/departure
time to/from each designated stop along the line.
A stop is defined as a stationary bus stop or base station, where data collection/dissemination activities
take place. We assume each stop is equipped with the necessary equipment (e.g. sensors, etc.) to collect
and store data. At any stop, a packet is randomly generated that is destined for another stop. The packet
is transmitted to the first node that reaches the stop after this generation. As the carrier node travels
throughout the network, it transmits the packet to any node it encounters that is within transmission
range. A packet is delivered once it reaches the destination stop.
In this work, we make the following assumptions:
4. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 176
• Packets are originated at and delivered to stops in the network. Buses (nodes) serve as
intermediate carriers for relaying information from a source (stop) to destination (stop).
• A packet can be transmitted to a node or line that previously carried the packet.
• If two nodes are within communication range of the current carrier node, then the new carrier is
randomly selected.
• At the end of the last bus route, buses store all packets in their respective buffers until the next
day’s routes begin.
• Packets arriving to nodes with full buffers are undeliverable. However, the transmitting node
retains copies of the packets.
4. SIMULATION MODEL
To test our simulation, we used actual bus information from the Washington Metropolitan Area Transit
Authority (WMATA). This information includes a total of approximately 1,400 buses on 350 different bus
lines over approximately 80 sq. miles. We note that each bus line contains more than one bus in each
direction.
In order to accurately and efficiently obtain and analyze real WMATA information, we used the General
Transit Feed Specification (GTFS). GTFS is a Google-defined specification that provides a common
format for mapping a city’s public transportation with its associated geographic info using the Google
Maps API [6, 21]. Using GTFS, the public transportation agency of any city can prepare a data feed
according to specifications, validate it, and enroll in a partnership with the Google Transit team to launch
the feed in GTFS. Submitted feed information includes subway, bus, and train info. The associated data
is then displayed in Google Maps. Information provided via GTFS includes parameters such as
station/stop name, longitude, latitude, bus/subway stops and lines, etc. A number of public transportation
agencies across the country and globe currently have feeds in GTFS, including major metropolitan areas
such as San Francisco, Boston, Philadelphia, Washington, DC, and New York.
Using a custom, Java-based discrete-event simulator, we model and simulate the movement of buses
and data in the network. We use GTFS, JavaScript, XML, and the Google Maps API to build a custom,
web-based front-end for our simulation. This front-end was developed to provide an alternative view of
the simulation results. Users can not only view the resulting path that a delivered packet traverses, but
also manipulate specific input parameters, such as number of network packets, start time, source-
destination pairs, and adverse conditions (inclement weather, accidents, etc.) within a user-friendly
environment. The front-end was developed with the goal of providing various agencies and authorities
studying the use of public transportation for various research or application purposes could use the
simulation, combined with the corresponding GTFS feed for a specific city, and easily manipulate the
simulation, regardless of their level of knowledge regarding the simulation design and implementation.l
Using the information provided by GTFS and our discrete-event simulator, packets are randomly
generated at stops, and transferred by nodes to destination stops. Each node has a small buffer that
allows for the storing of packets in transit. The exchange of a data packet occurs when two nodes are
within 500 ft. of each other.
5. NUMERICAL RESULTS
In this work, we simulate a seven-day time period in the WMATA. Packets are randomly generated
throughout the network at various sources and at various times of day. In addition, we assume that
packets are routed according to flooding. At the end of each day, all buses with packets in their respective
buffers store these packets until the next morning’s route begins. For our work, we use a maximum node
buffer size of 12 packets and a maximum number of 10 unique packets destined for different source-
destination packets in the network. We note that, while 10 unique packets are generated, there are
multiple copies of these 10 packets present throughout the network.
5. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 177
Figure 1 presents a snapshot of the current web-based front-end. It should be noted that, in addition to
being able to map the resulting path traversed, the simulation also allows users to input a number of
parameters to manipulate the simulation, including weather conditions, rush hour starting time, packet
size, etc.
FIGURE 1: Web-Based Front End
Figure 2 presents the average end-to-end delivery delay of packets as a function of the size of the buffer.
We note that, as expected, the delay is reduced when the buffer is introduced. In our previous preliminary
work, we noted that a network with no store-and-forward capabilities (i.e. buffer size of 0) was significantly
higher [19]. For this reason, we only focus on buffer capabilities in this work.
Delay vs. Buffer Size
0
0.5
1
1.5
2
2.5
0 2 4 6 8 10 12
Buffer Size (# Packets)
Delay(hrs)
FIGURE 2: Packet Delay as a Function of Buffer Size
6. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 178
We also note that the delay varies slightly between 2 to 10 packets buffer size. We attribute this to a
smaller number of network packets in the network. With increased number of unique packets and copies
in the network, the delay variation is expected to be greater.
Figure 3 presents the average end-to-end delay as a function of the number of unique packets in the
network. We note an interesting trend in this figure. As expected, as the number of packet copies
increases, the end-to-end delay increases. We note the dramatic reduction in delay from 1 to 2 packets.
This is due to the fact that multiple copies of an individual packet are now in the network, which allows for
the probability of quicker delivery.
Delay vs. Number of Packets
0
5
10
15
20
25
0 2 4 6 8 10 12
Number of Packets
Delay(hours)
FIGURE 3: Packet Delay as a Function of Number Packets
6. CONCLUSION
In this work, we developed a discrete-event simulation to represent an opportunistic network comprised of
vehicular nodes. A web-based front end was also developed via the Google Maps API, to allow a user-
friendly method of manipulating network and simulation parameters. The simulation used real bus
information from the Washington Metropolitan Area Transit Authority (WMATA). However, this simulation
can easily analyze any system utilizing the General Transit Feed Specification (GTFS).
Currently, we are extending the capabilities of the simulation to include more unique source-destination
pairs, complete parameter specification on the web-based front end, the incorporation of mobile base
stations across the city, and the inclusion of additional node traffic (i.e. subway, people, cars, etc.).
We are also working on developing a model for approximating the analysis of the network. This work can
ultimately be used to assist metro authorities in various cities with addressing optimization problems, such
as costs, routing issues, and resource allocation. It can also be used to model the performance of various
types of algorithms and protocols on such networks, including those used for emergency response,
disaster relief, environmental monitoring, and more.
7. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 179
7. REFERENCES
[1] Conan, V. et. al.“Fixed Point Opportunistic Routing in Delay Tolerant Networks”. Journal on Selected
Areas in Communication: Special Issue on Delay Tolerant Networks, 26(5):773-782, 2008
[2 ] Dias, J. et. al. “Creation of a Vehicular Delay-Tolerant Network Prototype”. In Proceedings of
Engenharia - Jornadas da Universidade da Beira Interior, Covilha, Portugal, 2009
[3] Doria, A., Uden, M., and Pandey, D. “Providing Connectivity to the Saami Nomadic Community”. In
Proceedings of the 2
nd
International Conference on Open Collaborative Design for Sustainable
Innovation, Bangalore, India, 2002
[4] Echelon Corporation Buses in Italy Stop for LonWorks Networks [Online]. Available at:
http://www.echelon.com. [Accessed from the Echelon Networks website]
[5] Eisenman, S, et. al. “Techniques for Improving Opportunistic Sensor Networking Performance”.
Lecture Notes In Computer Science, 5067:157 – 175, 2008
[6] Google. General Transit Feed Specification [Online]. Available at:
http://code.google.com/transit/spec/transit_feed_specification.html [Accessed from the Google website]
[7] Groenevelt, R., Nain, P., Koole, G. “The Message Delay in Mobile Ad Hoc Networks”. Performance
62(1-4):210-228, 2005
[8] Lane, N., et. al. “Urban Sensing: Opportunistic or Participatory?” In Proceedings of the 9
th
Workshop
on Mobile Computing Systems and Applications, Napa Valley, CA, USA, 2008
[9] Leguay, J. et. al. “Evaluating MobySpace Based Routing Strategies in Delay Tolerant Networks”.
Wireless Communication and Mobile Computing, 7(10):1171-1182, 2007
[10] Kohl, G. Going Mobile with Video Surveillance on Chicago’s Bus System [Online]. Available at:
http://www.securityinfowatch.com/root+level/1284404 [Accessed from the Security Info Watch website]
[11] Li, X., et. al. “DTN Routing in Vehicular Sensor Networks”. In Proceedings of IEEE Global
Telecommunications Conference, New Orleans, LO, USA 2008
[12] Murty, Rohan., et. al. “CitySense: An Urban-Scale Wireless Sensor Network and Testbed”. In
Proceedings of IEEE Conference on Technologies for Homeland Security, Waltham, MA, USA, 2008
[13] Ormont, Justin., et. al. “A City-Wide Veheicular Infrastructure for Wide-area Wireless
Experimentation”. In Proceedings of International Conference on Mobile Computing and Networking, San
Francisco, CA, USA, 2008
[14] Ormont, Justin., et. al. “Continuous monitoring of wide-area wireless networks: data collection and
visualization”. In Proceedings of ACM SIGMETRICS Performance Evaluation Review, 2008
[15] Sede, Michel., et. al. “Routing in Large-Scale Buses Ad Hoc Networks”. In Proceedings of IEEE
Wireless Networking Conference, Las Vegas, NV, USA, 2008
[16] Seet, Boon-Chong., et. al. “A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular
Communications”. In Proceedings of Networking, 2004
[17] Seth, A., et. al. “Low-Cost Communication for Rural Internet Kiosks Using Mechanical Backhauls”. In
Proceedings of ACM MobiCom Los Angeles, CA, USA, 2006
[18] Shah., R., et. al. “Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks”. In
Proceedings of IEEE SNPA Workshop, 2003
8. Iziduh, Jackson, Sueing, Washington, Rwebangira & Burge
International Journal of Computer Networks (IJCN), Volume (2): Issue (4) 180
[19] Sueing, H. et. al. “The Modeling and Analysis of the Washington Metropolitan Area Bus Network”. In
Proceedings of the 2010 Modeling, Simulation, and Visualization Conference, Las Vegas, NV, USA, 2010
[20] Vahdat, A., and Becker, D., et. al. “Epidemic Routing for Partially-Connected Ad Hoc Networks”.
Tech. Rep. CS-2000006, 2000
[21] Washington Metropolitan Area Transit Authority. Developer Resources [Online]. Available at:
http://www.wmata.com/rider_tools/developer_resources.cfm [Accessed from the Washington Metropolitan
Area Transit Authority website]
[22] Zhang, Z., et. al. “Routing in Intermittently Connected Mobility Ad Hoc Networks And Delay Tolerant
Networks: Overview and Challenges”. IEEE Communication Surveys and Tutorials, 8(1):24-37, 2006
[23] Zhang, X., et al. “Study of Bus-based Disruption-Tolerant Network: Mobility Modeling and Impact on
Routing”. In Proceedings of ACM MobiCom, New York, NY, 2007