SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
264
THE NOVEL TECHNIQUES FOR DATA DISSEMINATION IN
VEHICULAR NETWORKS TO TRIUMPH OVER BROADCAST
STORM PROBLEM
Mohd Umar Farooq Dr .Khaleel Ur Rahman Khan
Dept of Information Technology Dept of Comp Science & Engg
Muffakham Jah College of Engg & Tech. ACE Engineering College
Hyderbad,India Hyderabad, India
ABSTRACT
Vehicular Ad-hoc networks are a mechanism for establishing inter-vehicular and road to
vehicle communication which is mostly required in avoiding vehicular collisions. Several solutions
have been proposed to establish an efficient and reliable network. The challenging part of the ad-hoc
networks is routing along with traffic control and protocol design. In this paper we present Three
strategies for an effective and simple mechanism for inter vehicular and road to vehicle
communication (V2V and R2V). In the proposed solution we also control the number of packets
transmitted by each node in the network. The number of packets transmitted by each node is not fixed
but dynamic and is transmitted at R.P.M(Rotations per Minute) rate and vincenty’s formula on ns-2.
Keywords: Vehicular AdHoc Networks, RSU, Intelligent Transportaion Systems
I. INTRODUCTION
Ad-hoc Network is a collection of communicating nodes over wireless links with base station
acting as an administrator. Here each node acts as a host and a router as well. Each node transmits
information about its position, speed and heading direction to its neighbor nodes and also to the
roadside base stations. In Vanets, each node takes a routing decision to forward the packet it received.
Many routing protocols (DSDV, Heuristic protocol, Greedy protocol, Flooding) have been proposed
to make a node choose an optimized path to route the packet with less amount of delay and requiring
lower bandwidth. Vanets provide efficient mechanism for inter vehicular and road to vehicle
communication which helps us in tracing the exact location of a node at any point of time. In case of
collision the network intimates the other vehicles to avoid secondary collisions. In deploying a vanet
nework the challenging part that a designer faces is to design an efficient routing protocol with no or
less packet congestion, high reliability and minimum delay. In this paper, a protocol is proposed
which provides a mechanism of data exchange between a node and a road side unit(RSU). Traffic
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 3, April 2013, pp. 264-272
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
265
congestion is also taken care of by minimizing the number of packets transmitted by each node at
times. The following figure is a schematic representation and topology of the nodes under two base
stations.
Fig (a): Topology of the nodes under two RSUs
V2V and R2V communication is clearly depicted in the above figure. Further the area covered by two
base stations is disjoint. As shown in the figure cluster1 is the area covered by the base station1 and
cluster2 is the area covered by base station2. Here each node i.e., each vehicle is in the vicinity of
only one particular base station at any point of time and transmits the packets to only one base station.
No two base stations can have a common vehicle in their proximities. Later in the report we present a
protocol which demonstrates how the vehicle to vehicle and vehicle to road side unit communications
takes place.
II. LIFETIME OF A PACKET IN NETWORK
In our proposed solution, each node broadcasts its packet to every other node which are in its
transmission range and each node upon receiving the packet, broadcasts the packet to other. This
process continues till the packet reaches the base station. To meet the criteria that no node is in the
vicinity of more than one base station, a hop count is fixed with each packet sent. The hop count fixed
limits the life of the packet in the network so that the packet is discarded before it is received by any
node in the adjacent cell.
III. VELOCITY OF PACKETS AND TRAFFIC MINIMIZATION
We present a mechanism where packet transfer rate of a node is not fixed by dynamic and
changes proportionally to its RPM(Rotations Per Minute). By measuring the r.p.m of the wheel we
can not only determine the distance the vehicle covers in certain time but also the duration for which
it is going to be in the vicinity of the base station and thus vary the velocity of the packets it transmits.
Therefore Velocity of the packets = k (r.p.m) of a node.
With the above mechanism, we control the number of packets transmitted by a node unlike
the other mechanisms where each node transmits packets at a constant rate which adds to traffic
congestion. The key idea here is “fast moving vehicles transmit and notify their position more
frequently than the slow moving vehicles” because RSU is more certain about a slow moving
vehicle’s position than a faster ones. . Fast moving vehicle has to send the packets at higher rate so
that RSU is updated about its current position. Slow moving vehicle need not send the packets at the
same rate as RSU is more certain about its position since the node is going to be in its vicinity for a
longer time. With this mechanism number of packets in the network is minimized and thereby
avoiding traffic congestion RPM of the node is constantly monitored to check whether the vehicle is
accelerating or decelerating and accordingly its flood rate is determined.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
266
IV. V2V COMMUNICATION AND CALCULATION OF INTER VEHIULAR DISTANCE
When a particular node broadcasts a packet, it is received by its neighbors who forward the
packet further until it reaches the base station. When a node receives a packet it calculates the distance
between it and sender by measuring the difference between the received and transmitted power which
is inversely proportional to the separation distance and if the distance between the vehicles is less than
certain threshold the receiver then immediately intimates the sender about the imminent event that
they are about to collide. Vehacol [2] is the protocol that calculates the inter vehicular distance by
measuring the difference between the received and transmitted power.
The acknowledgement may also include the push data like weather and traffic information to
the node in reply. The following data flow diagrams shown below will throw light on R2V
communication.
Fig (b): First packet that a node broadcast Fig (c): First packet lost packet lost
As shown in Fig (c), when a node sends the first packet to the base station, it waits for the
acknowledgement for certain time and when the timer is out it considers that the packet is lost and
retransmits the packet by changing its sequence number so the packet is not discarded by its neighbors
considering it as a duplicate packet.
Fig (d): Acknowledgement lost Fig (e): Packet Lost
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
267
Fig (c) is similar to Fig (d), here after the sender sends the packet, waits for an
acknowledgement and retransmits the packet if it doesn’t receive a packet after certain time. This is
again same as the sender is sending the first packet but with a changed sequence number to avoid
packet being discarded by its neighbors.
The above figure shows the state where base station sends an acknowledgement to the sender
node and waits for the succeeding packets. The time slot is set in such a way that a packet of slowest
moving vehicle is received before the time is out. If the base station doesn’t receive any succeeding
packet, it sends a request packet to the sender and waits for the reply. If the node is still in the cell
area of the base station, it retransmits the last packet with changed sequence number. It can also send
a new packet with current information about the node as retransmitting the old packet is sending the
information about past time. sends a request packet and waits for the reply for same time slot and if it
doesn’t receive any reply it considers that the node is no more in its vicinity and removes its entry
from the table. If the base station is equipped with GPS, when it sees a new node entering its cell area,
it can push a packet requesting details about the node. With this, the base station need not wait until a
new node broadcasts a message to it. It can immediately make a table entry of the new node. If the
base stations are equipped with GPS, hand off between the node and base station can be implemented
using MAHO (Mobile Assisted Hand Off).
V. AREA COVERED BY A RSU AT JUNCTIONS
The area covered by base stations along a straight path is more than the base stations location
at junctions. The circle shown in the figure is the area covered by base station 1 which is small when
compared to other base stations around whose cell area is not shown in the figure.
Fig (f): The circle shows the area covered by the RSU
VI. STRATEGY FOR IMPLEMENTING VINCENTY’S APPROACH FOR DATA
DISSEMINATION IN VANETS
JAS is the solution which we propose to solve the broadcast storm problem. In this approach
the victimized vehicle send a message to the nearest vehicle and the roadside equipment. The nearest
vehicle can be calculated using the Vincenty’s formula, which is used to calculate the distance
between two vehicles using its latitudes and longitudes. These values areobtained from the vehicles
GPS system (we assume that every vehicle is equipped with GPS system).The infrastructure sends a
message over the network about a new alert message and waits for a request from any of the vehicles.
If a vehicle asks for the message, the infrastructure responds to the request by sending the alert
message.When the car receives the message it just forwards it to the nearest car in its range (using
Vincenty’s formula). The car stores any message received in its buffer. If a car gets a message from a
car and as well as from the infrastructure it checks both the message and if the messages are same one
of the message would be deleted and the other message is stored and broadcasted. If the messages are
different the latest message is saved for rebroadcast.
From the figure, the victimized vehicle A broadcast the message about the incident to the
nearest car and the infrastructure. Using Vincenty’s formula we find that vehicle B is closer to A and
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
268
the message is send to it. The infrastructure waits for a request from a vehicle. The message is
forwarded on the basis of the distance from the current vehicle. The tick mark specifies the vehicles
that get the messages for broadcast.
DESIGN PRINCIPLES
A. Algorithm
The algorithm for JAS is given below:
Step 1: Start.
Step 2: The victimized vehicle v has to send the message to infrastructure i and the nearest
vehicle v’ Step 3: Run JASSend message to nearest vehicle calculated from the nearest vehicle
and the distance is calculated using the Vincenty’s formula (Given after the algorithm).
i) if (vehicle=v) then
send message to infrastructure i;
Step 4: i broadcasts a message to all vehicle about a new
alert message and wait for a response. If response is received the message is send to the requested car
and again i will wait.
Step 5: The car v’ runs JAS and send the message to the nearest car.
Step 6: If a car receives two messages from the infrastructure as well as from another car the message
is checked.
Step 7: if (messages are same) then
Delete one of the messages and store one in the buffer for rebroadcast.
Else if (messages are different) then
Delete the first message received from car
And store the latest one for broadcast.
Step 8: Stop.
B. Vincenty’s formula
The code for the particular
Vincenty’s formula is provided below:
a, b = major & minor semi axes of the ellipsoid
f = flattening (a−b)/a
φ1, φ2 = geodetic latitude
L = difference in longitude
U1 = atan ((1−f).tanφ1) (U is ‘reduced latitude’)
U2 = atan ((1−f).tanφ2)
λ = L (first approximation)
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
269
Note: Vincenty observes that eqn. (18) becomes indeterminate over equatorial lines (since cos²α → 0);
in this case, set cos2σm to 0 and the result is computed correctly. He also points out that the formula
may have no solution between two nearly antipodal points; an iteration limit traps this case (Vincenty
says “this will occur when λ, as computed by eqn. (11), is greater than π in absolute value”, but this is
not always a reliable test).
Note: some implementations of Vincenty’s formula inefficiently use a large number of trig functions;
Vincenty devised this solution with an eye for efficiency in implementation, and this one uses just one
each of sin, cos, sqrt, and atan2 for each iteration – only 3 or 4 iterations are generally required.
[Formulation updated Dec 05 to make it closer to Vincenty’s original and computationally more
efficient.]
note that to locate latitude/longitude points on these ellipses, they are associated with specific
datums: for instance, OSGB36 for Airy in the UK, ED50 for Int’l 1924 in Europe; WGS-84 defines
a datum as well as an ellipse. See my convert coordinates page for converting points between
different datums. Some of the terms involved are explained in Ed Williams’ notes on Spheroid
Geometry.
Test case (from Geoscience Australia), using WGS-84:
Flinders Peak 37°57′03.72030″S, 144°25′29.52440″E
Buninyong 37°39′10.15610″S, 143°55′35.38390″E
S 54 972.271 m
α1 306°52′05.37″
α2 127°10′25.07″ (≡ 307°10′25.07″ p1→p2)
Notes:
• Trig functions take arguments in radians, so latitude, longitude, and bearings in degrees
(either decimal or degrees/minutes/seconds) need to be converted to radians, rad = π.deg/180.
When converting radians back to degrees (deg = 180.rad/π), West is negative if using signed
decimal degrees. For bearings, values in the range -π to +π [-180° to +180°] need to be
converted to 0 to +2π [0°–360°]; this can be done by
(brng+ 2.π)%2.π [brng+ 360)%360] where % is the modulo operator.
• The atan2 () function used here takes two arguments, atan2(y, x), and computes the arc
tangent of the ratio y/x. It is more flexible than atan(y/x), since it handles x=0, and it also
returns values in all 4 quadrants -π to +π (the atan function returns values in the range -π/2 to
+π/2).
• If you implement any formula involving atan2 in Microsoft Excel, you will need to reverse
the arguments, as Excel has them the opposite way around from JavaScript – conventional
order is atan2(y, x), but Excel uses atan2(x, y). To use atan2 in a (VBA) macro, you can use
WorksheetFunction.Atan2 (). You will also have to rename the variables A, B / a, b, as VBA
is case-insensitive.
• All bearings are with respect to true north, 0°=N, 90°=E, etc; if you are working from a
compass, magnetic north varies from true north in a complex way around the earth, and the
difference has to be compensated for by variances indicated on local maps.
• For miles, divide km by 1.609344
• For nautical miles, divide km by 1.852
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
270
VII. SIMULATION AND PERFORMANCE EVALUATION
The above proposed protocol RPM has been simulated on QualNet network simulator neighbor
coverage on NS-2 . The scenario is described below.
A. SCENARIO DESCRIPTION
A scenario has been created with three mobile nodes (vehicles in this case) and three road
side units (RSU). The mobile nodes are moving at different speeds and we have made the nodes to
broadcast the packets at the speed which is directly proportional to the rate of their rpm. The scenario
is configured so as to simulate the proposed road to vehicle protocol as shown in the above vector
timing diagrams. The following graphs depict the flow and the manner in which the data flow takes
place in the above stated protocol. The mobile nodes are moving at different speeds and hence the
number of packets broadcasted by them is directly proportional to their rate of rpm.
A. Simulation Setup
The simulation topology consists of 10 moving nodes which are termed as vehicles and 2
RSU each equipped with a wireless interface working on the same channel. The packet data are
exchanged between the vehicles using Constant Bit Rate (CBR). The broadcast interval of each
packet is 3 seconds
B. Scenario Description
The objective of the paper is to reduce the broadcast storm problem that occurs in VANETs.
To describe the performance of the algorithm we use the metric of the total bytes transferred from
one node to another. The packets are exchanged among the RSUs and vehicles (victimized and other
moving vehicles). The scenario consists of 10 mobile nodes (vehicles) and 2 RSUs. The data
packets are send from the victimized vehicle to the RSU and nearer vehicle and the message is
forwarded to the vehicles nearby. Our proposed scheme is compared with another scenario of a
proposed solution from the previous work [1].
C. Simulation Result
We compare both the scenarios (that is scenario of our proposed solution and scenario of
previous solution) on the basis of total bytes send and received among the vehicles.
Graph showing the total bytes sent by each vehicle to the RSUs
the above graph is the time line showing the time when the first packet is forwarded from a base
station to the three vehicles. The other graph depicts the total bytes of data sent by each vehicle to the
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
271
three RSUs. It is evident from the above graph that the number of packets sent by the three vehicles is
not fixed and depends on its RPM. Scenario is configured such that the base station acknowledges
only the first packet
received from the mobile node. The packets following the first packet are not acknowledged and the
road side unit just updates its table whenever it receives a packet and piggybacks if it doesn’t receive
any packet before the timer is out.
SIMULATION SCENARIO Xgraph Comparison in VANETs with and
without NC
The graph above is the throughput graph of a proposed solution [3] A Stable Routing
Protocol to Support ITS where vehicles are grouped according to their moving directions and
choosing the most stable route to avoid path brakes with varying speed of vehicle The graph below is
the system aggregate graph obtained from the Qualnet network simulator by running the configured
scenario with parameters total bytes received and total bytes sent. Simulations on NS2
VIII. CONCLUSION
In this paper we introduced three scheme which establishes an effective and reliable
communication between vehicles and road side units (RSUs). The key idea behind the proposed
scheme is to control the number of packets in the network by making all the nodes flood packets at
different rates which is directly proportional to their RPM. An effective mechanism of data exchange
between nodes and RSUs has also been proposed where the RSU doesn’t acknowledge all the packets
it receives except the first packet. we have given the approach how can we handle broadcast storm
problem. This approach is used to enhance the performance of the VANET for broadcasting the
messages. When the accident has occurred the victimized vehicle sends the message and out
technique chooses the first vehicle to send the message.
IX. REFERENCES
[1] T.Rappport- wireless mobile communication Taunenbaum – Computer Networks
[2] VEHACOL:VehicularAntiCollisionMechanism using a Combination of PeriodicInformation
Exchange and Power Measurements -Ashwin Gumaste and Anirudha Sahoo
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
272
[3] A Stable Routing Protocol to Support ITS Services in VANET Networks Tarik Taleb, Member,
IEEE, Ehssan Sakhaee, Student Member, IEEE, Abbas Jamalipour, Fellow, IEEE, Kazuo Hashimoto,
Member, IEEE, Nei Kato, Senior Member, IEEE, and Yoshiaki Nemoto, Senior Member, IEEE
[4] M. Shulman and R. Deering, “Third annual report of the crash avoidance metrics partnership
April 2003–March 2004,” Nat. Highw. Traffic Safety Admin. (NHTSA), Washington, DC, Jan.
2005. DOT HS 809 837.
[5] C. Bergese, A. Braun, and E. Porta, “Inside CHAUFFEUR,” in Proc. 6thITS World Congr.,
Toronto, ON, Canada, Nov. 1999.
[6] L. Andreone and C. Ricerche, “Activities and applications of the vehicle to vehicle and vehicle to
infrastructure communication to enhance road safety,” in Proc. 5th Eur. Congr. Exhib. ITS,
Hannover, Germany, Jun. 2005.
[7] R. Kruger, H. Fuler, M. Torrent-Moreno, M. Transier, H. Hartenstein, and W. Effelsberg,
“Statistical analysis of the FleetNet highway movement patterns,” University of Mannheim,
Mannheim, Germany, Tech. Rep. TR-2005-004, Jul. 2005.
[8] W.-B. Zhang, H.-S. Tan, A. Steinfeld, B. Bougler, D. Empey, K. Zhou,
[9] M. Heddebaut, J. Rioult, J. P. Ghys, C. Gransart, and S. Ambellouis, “Broadband vehicle-to-
vehicle communication using an extended autonomous cruise control sensor,” Meas. Sci. Technol.,
vol. 16, no.6, pp. 1363–1373, Jun. 200
[10]M. Tomizuka, “Implementing advanced vehicle control and safetysystems (AVCSS) for highway
maintenance operations,” in Proc. 6th
Annu. World Congr. ITS, Toronto, ON, Canada, Nov. 1999.
[12]Y. Ko and N. H. Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks,” in Proc.
IEEE/ACM MobiCom, Dallas, TX, Oct. 1998,
[13]Kanitsorn Suriyapaibonwattan and Chotipat Pornavalai, “An Effective Safety Alert Broadcast
Algorithm for VANET”, in International Symposium on Communication and Information
Technology, 2008
[14] Ozan Tonguz, Nawapron Wisitponghan, Fan Bai, Priyantha Mudalige and Varsha Sadekar,
“Broadcasting in VANET,” in Proc. ACM VANET,sep. 2007, pp.1-6.
[15]C.-F. Chiasserinity, E.Fasoloz, R.Furuatoz and R.Gaeta, “Smart Broadcast of Warning Messages
in Vehicular Ad HocNetworks,” in the NoE NEWCOM Oct. 2006.
[16]S. Ni, Y. Tseng, Y. Chen, and J. Sheu, “The broadcast storm problem in a mobile ad hoc
network,” in Proc. ACM Intern. Conf. on Mobile Computing and Networking (MOBICOM), Seattle,
USA, 1999, pp. 151- 162.
[17]C. Hu, Y. Hong, and J. Hou, “On mitigating the broadcast storm problem with directional
antennas,” in Proc. IEEE International Conf. On Commun. (ICC), vol. 1, Seattle, USA, May 2003, pp.
104- 110.
[18]http://www.leearmstrong.com/DSRC/DSRCHomeset.html
[19]N. Wisitpongphan, O. Tonguz, J. Parikh, F. Bai, P. Mudalige, and V. Sadekar, “On the Broadcast
Storm Problem in Ad hoc Wireless Network.” In IEEE Wireless Communications, to appear.
[20]N. Wisitpongphan, O. Tonguz, F. Bai, P. Mudalige, and V. Sadekar, “On the Routing Problem in
Disconnected Veicular Ad Hoc Networks,” in Proc. IEEE INFOCOM,
[21] Venkatesh Kumar .P,Vallikannu A.L and Kavitha B.C, “Effective Broadcasting in Mobile
Ad Hoc Networks Using Grid Based Mechanism” International journal of Computer Engineering &
Technology (IJCET), Volume 2, Issue 1, 2011, pp. 39 - 46, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[22] S.V.M.G.Bavithiraja and Dr.R.Radhakrishnan, “Power Efficient Context-Aware Broadcasting
Protocol for Mobile Ad Hoc Network”, International journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 1, 2012, pp. 81 - 96, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstractMukundhan Elumalai
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksNemesio Jr. Macabale
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layereSAT Publishing House
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKS
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKSSPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKS
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKSChristo Ananth
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 

What's hot (20)

40520130101003
4052013010100340520130101003
40520130101003
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
G010323739
G010323739G010323739
G010323739
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh Networks
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Ec34781784
Ec34781784Ec34781784
Ec34781784
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layer
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKS
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKSSPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKS
SPLITTING ALGORITHM BASED RELAY NODE SELEC-TION IN WIRELESS NETWORKS
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 

Similar to Novel Techniques for Data Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem

Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETpaperpublications3
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) ijceronline
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivitypaperpublications3
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 

Similar to Novel Techniques for Data Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem (20)

Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
4315ijci01
4315ijci014315ijci01
4315ijci01
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
D017522833
D017522833D017522833
D017522833
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivity
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Novel Techniques for Data Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 264 THE NOVEL TECHNIQUES FOR DATA DISSEMINATION IN VEHICULAR NETWORKS TO TRIUMPH OVER BROADCAST STORM PROBLEM Mohd Umar Farooq Dr .Khaleel Ur Rahman Khan Dept of Information Technology Dept of Comp Science & Engg Muffakham Jah College of Engg & Tech. ACE Engineering College Hyderbad,India Hyderabad, India ABSTRACT Vehicular Ad-hoc networks are a mechanism for establishing inter-vehicular and road to vehicle communication which is mostly required in avoiding vehicular collisions. Several solutions have been proposed to establish an efficient and reliable network. The challenging part of the ad-hoc networks is routing along with traffic control and protocol design. In this paper we present Three strategies for an effective and simple mechanism for inter vehicular and road to vehicle communication (V2V and R2V). In the proposed solution we also control the number of packets transmitted by each node in the network. The number of packets transmitted by each node is not fixed but dynamic and is transmitted at R.P.M(Rotations per Minute) rate and vincenty’s formula on ns-2. Keywords: Vehicular AdHoc Networks, RSU, Intelligent Transportaion Systems I. INTRODUCTION Ad-hoc Network is a collection of communicating nodes over wireless links with base station acting as an administrator. Here each node acts as a host and a router as well. Each node transmits information about its position, speed and heading direction to its neighbor nodes and also to the roadside base stations. In Vanets, each node takes a routing decision to forward the packet it received. Many routing protocols (DSDV, Heuristic protocol, Greedy protocol, Flooding) have been proposed to make a node choose an optimized path to route the packet with less amount of delay and requiring lower bandwidth. Vanets provide efficient mechanism for inter vehicular and road to vehicle communication which helps us in tracing the exact location of a node at any point of time. In case of collision the network intimates the other vehicles to avoid secondary collisions. In deploying a vanet nework the challenging part that a designer faces is to design an efficient routing protocol with no or less packet congestion, high reliability and minimum delay. In this paper, a protocol is proposed which provides a mechanism of data exchange between a node and a road side unit(RSU). Traffic INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 3, April 2013, pp. 264-272 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 265 congestion is also taken care of by minimizing the number of packets transmitted by each node at times. The following figure is a schematic representation and topology of the nodes under two base stations. Fig (a): Topology of the nodes under two RSUs V2V and R2V communication is clearly depicted in the above figure. Further the area covered by two base stations is disjoint. As shown in the figure cluster1 is the area covered by the base station1 and cluster2 is the area covered by base station2. Here each node i.e., each vehicle is in the vicinity of only one particular base station at any point of time and transmits the packets to only one base station. No two base stations can have a common vehicle in their proximities. Later in the report we present a protocol which demonstrates how the vehicle to vehicle and vehicle to road side unit communications takes place. II. LIFETIME OF A PACKET IN NETWORK In our proposed solution, each node broadcasts its packet to every other node which are in its transmission range and each node upon receiving the packet, broadcasts the packet to other. This process continues till the packet reaches the base station. To meet the criteria that no node is in the vicinity of more than one base station, a hop count is fixed with each packet sent. The hop count fixed limits the life of the packet in the network so that the packet is discarded before it is received by any node in the adjacent cell. III. VELOCITY OF PACKETS AND TRAFFIC MINIMIZATION We present a mechanism where packet transfer rate of a node is not fixed by dynamic and changes proportionally to its RPM(Rotations Per Minute). By measuring the r.p.m of the wheel we can not only determine the distance the vehicle covers in certain time but also the duration for which it is going to be in the vicinity of the base station and thus vary the velocity of the packets it transmits. Therefore Velocity of the packets = k (r.p.m) of a node. With the above mechanism, we control the number of packets transmitted by a node unlike the other mechanisms where each node transmits packets at a constant rate which adds to traffic congestion. The key idea here is “fast moving vehicles transmit and notify their position more frequently than the slow moving vehicles” because RSU is more certain about a slow moving vehicle’s position than a faster ones. . Fast moving vehicle has to send the packets at higher rate so that RSU is updated about its current position. Slow moving vehicle need not send the packets at the same rate as RSU is more certain about its position since the node is going to be in its vicinity for a longer time. With this mechanism number of packets in the network is minimized and thereby avoiding traffic congestion RPM of the node is constantly monitored to check whether the vehicle is accelerating or decelerating and accordingly its flood rate is determined.
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 266 IV. V2V COMMUNICATION AND CALCULATION OF INTER VEHIULAR DISTANCE When a particular node broadcasts a packet, it is received by its neighbors who forward the packet further until it reaches the base station. When a node receives a packet it calculates the distance between it and sender by measuring the difference between the received and transmitted power which is inversely proportional to the separation distance and if the distance between the vehicles is less than certain threshold the receiver then immediately intimates the sender about the imminent event that they are about to collide. Vehacol [2] is the protocol that calculates the inter vehicular distance by measuring the difference between the received and transmitted power. The acknowledgement may also include the push data like weather and traffic information to the node in reply. The following data flow diagrams shown below will throw light on R2V communication. Fig (b): First packet that a node broadcast Fig (c): First packet lost packet lost As shown in Fig (c), when a node sends the first packet to the base station, it waits for the acknowledgement for certain time and when the timer is out it considers that the packet is lost and retransmits the packet by changing its sequence number so the packet is not discarded by its neighbors considering it as a duplicate packet. Fig (d): Acknowledgement lost Fig (e): Packet Lost
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 267 Fig (c) is similar to Fig (d), here after the sender sends the packet, waits for an acknowledgement and retransmits the packet if it doesn’t receive a packet after certain time. This is again same as the sender is sending the first packet but with a changed sequence number to avoid packet being discarded by its neighbors. The above figure shows the state where base station sends an acknowledgement to the sender node and waits for the succeeding packets. The time slot is set in such a way that a packet of slowest moving vehicle is received before the time is out. If the base station doesn’t receive any succeeding packet, it sends a request packet to the sender and waits for the reply. If the node is still in the cell area of the base station, it retransmits the last packet with changed sequence number. It can also send a new packet with current information about the node as retransmitting the old packet is sending the information about past time. sends a request packet and waits for the reply for same time slot and if it doesn’t receive any reply it considers that the node is no more in its vicinity and removes its entry from the table. If the base station is equipped with GPS, when it sees a new node entering its cell area, it can push a packet requesting details about the node. With this, the base station need not wait until a new node broadcasts a message to it. It can immediately make a table entry of the new node. If the base stations are equipped with GPS, hand off between the node and base station can be implemented using MAHO (Mobile Assisted Hand Off). V. AREA COVERED BY A RSU AT JUNCTIONS The area covered by base stations along a straight path is more than the base stations location at junctions. The circle shown in the figure is the area covered by base station 1 which is small when compared to other base stations around whose cell area is not shown in the figure. Fig (f): The circle shows the area covered by the RSU VI. STRATEGY FOR IMPLEMENTING VINCENTY’S APPROACH FOR DATA DISSEMINATION IN VANETS JAS is the solution which we propose to solve the broadcast storm problem. In this approach the victimized vehicle send a message to the nearest vehicle and the roadside equipment. The nearest vehicle can be calculated using the Vincenty’s formula, which is used to calculate the distance between two vehicles using its latitudes and longitudes. These values areobtained from the vehicles GPS system (we assume that every vehicle is equipped with GPS system).The infrastructure sends a message over the network about a new alert message and waits for a request from any of the vehicles. If a vehicle asks for the message, the infrastructure responds to the request by sending the alert message.When the car receives the message it just forwards it to the nearest car in its range (using Vincenty’s formula). The car stores any message received in its buffer. If a car gets a message from a car and as well as from the infrastructure it checks both the message and if the messages are same one of the message would be deleted and the other message is stored and broadcasted. If the messages are different the latest message is saved for rebroadcast. From the figure, the victimized vehicle A broadcast the message about the incident to the nearest car and the infrastructure. Using Vincenty’s formula we find that vehicle B is closer to A and
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 268 the message is send to it. The infrastructure waits for a request from a vehicle. The message is forwarded on the basis of the distance from the current vehicle. The tick mark specifies the vehicles that get the messages for broadcast. DESIGN PRINCIPLES A. Algorithm The algorithm for JAS is given below: Step 1: Start. Step 2: The victimized vehicle v has to send the message to infrastructure i and the nearest vehicle v’ Step 3: Run JASSend message to nearest vehicle calculated from the nearest vehicle and the distance is calculated using the Vincenty’s formula (Given after the algorithm). i) if (vehicle=v) then send message to infrastructure i; Step 4: i broadcasts a message to all vehicle about a new alert message and wait for a response. If response is received the message is send to the requested car and again i will wait. Step 5: The car v’ runs JAS and send the message to the nearest car. Step 6: If a car receives two messages from the infrastructure as well as from another car the message is checked. Step 7: if (messages are same) then Delete one of the messages and store one in the buffer for rebroadcast. Else if (messages are different) then Delete the first message received from car And store the latest one for broadcast. Step 8: Stop. B. Vincenty’s formula The code for the particular Vincenty’s formula is provided below: a, b = major & minor semi axes of the ellipsoid f = flattening (a−b)/a φ1, φ2 = geodetic latitude L = difference in longitude U1 = atan ((1−f).tanφ1) (U is ‘reduced latitude’) U2 = atan ((1−f).tanφ2) λ = L (first approximation)
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 269 Note: Vincenty observes that eqn. (18) becomes indeterminate over equatorial lines (since cos²α → 0); in this case, set cos2σm to 0 and the result is computed correctly. He also points out that the formula may have no solution between two nearly antipodal points; an iteration limit traps this case (Vincenty says “this will occur when λ, as computed by eqn. (11), is greater than π in absolute value”, but this is not always a reliable test). Note: some implementations of Vincenty’s formula inefficiently use a large number of trig functions; Vincenty devised this solution with an eye for efficiency in implementation, and this one uses just one each of sin, cos, sqrt, and atan2 for each iteration – only 3 or 4 iterations are generally required. [Formulation updated Dec 05 to make it closer to Vincenty’s original and computationally more efficient.] note that to locate latitude/longitude points on these ellipses, they are associated with specific datums: for instance, OSGB36 for Airy in the UK, ED50 for Int’l 1924 in Europe; WGS-84 defines a datum as well as an ellipse. See my convert coordinates page for converting points between different datums. Some of the terms involved are explained in Ed Williams’ notes on Spheroid Geometry. Test case (from Geoscience Australia), using WGS-84: Flinders Peak 37°57′03.72030″S, 144°25′29.52440″E Buninyong 37°39′10.15610″S, 143°55′35.38390″E S 54 972.271 m α1 306°52′05.37″ α2 127°10′25.07″ (≡ 307°10′25.07″ p1→p2) Notes: • Trig functions take arguments in radians, so latitude, longitude, and bearings in degrees (either decimal or degrees/minutes/seconds) need to be converted to radians, rad = π.deg/180. When converting radians back to degrees (deg = 180.rad/π), West is negative if using signed decimal degrees. For bearings, values in the range -π to +π [-180° to +180°] need to be converted to 0 to +2π [0°–360°]; this can be done by (brng+ 2.π)%2.π [brng+ 360)%360] where % is the modulo operator. • The atan2 () function used here takes two arguments, atan2(y, x), and computes the arc tangent of the ratio y/x. It is more flexible than atan(y/x), since it handles x=0, and it also returns values in all 4 quadrants -π to +π (the atan function returns values in the range -π/2 to +π/2). • If you implement any formula involving atan2 in Microsoft Excel, you will need to reverse the arguments, as Excel has them the opposite way around from JavaScript – conventional order is atan2(y, x), but Excel uses atan2(x, y). To use atan2 in a (VBA) macro, you can use WorksheetFunction.Atan2 (). You will also have to rename the variables A, B / a, b, as VBA is case-insensitive. • All bearings are with respect to true north, 0°=N, 90°=E, etc; if you are working from a compass, magnetic north varies from true north in a complex way around the earth, and the difference has to be compensated for by variances indicated on local maps. • For miles, divide km by 1.609344 • For nautical miles, divide km by 1.852
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 270 VII. SIMULATION AND PERFORMANCE EVALUATION The above proposed protocol RPM has been simulated on QualNet network simulator neighbor coverage on NS-2 . The scenario is described below. A. SCENARIO DESCRIPTION A scenario has been created with three mobile nodes (vehicles in this case) and three road side units (RSU). The mobile nodes are moving at different speeds and we have made the nodes to broadcast the packets at the speed which is directly proportional to the rate of their rpm. The scenario is configured so as to simulate the proposed road to vehicle protocol as shown in the above vector timing diagrams. The following graphs depict the flow and the manner in which the data flow takes place in the above stated protocol. The mobile nodes are moving at different speeds and hence the number of packets broadcasted by them is directly proportional to their rate of rpm. A. Simulation Setup The simulation topology consists of 10 moving nodes which are termed as vehicles and 2 RSU each equipped with a wireless interface working on the same channel. The packet data are exchanged between the vehicles using Constant Bit Rate (CBR). The broadcast interval of each packet is 3 seconds B. Scenario Description The objective of the paper is to reduce the broadcast storm problem that occurs in VANETs. To describe the performance of the algorithm we use the metric of the total bytes transferred from one node to another. The packets are exchanged among the RSUs and vehicles (victimized and other moving vehicles). The scenario consists of 10 mobile nodes (vehicles) and 2 RSUs. The data packets are send from the victimized vehicle to the RSU and nearer vehicle and the message is forwarded to the vehicles nearby. Our proposed scheme is compared with another scenario of a proposed solution from the previous work [1]. C. Simulation Result We compare both the scenarios (that is scenario of our proposed solution and scenario of previous solution) on the basis of total bytes send and received among the vehicles. Graph showing the total bytes sent by each vehicle to the RSUs the above graph is the time line showing the time when the first packet is forwarded from a base station to the three vehicles. The other graph depicts the total bytes of data sent by each vehicle to the
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 271 three RSUs. It is evident from the above graph that the number of packets sent by the three vehicles is not fixed and depends on its RPM. Scenario is configured such that the base station acknowledges only the first packet received from the mobile node. The packets following the first packet are not acknowledged and the road side unit just updates its table whenever it receives a packet and piggybacks if it doesn’t receive any packet before the timer is out. SIMULATION SCENARIO Xgraph Comparison in VANETs with and without NC The graph above is the throughput graph of a proposed solution [3] A Stable Routing Protocol to Support ITS where vehicles are grouped according to their moving directions and choosing the most stable route to avoid path brakes with varying speed of vehicle The graph below is the system aggregate graph obtained from the Qualnet network simulator by running the configured scenario with parameters total bytes received and total bytes sent. Simulations on NS2 VIII. CONCLUSION In this paper we introduced three scheme which establishes an effective and reliable communication between vehicles and road side units (RSUs). The key idea behind the proposed scheme is to control the number of packets in the network by making all the nodes flood packets at different rates which is directly proportional to their RPM. An effective mechanism of data exchange between nodes and RSUs has also been proposed where the RSU doesn’t acknowledge all the packets it receives except the first packet. we have given the approach how can we handle broadcast storm problem. This approach is used to enhance the performance of the VANET for broadcasting the messages. When the accident has occurred the victimized vehicle sends the message and out technique chooses the first vehicle to send the message. IX. REFERENCES [1] T.Rappport- wireless mobile communication Taunenbaum – Computer Networks [2] VEHACOL:VehicularAntiCollisionMechanism using a Combination of PeriodicInformation Exchange and Power Measurements -Ashwin Gumaste and Anirudha Sahoo
  • 9. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 272 [3] A Stable Routing Protocol to Support ITS Services in VANET Networks Tarik Taleb, Member, IEEE, Ehssan Sakhaee, Student Member, IEEE, Abbas Jamalipour, Fellow, IEEE, Kazuo Hashimoto, Member, IEEE, Nei Kato, Senior Member, IEEE, and Yoshiaki Nemoto, Senior Member, IEEE [4] M. Shulman and R. Deering, “Third annual report of the crash avoidance metrics partnership April 2003–March 2004,” Nat. Highw. Traffic Safety Admin. (NHTSA), Washington, DC, Jan. 2005. DOT HS 809 837. [5] C. Bergese, A. Braun, and E. Porta, “Inside CHAUFFEUR,” in Proc. 6thITS World Congr., Toronto, ON, Canada, Nov. 1999. [6] L. Andreone and C. Ricerche, “Activities and applications of the vehicle to vehicle and vehicle to infrastructure communication to enhance road safety,” in Proc. 5th Eur. Congr. Exhib. ITS, Hannover, Germany, Jun. 2005. [7] R. Kruger, H. Fuler, M. Torrent-Moreno, M. Transier, H. Hartenstein, and W. Effelsberg, “Statistical analysis of the FleetNet highway movement patterns,” University of Mannheim, Mannheim, Germany, Tech. Rep. TR-2005-004, Jul. 2005. [8] W.-B. Zhang, H.-S. Tan, A. Steinfeld, B. Bougler, D. Empey, K. Zhou, [9] M. Heddebaut, J. Rioult, J. P. Ghys, C. Gransart, and S. Ambellouis, “Broadband vehicle-to- vehicle communication using an extended autonomous cruise control sensor,” Meas. Sci. Technol., vol. 16, no.6, pp. 1363–1373, Jun. 200 [10]M. Tomizuka, “Implementing advanced vehicle control and safetysystems (AVCSS) for highway maintenance operations,” in Proc. 6th Annu. World Congr. ITS, Toronto, ON, Canada, Nov. 1999. [12]Y. Ko and N. H. Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks,” in Proc. IEEE/ACM MobiCom, Dallas, TX, Oct. 1998, [13]Kanitsorn Suriyapaibonwattan and Chotipat Pornavalai, “An Effective Safety Alert Broadcast Algorithm for VANET”, in International Symposium on Communication and Information Technology, 2008 [14] Ozan Tonguz, Nawapron Wisitponghan, Fan Bai, Priyantha Mudalige and Varsha Sadekar, “Broadcasting in VANET,” in Proc. ACM VANET,sep. 2007, pp.1-6. [15]C.-F. Chiasserinity, E.Fasoloz, R.Furuatoz and R.Gaeta, “Smart Broadcast of Warning Messages in Vehicular Ad HocNetworks,” in the NoE NEWCOM Oct. 2006. [16]S. Ni, Y. Tseng, Y. Chen, and J. Sheu, “The broadcast storm problem in a mobile ad hoc network,” in Proc. ACM Intern. Conf. on Mobile Computing and Networking (MOBICOM), Seattle, USA, 1999, pp. 151- 162. [17]C. Hu, Y. Hong, and J. Hou, “On mitigating the broadcast storm problem with directional antennas,” in Proc. IEEE International Conf. On Commun. (ICC), vol. 1, Seattle, USA, May 2003, pp. 104- 110. [18]http://www.leearmstrong.com/DSRC/DSRCHomeset.html [19]N. Wisitpongphan, O. Tonguz, J. Parikh, F. Bai, P. Mudalige, and V. Sadekar, “On the Broadcast Storm Problem in Ad hoc Wireless Network.” In IEEE Wireless Communications, to appear. [20]N. Wisitpongphan, O. Tonguz, F. Bai, P. Mudalige, and V. Sadekar, “On the Routing Problem in Disconnected Veicular Ad Hoc Networks,” in Proc. IEEE INFOCOM, [21] Venkatesh Kumar .P,Vallikannu A.L and Kavitha B.C, “Effective Broadcasting in Mobile Ad Hoc Networks Using Grid Based Mechanism” International journal of Computer Engineering & Technology (IJCET), Volume 2, Issue 1, 2011, pp. 39 - 46, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [22] S.V.M.G.Bavithiraja and Dr.R.Radhakrishnan, “Power Efficient Context-Aware Broadcasting Protocol for Mobile Ad Hoc Network”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 81 - 96, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.