The document describes a proposed multi-hop clustering (MHC) approach for vehicular ad-hoc networks (VANETs). The MHC approach selects cluster heads based on the node's speed being closest to the average speed and having a high network life. It calculates distrust values to isolate malicious nodes and determines a QoS value considering bandwidth, number of neighbors, distance and velocity ratios. The approach aims to improve stability, reliability and security compared to previous work. It was simulated in NS2 and showed better results than existing techniques for parameters like overhead, throughput, delay, loss and delivery ratio. The key contribution is adding calculations for percentage of stability and path length.
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
This paper focuses on vehicle to vehicle (V2V) communications in VANET. With the development of vehicles and mobile Ad Hoc network technology, the Vehicle Ad hoc Network (VANET) has become an emerging field of study. VANET is a special case of MANET, and will play an important role in city road traffic control. It is a challenging problem for searching and maintaining an effective route for transporting data information. Vehicular Ad Hoc network (VANET), is a hot topic applying mobile Ad Hoc network (MANET) to ITS in recent years. In the era of wireless computing, VANET communications are gaining a lot of attention. In this paper we provide a simulation and study of the effect of velocity on end-to-end delay for v2v communication in intelligent transportation Systems
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
This paper focuses on vehicle to vehicle (V2V) communications in VANET. With the development of vehicles and mobile Ad Hoc network technology, the Vehicle Ad hoc Network (VANET) has become an emerging field of study. VANET is a special case of MANET, and will play an important role in city road traffic control. It is a challenging problem for searching and maintaining an effective route for transporting data information. Vehicular Ad Hoc network (VANET), is a hot topic applying mobile Ad Hoc network (MANET) to ITS in recent years. In the era of wireless computing, VANET communications are gaining a lot of attention. In this paper we provide a simulation and study of the effect of velocity on end-to-end delay for v2v communication in intelligent transportation Systems
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
In some networks, communications are sometimes interrupted and packet sending encounters many delays
due to lack of permanent connection between the nodes. Inter-vehicular and inter-satellite networks, which
are the so-called delay-tolerant networks, are an example to this type. This paper proposed a new routing
algorithm, which could increase efficiency of this kind of networks using predictability feature of bus
movement in a vehicular network. In this paper, bus routes were considered the backbone for vehicular
network and, knowing route of bus and destination of packets, the proposed algorithm, which was able to
use this information, was introduced. In addition, the proposed algorithm was simulated to prove its
efficiency and then it was compared with other algorithms in different conditions. The obtained results
indicated acceptable efficiency of the proposed algorithm.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing), a greedy position based routing approach to forward packets to the node present in the edge of the limited transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that end to end delay in packet transmission is minimized considerably compared to current routing protocols of VANET.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Study of vanet routing protocols for end to end delaycsandit
Less than a century since the automobile was made affordable enough for the general
public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the
communication between vehicle to vehicle for p r o v i d i n g i n f o rma t i o n t o travelers with
new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing
Protocols for end-to-end delay in V2V communication.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Accident Avoidance and Privacy-Preserving in V2R Communication using Chord Al...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
Routing protocol and congestion control in Transmission Control Protocol (TCP) have important roles in wireless mobile network performance. In wireless communication, the stability of the path and successful data transmission will be influenced by the channel condition. This channel condition constraints come from path loss and the multipath channel fading. With these constraints, the algorithm in the routing protocol and congestion control is confronted with the uncertainty of connection quality and probability of successful packet transmission, respectively. It is important to investigate the reliability and robustness of routing protocol and congestion control algorithms in dealing with such situation. In this paper, we develop a detailed approach and analytical throughput performance with a cross layer scheme (CLS) between routing and congestion control mechanism based on signal to noise ratio (SNR) in Rician and Rayleigh as multipath fading channel. We proposed joint routing and congestion control TCP with a cross layer scheme model based on SNR (RTCP-SNR). We compare the performance of RTCP-SNR with conventional routing-TCP and routing-TCP that used CLS with routing aware (RTCP-RA) model. The analyses and the simulation results showed that RTCP-SNR in a multipath channel outperforms conventional routing-TCP and RTCP-RA.
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
The Queue Management Techniques play an important role in improving the Quality of Service in Mobile Ad hoc Networks. The need of congestion control and Queue management is inevitable in Mobile Ad hoc Network. Understanding and analyzing the latest AQM Techniques give an insight to improving throughput, packet loss rate, average end to end delay and other parameters that severely affect the performance. The performance of mobile ad hoc networks is evaluated by varying the Channel Error Rate, Bandwidth and Delay at different fragment sizes of different traffic flows. The proposed method performs the network analysis of new Routing protocols. The work proposes to evaluate various Active Queue Management Techniques in a multi traffic environment i.e., sources generating both TCP and UDP traffic classes. The UDP is propagated via CBR and TCP is propagated via FTP. The implementation of the proposed queue management technique has been done in NS 2. In the proposed work we have make NS 2 compatible with GREEN by integrating source code into the ns 2 installation files and using various AQMs in comparison with GREEN to calculate the throughput at various Bandwidths across network. Using various AQMs in comparison with GREEN we have calculated the throughput at various Delays across the network and we have also calculated the throughput at various channels Error Rate across the network. The proposed method has been compared with other primitive AQM techniques so that a repository of best available results can be obtained for design and research purposes. The proposed method has outperformed the existing queue management techniques in number of scenarios. Zulai Khan | Rashmi Raj ""Comparative Analysis of Green Algorithm within Active Queue Management for Mobile Ad Hoc Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23950.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23950/comparative-analysis-of-green-algorithm-within-active-queue-management-for-mobile-ad-hoc-network/zulai-khan
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
QUANTILE REGRESSIVE FISH SWARM OPTIMIZED DEEP CONVOLUTIONAL NEURAL LEARNING F...IJCNCJournal
Route path identification on the Internet of Vehicles (IoV) is complicated due to the nature of high dynamic mobility, bandwidth constraints, and traffic load. A vehicle present on the IoV communicates with each other to find the status of the road and location of other vehicles for reliable data transmission. However, the existing routing algorithm does not effectively improve the packet delivery ratio and reduce the delay. To resolve these issues, A Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning (QRFSODCNL) technique is introduced reliable data transmission with minimum end to end delay in IoV. The Deep Convolutional Neural Learning uses multiple layers such as one input layer, three hidden layers, and one output layer for vehicle location identification and optimal route path discovery.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great
interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET)
communications environment as a part of ITS opens the way for a wide range of applications such as safety
applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a
smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS
such as modelling of wireless transmission and routing issues. These research issues have become more
critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network
topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET
environment which considers as one of a stringent communications environment is a challenging task. The
selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different
propagation models allow calculating the Received Signal Strength (RSS) based on key environmental
properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna
height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a
specific propagation model and then these values can be used later for routing decision in order to find the
best path with high SNR. This paper evaluates the performance of different transmission models (free-
space, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of
such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is
evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using
MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it
indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic
density is decreased
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
In some networks, communications are sometimes interrupted and packet sending encounters many delays
due to lack of permanent connection between the nodes. Inter-vehicular and inter-satellite networks, which
are the so-called delay-tolerant networks, are an example to this type. This paper proposed a new routing
algorithm, which could increase efficiency of this kind of networks using predictability feature of bus
movement in a vehicular network. In this paper, bus routes were considered the backbone for vehicular
network and, knowing route of bus and destination of packets, the proposed algorithm, which was able to
use this information, was introduced. In addition, the proposed algorithm was simulated to prove its
efficiency and then it was compared with other algorithms in different conditions. The obtained results
indicated acceptable efficiency of the proposed algorithm.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing), a greedy position based routing approach to forward packets to the node present in the edge of the limited transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that end to end delay in packet transmission is minimized considerably compared to current routing protocols of VANET.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Study of vanet routing protocols for end to end delaycsandit
Less than a century since the automobile was made affordable enough for the general
public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the
communication between vehicle to vehicle for p r o v i d i n g i n f o rma t i o n t o travelers with
new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing
Protocols for end-to-end delay in V2V communication.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Accident Avoidance and Privacy-Preserving in V2R Communication using Chord Al...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
Routing protocol and congestion control in Transmission Control Protocol (TCP) have important roles in wireless mobile network performance. In wireless communication, the stability of the path and successful data transmission will be influenced by the channel condition. This channel condition constraints come from path loss and the multipath channel fading. With these constraints, the algorithm in the routing protocol and congestion control is confronted with the uncertainty of connection quality and probability of successful packet transmission, respectively. It is important to investigate the reliability and robustness of routing protocol and congestion control algorithms in dealing with such situation. In this paper, we develop a detailed approach and analytical throughput performance with a cross layer scheme (CLS) between routing and congestion control mechanism based on signal to noise ratio (SNR) in Rician and Rayleigh as multipath fading channel. We proposed joint routing and congestion control TCP with a cross layer scheme model based on SNR (RTCP-SNR). We compare the performance of RTCP-SNR with conventional routing-TCP and routing-TCP that used CLS with routing aware (RTCP-RA) model. The analyses and the simulation results showed that RTCP-SNR in a multipath channel outperforms conventional routing-TCP and RTCP-RA.
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
The Queue Management Techniques play an important role in improving the Quality of Service in Mobile Ad hoc Networks. The need of congestion control and Queue management is inevitable in Mobile Ad hoc Network. Understanding and analyzing the latest AQM Techniques give an insight to improving throughput, packet loss rate, average end to end delay and other parameters that severely affect the performance. The performance of mobile ad hoc networks is evaluated by varying the Channel Error Rate, Bandwidth and Delay at different fragment sizes of different traffic flows. The proposed method performs the network analysis of new Routing protocols. The work proposes to evaluate various Active Queue Management Techniques in a multi traffic environment i.e., sources generating both TCP and UDP traffic classes. The UDP is propagated via CBR and TCP is propagated via FTP. The implementation of the proposed queue management technique has been done in NS 2. In the proposed work we have make NS 2 compatible with GREEN by integrating source code into the ns 2 installation files and using various AQMs in comparison with GREEN to calculate the throughput at various Bandwidths across network. Using various AQMs in comparison with GREEN we have calculated the throughput at various Delays across the network and we have also calculated the throughput at various channels Error Rate across the network. The proposed method has been compared with other primitive AQM techniques so that a repository of best available results can be obtained for design and research purposes. The proposed method has outperformed the existing queue management techniques in number of scenarios. Zulai Khan | Rashmi Raj ""Comparative Analysis of Green Algorithm within Active Queue Management for Mobile Ad Hoc Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23950.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23950/comparative-analysis-of-green-algorithm-within-active-queue-management-for-mobile-ad-hoc-network/zulai-khan
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
QUANTILE REGRESSIVE FISH SWARM OPTIMIZED DEEP CONVOLUTIONAL NEURAL LEARNING F...IJCNCJournal
Route path identification on the Internet of Vehicles (IoV) is complicated due to the nature of high dynamic mobility, bandwidth constraints, and traffic load. A vehicle present on the IoV communicates with each other to find the status of the road and location of other vehicles for reliable data transmission. However, the existing routing algorithm does not effectively improve the packet delivery ratio and reduce the delay. To resolve these issues, A Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning (QRFSODCNL) technique is introduced reliable data transmission with minimum end to end delay in IoV. The Deep Convolutional Neural Learning uses multiple layers such as one input layer, three hidden layers, and one output layer for vehicle location identification and optimal route path discovery.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great
interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET)
communications environment as a part of ITS opens the way for a wide range of applications such as safety
applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a
smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS
such as modelling of wireless transmission and routing issues. These research issues have become more
critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network
topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET
environment which considers as one of a stringent communications environment is a challenging task. The
selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different
propagation models allow calculating the Received Signal Strength (RSS) based on key environmental
properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna
height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a
specific propagation model and then these values can be used later for routing decision in order to find the
best path with high SNR. This paper evaluates the performance of different transmission models (free-
space, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of
such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is
evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using
MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it
indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic
density is decreased
Vehicular ad hoc networks (VANETs) have seen tremendous growth in the last decade, providing a vast
range of applications in both military and civilian activities. The temporary connectivity in the vehicles can also
increase the driver’s capability on the road. However, such applications require heavy data packets to be shared on
the same spectrum without the requirement of excessive radios. Thus, e-client approaches are required which can
provide improved data dissemination along with the better quality of services to allow heavy traffic to be easily
shared between the vehicles. In this paper, an e-client data dissemination approach is proposed which not only
improves the vehicle to vehicle connectivity but also improves the QoS between the source and the destination. The
proposed approach is analyzed and compared with the existing state-of-the-art approaches. The effectiveness of the
proposed approach is demonstrated in terms of the significant gains attained in the parameters namely, end to end
delay, packet delivery ratio, route acquisition time, throughput, and message dissemination rate in comparison with
the existing approaches.
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
Nowadays, with progress of technology in wireless communications and increase of wireless tools to establish
communication, and for sending and receiving data files especially multimedia files, ad hoc networks have received special attention.
Mobile communications are usable wherever communication infrastructure is limited or absent, or establishing an infrastructure is not
affordable. According to the ever increasing usage of these networks, in this article, attempts have been made to select some routs for
sending multimedia files in an ad hoc network by using fuzzy logic and paying attention to moving nodes, so that we can fulfill needs
for service quality in this kind of networks.
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Performance analysis of congestion-aware Q-routing algorithm for network on chipIAESIJAI
A network on chip’s performance is greatly impacted by network congestion due to the substantial increase in latency and energy utilized. Designing routing strategies that keep the network informed of the status of traffic is made easier by machine learning techniques. In this work, a reinforcement-based congestion-aware Q-routing (CAQR) technique has been presented. The proposed algorithm performed better in comparison to the conventional XY routing method tested against the SPEC CPU2006 benchmark suite in the gem5 NoC simulator tool. The suite used has 4 benchmarks, namely, namd, lbm, leslie3d and bzip2 which can be used for the cores in the network in any combination. The tests were run with 16 cores on a 4×4 network with the maximum instruction count supported by the system (here 5,000). The proposed Q-routing algorithm showed an average of 19% reduction for benchmark simulation as compared to the Dimension-ordered (X-Y) routing for readings of average packet latency which is a crucial factor in determining a network’s efficiency. The analysis also shows an average reduction of 24%, 10%, 23% and 47% in terms of average packet network latency, average flit latency, average flit network latency and average energy consumption across various benchmarks.
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
Recent developments made in wireless environment attract several users for transmitting their data in secured manner. In order to transact the data in lesser time, an optimized and shortest route should be selected by the source node. Though there are several protocols exist, this issue is not yet resolved. In this paper, we have proposed a novel routing protocol, SSAAR that provide an end –to –end throughput between the source node and the destination node. The authentication is provided using Elliptical curves. Every user in the wireless network generates public key and secret key. The secret key is further furnished and verified by our routing protocols that ensures the security and reliability of the proposed system. An experimental result proves the effectiveness of the proposed protocols.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
VANET Clustering
1. Temurnikar et al., International Journal on Emerging Technologies 11(4): 173-177(2020) 173
International Journal on Emerging Technologies 11(4): 173-177(2020)
ISSN No. (Print): 0975-8364
ISSN No. (Online): 2249-3255
Development of Multi-Hop Clustering Approach for Vehicular Ad-hoc Network
Ankit Temurnikar
1
, Pushpneel Verma
2
and Jaytrilok Choudhary
3
1
Research Scholar Computer Science & Engineering, Bhagwant University, Ajmer (Rajasthan) India.
2
Assistant Professor, Department of Computer Science & Engineering, Bhagwant University, Ajmer (Rajasthan) India.
3
Associate Professor, Department of Computer Science & Engineering, MANIT Bhopal (Madhya Pradesh), India.
(Corresponding author: Ankit Temurnikar)
(Received 16 May 2020, Revised 22 June 2020, Accepted 03 July 2020)
(Published by Research Trend, Website: www.researchtrend.net)
ABSTRACT: A Vehicular ad-hoc network is a type of mobile ad-hoc network, it’s generally from with the
group of vehicle nodes without using a any predefined infrastructure or network. All the vehicles are
communicated with each other in a wireless transmission; the objective is to provide real time and reliable
communication between the all participating vehicles nodes in a network. In this paper we use the multi-hop
clustering techniques using with the cluster head selection process for the vehicular ad-hoc network, the
cluster head node is selected on the basis of closest speed of node with average speed of node and having a
more network life. Here the challenges is to update the cluster head value and selection of nodes is
dynamically, All the simulation process done with the network simulator compare with the existing
technique, and our proposed method gives better result than the previous techniques, all the results are
obtained with some parameters like network overhead, throughput, end to end delay, packet loss rate and
packet delivery ratio is discussed in this paper we have enhance the previous work by adding two new
parameter percentage of stability and path length with the help QoS matric calculation. The key idea in this
paper to proposes an MHC Approach for VANET that considers Quality of Service (QoS) requirements,
mobility constraints and the distrust value parameters.
Keywords: Vehicular ad-hoc network, Flat Routing, Optimization, Energy efficiency, life-time, QoS, MHC approach.
Abbreviations: MANET Mobile ad-hoc network, VANET Vehicular ad-hoc network, V2VVehicle to vehicle, V2I
Vehicle to infrastructure, DSRC Dedicated short rang communication.
I. INTRODUCTION
In recent years a wireless communication have much
more attention for the researchers, the vehicular ad-hoc
network is one of them because it’s high applicability for
the commercial usage. The vehicular ad-hoc network is
simulated with the network simulator and using some
software for high speed mobile environment such as the
wireless access in vehicular environment (WAVE) and
the Dedicated Short Range Communication (DSRC)
protocol.
Vehicular ad-hoc networks are divided into two forms
V2V (vehicular to vehicular) In which vehicle can
communicate directly with another vehicle and another
types is V2I (vehicle to infrastructure) here vehicles
communicate with using some infrastructure unit such
as Road Side Unit (RSU) as shown in Fig. 1.
Fig. 1. Illustrative network architecture of a vehicular ad-
hoc network.
This can Support many applications such as the road
safety, traffic management and infotainment. The data
link layer parts i.e. medium access control layer is
common medium as responsible to channel utilization in
an efficient manner.
The increased movement of participating vehicle nodes
in a network as a result of repeatedly imposing the
frequently change the topology is very critical task in a
wireless communication among the vehicle itself or
between the vehicles and the concerned infrastructure
as used in a network. However vehicular ad-hoc
network comes with several challenging characteristics
such as the potentially large scale and high mobility.
With the increase in distance the power or required
energy for the reliable and good communication is also
challenging task for the nodes in a network. The target
of vehicular ad-hoc network is achieving higher level of
road safety and decreases the number of accidents and
manages the overall traffic.
In previous work, they calculated two trusted nodes in
the cluster on the basis of highest energy. Malicious
node has also highest energy and selected as a trusted
node. Then it can forward the data to another attacker
and it affects the whole network. They find two nodes in
cluster with highest energy and make them cluster
head. This CH is only considered as trusted and all the
communication had done by these CHs only. When data
has to transfer then CH send packet to another cloud’s
CHs only. By this they eliminate the malicious nodes
from the network and make path more secure. In our
proposed work, we are finding only one cluster head
which is most trusted node in a cluster. So, we are using
transmission range with highest energy to calculated
cluster head. They have to fulfill both the criteria to
eliminate the selection of malicious node.
et
2. Temurnikar et al., International Journal on Emerging Technologies 11(4): 173-177(2020) 174
The rest of the paper is organized as follows section II
Discuss the related work, section III Discuss the
propose methodology and flow graph, section IV
Simulation setup V Discuss about Experimental and
finally conclusion and future work.
II. RELATED WORK
The most relevant issues in vehicular ad-hoc network is
to provide quality of services and the real time
intermittent connectivity between the vehicle nodes, and
the high dynamic mobility. The passive multi-hop
clustering algorithm is proposed [1] they have followed
the cluster head selection mechanism to crate the
cluster using passive multi-hop algorithm, here a priority
based neighbor following strategy is proposed and find
the optimal neighbor by calculating their parameters. A
stable routing algorithm proposed [2] author proposed
the cluster based mechanism to select the optimal route
stability and find the best quality of services in vehicular
ad-hoc network, the selected routing algorithm choose
the best stable and reliable path between the sender
and receiver in the vehicular ad-hoc network. The
classification of routing protocol proposed [3] here the
author done multi hop structure protocol using the
hierarchical, flat and location-based routing protocol,
with using all these protocol techniques they compare
the different number of parameters. The current
challenges and trends presented [4] in this paper author
review the different techniques and discuss the about
current trends and challenges in the present vehicular
ad-hoc network. Here they also present the different
hardware mechanism, spectrum, security and other
privacy issues. The mobility based and stability-based
clustering algorithm is proposed in [5], here the author
present clustering model for the especially urban area,
where they record each vehicle movement and position
with their direction and lifetime estimation. They also
calculated with their proposed techniques in average
number of cluster and the average number of cluster
head life time. The unified framework of clustering
approach presents here [6] author present some
important points such as the neighbor sampling of the
vehicle node, cluster head selection process based on
the back-off heads and at the last cluster maintenance
based on the backup cluster head process. Also define
the matrix for the vehicle node including some
parameters such as the vehicle mobility, vehicle position
and velocity with the vehicle node life time in a network.
An approach proposed by [13] was employed optimized
link state routing this will help us to understand unicast
routing protocol for adhoc network. Santa et al., has
been modified here to build a more robust method to
use in VANET [14]. In OLSR, a set of Multi Points Relay
(MPR) nodes is selected by every vehicle, which is used
to retransmit the packets. MPR nodes decrease the
overhead of flooding message. OLSR is a proactive
routing protocol that each node has a route to every
other node in the network. However, the overhead of
message for retaining the routes is high. Badis and
More recent work by Agha [15] have designed QOLSR
protocol for ad hoc wireless networks using OLSR. This
protocol considers the QoS constraints during the
selection of optimal paths. Due to the QOLSR chooses
the optimal paths in terms of bandwidth and delay and
ignores the mobility of vehicles; it is unable to deal with
VANETs. Then, most recent and advance theory
proposed by Otrok et al., [16] have introduced the QoS
Optimized Link State Routing (QoS-OLSR). This
protocol considers the QoS of the vehicles like residual
energy and bandwidth during the selection of cluster-
head and MRPs. However, it ignores the mobility of
vehicles for computing the QoS.
III. PROPOSED METHOD
Intelligent traffic system and monitoring is required for to
improve the current traffic monitoring system and road
safety features. In previous study author sole the
clustering issue using passive multi-hop clustering
techniques to improve reliability and stability of nodes in
vehicular ad-hoc network. In this section we present the
proposed methods for the vehicular ad-hoc network to
provide the reliable and stable communication between
the vehicle nodes, here we proposed approach i.e. multi
hop clustering algorithm using with the cluster head
selection process. In the below diagram we mention the
proposed MHC (Multi hop clustering Approach) flow
chart for the communication between the vehicle nodes.
Initially we start the simulator and send the hello
message to establish connection for all the participating
nodes in a network, after receiving the hello message all
nodes reply with their identification number, their
location, their distance between the nodes and the
destination. The cluster head node is selected if the list
is empty then road side unit select the any neighbor
node for join the cluster head. The cluster head node is
selected on the basis of closest speed of node with
average speed of node and having a more network life.
Then road side unit informs all the participating nodes to
elected as a cluster head node in a network then road
side unit find the gateway for the cluster head node and
share the information with the neighbor node form the
destination, and the finally process end. This paper also
calculates the distrust value of every vehicle to keep
record of white and black list of vehicle white vehicle are
honest vehicle and black are dishonest and malicious
which propagate the false message in the network lead
to misshape in road and traffic in VANET network. We
have added QoS matric to calculate the stability of the
network and path length.
A. Calculation of distrust Value
Due to lack of infrastructure and central management,
vehicular ad hoc networks are vulnerable to a number of
security threats. Vehicles can cooperate with each other
and increase security in the network. The following
method is utilized for verifying the behaviour of vehicles
and isolate malicious vehicles. Flowchart of this method
is shown in Fig. 2. To select a cluster-head, distrust
values of vehicles should be calculated. It is worth
mention that a cluster key is assigned to each cluster-
head, which is specified by its certificate authentication
(CA). CA acts as a trusted third party and manages
cryptography keys, personalities and
certificates of vehicles located in its region. The initial
distrust value that is allocated to vehicles when they join
to the network is the same for all vehicles. This initial
value is set to 1. At first, each vehicle is placed inside
the white list and then if its distrust value becomes
larger than a threshold value, it moved to the black list.
The threshold value δ is a criterion for updating black
and white lists [11]. It is computed in each environment
as follows:
δ = eφ 0 ≤ φ ≤ Kv-1
where Kv is the average number of vehicles in a certain
environment and is computed as:
ݒܭ = [Navg / Ravg]
where Ravg and Navg are the typical transmission range
and the average number of vehicles, respectively.
3. Temurnikar et al., International Journal on Emerging Technologies 11(4): 173-177(2020) 175
Fig. 2. Proposed flowchart for the cluster head selection
process.
B. QoS value:
After calculation the distrust value, we offer to calculate
Qos model metric a vehicle can calculate its QoS value
using its neighborhood table and obtaining information
about the network. QoS value is calculated [11]
QoS =(Bv× Nv× Dratio/vratio)/Dv
Bv= Available bandwidth
Nv = number of neighbors of vehicle
D_ratio=ratio of Remaining Distance
V_ratio=Ratio of Velocity
After adding these two new concepts in two existing
work now we have calculated two new parameter which
stable our cluster and it’s also calculate the distrust
value for keep aside to malicious and dishonest from the
network. It is discussed below.
(a) Percentage of stability: The percentage of stability
can be calculated by dividing the number of current
vehicles in each cluster to the previous number of
vehicles in the same cluster before a slot of time.
Indeed, stability of cluster is the average lifetime of a
cluster in terms of the number of nodes within that
cluster. If over 60% of the nodes are in the cluster, the
cluster is intended stable.
(b) Path length: This criterion is described as the
average number of hops that used to transmit data
between the source node and destination node. The
path length can be reflected in the
end-to-end delay
IV. SIMULATION SETUP
The performance of our proposed approach is evaluated
using simulation implemented with NS-2.35 under Linux
Ubuntu 16.04. Ns2 is the most popular simulator for
academic research and itis more difficult than other
software. It is a discrete event and an object-oriented
simulator designed for networking research. Also, it
models different network architectures, including
Wireless LAN, MANET, VANET and satellite. NS2 is
written in C++ with an OTcl (Object Tool Command
Language) interpreter. Hence, the proposed approach
has been implemented by this programming language.
MOVE that is the generator of mobility model is used for
vehicular networks. It is based on the Java
programming language and builds on SUMO
(Simulation of urban mobility) that is a time discrete and
open-source microscopic road traffic simulation
package. This traffic simulator applies XML code to
represent the network features such as number of
vehicles, velocity, duration and topography. The area of
simulation selected is the highway of city. We use
SUMO 0.12.0 to generate the vehicle traffic and export
a part of city map from Open Street Map in the form of
XML formatted Osmfiles.
A simulation area of 3000 m × 1000 m is used to
simulate by varying the number of vehicles from 10 to
50. Also, the highway topology is applied to simulate the
traffic. We assume that all nodes generate a constant bit
rate (CBR) peer-to-peer data traffic.
Moreover, the vehicle that drops or duplicates packets
and changes the content of the packets is considered as
malicious vehicle. The percentage of the malicious
vehicles in the network is considered 10% of the whole
number of vehicles in the network. Also, we take a 95%
confidence interval to obtain more precise simulations.
The simulation parameters used for NS2 are given in
Table 1.
Table 1.
Parameter Value
Time of Simulation 400s, 600, 800, 1000s
Dimension 3000 ×1000
Traffic Model CBR(Constant Bit Rat)
Transmission range 250M
Data Packet Size 512byte
Topology High Way with Two bands
Protocol AODV
No of Vehicle 15,30,45,60,75
Vehicle Speed 60 to 120 Km/h
Idle time Random Value b/w (0,1)
Link band width
1 Mbps
Available Band width Idle time × Link bandwidth
MAC/PHY IEEE 802.11p
V. EXPERIMENTAL RESULT
In this section we discuss about our proposed
methodology result which is based on the existing
techniques and the proposed method i.e. multi-hop
clustering (MHC) techniques were simulated with the
network simulator 2.34. here the all calculated results
were mentioned in the below table and store the value
of each parameters and we added two more parameter
in the existing work which is percentage of stability and
path length calculation .percentage of stability shows
cluster head stability which gives the strength to network
so the calculated are network overhead, throughput,
energy consumption, end to end delay, packet loss,
percentage of stability and path length calculation .
Packet delivery ratio: the packet delivery ratio is
obtained by dividing the number of packets successfully
received by the number of packets originated for a
destination [12].
- End-to-end delay: end to end delay refers to the time
required to transmit a packet across a network from
source to destination [12].
4. Temurnikar et al., International Journal on Emerging Technologies 11(4): 173-177(2020) 176
Throughput: the throughput is calculated by dividing the
total number of data bits delivered to destination node
during the simulation by the total simulation time [12].
Number of packets loss: number of packet loss is
defined as the number of packets not received at their
destination during the simulation time [12].
Percentage of stability: the percentage of stability can
be calculated by dividing the number of current vehicles
in each cluster to the previous number of vehicles in the
same cluster before a slot of time. Indeed, stability of
cluster is the average lifetime of a cluster in terms of the
number of nodes within that cluster. If over 60% of the
nodes are in the cluster, the cluster is intended stable.
Path length: this criterion is described as the average
number of hops that used to transmit data between the
source node and destination node. The path length can
be reflected in the
We have discussed many parameters here and many of
them is discussed in previous work and two of them are
calculated in this paper and we have compared this
parameter with VANET QoS-OLSR, the cluster-based
QoS-OLSR and the classical QOLSR is illustrated them
are discusses.
The results were directly compared with previously
reported finding and compared between the proportion
of stability of MHC approach in VANET and different
protocols is shown in Fig 3. This figure represents that
in comparison to other protocol the percentage of
stability of MHC approach -VANET is increased by
approx. More than 10%. This is because our proposed
protocol uses the distrust value and the proportional
distance and velocity to calculate the QoS value per
vehicle. It guarantees that cluster-heads and gateways
are selected with proper velocity and significant distance
to traverse and avoids the repeated disconnections.
Fig. 3. Compression Percentage of Stability.
This result demonstrates the potential superiority
approach over previous establish methods Fig. 4
compares the number of packet loss obtained by
different protocols. Due to the proposed protocol
increases the percentage of packets transferred, the
number of packet loss of MHC approach VANET is
lower than other investigated protocols about 6%.
represents the average number of hops yielded using
the investigated protocols. This figure demonstrates that
the number of hops in MHC-approach is about 3% less
than other examined protocols. This is due to the fact
that this protocol calculates the QoS function and select
the nodes that has the highest value of QoS as
gateway.
Fig. 4. Compression of Path Length.
VI. CONCLUSION
The main conclusions of this work are drawn together
and presented in this section. This paper presents the
new multi-hop based advanced clustering techniques for
the efficient routing and stability of the nodes in a
network. The proposed techniques also used
optimization techniques for the various parameters to
record and calculate the value of node. Our simulated
result shows better results than previous techniques
with the parameters such as Percentage of stability and
Path length. In future research we use some
evolutionary techniques and some hybrid model for the
improvement in clustering issue and trust node-based
calculation in network.
VII. FUTURE WORK
In future work we may also use trust node-based
calculation for the authenticity of the node in the
vehicular ad-hoc network, and also used some
advanced classification techniques to enhance the
performance of the network.
ACKNOWLDEGEMENTS
I would to like to thank my supervisor Dr. Pushpneel
Verma and Dr. Jay Trilok Choudhary for his constant
help, support and encouragement without there
guidance, this work would impossible to complete. I
would also like to thank my family and friends for their
moral support.
REFERENCES
[1]. Zhang, D., Ge, H., Zhang, T., Cui, Y. Y., Liu, X., &
Mao, G. (2018). New multi-hop clustering algorithm for
vehicular ad hoc networks. IEEE Transactions on
Intelligent Transportation Systems, 20(4), 1517-1530.
[2]. Mu'azu, A. A., Tang, L. J., Hasbullah, H., & Lawal, I.
A. (2015). A cluster-based stable routing algorithm for
vehicular ad hoc network. In 2015 International
Symposium on Mathematical Sciences and Computing
Research (iSMSC), 286-291.
[3]. Rani, S., & Ahmed, S. H. (2016). Multi-hop Network
Structure Routing Protocols. In Multi-hop Routing in
Wireless Sensor Networks (pp. 45-58). Springer,
Singapore.
[4]. Rasheed, A., Gillani, S., Ajmal, S., & Qayyum, A.
(2017). Vehicular ad hoc network (VANET): A survey,
challenges, and applications. In Vehicular Ad-Hoc
Networks for Smart Cities (pp. 39-51). Springer,
Singapore.
5. Temurnikar et al., International Journal on Emerging Technologies 11(4): 173-177(2020) 177
[5]. Ren, M., Khoukhi, L., Labiod, H., Zhang, J., &
Veque, V. (2016). A new mobility-based clustering
algorithm for vehicular ad hoc networks (VANETs).
In NOMS 2016-2016 IEEE/IFIP Network Operations and
Management Symposium (pp. 1203-1208). IEEE.
[6]. Ren, M., Zhang, J., Khoukhi, L., Labiod, H., &
Vèque, V. (2017). A unified framework of clustering
approach in vehicular ad hoc networks. IEEE
Transactions on intelligent transportation
systems, 19(5), 1401-1414.
[7]. Rossi, G. V., Fan, Z., Chin, W. H., & Leung, K. K.
(2017). Stable clustering for ad-hoc vehicle networking.
In 2017 ieee wireless communications and networking
conference (wcnc) (pp. 1-6). IEEE.
[8]. Shanmugasundaram, G., Thiyagarajan, P., Tharani,
S., & Rajavandhini, R. (2017). A Multilevel Clustering
Using Multi-hop and Multihead in VANET.
In Proceedings of the International Conference on Data
Engineering and Communication Technology, 171-178.
[9]. Singh, A., & Kaur, M. (2015). A novel clustering
scheme in vehicular ad hoc network. International
Journal of Applied Information Systems (IJAIS), 10(3),
1-5.
[10]. Sugumar, R., Rengarajan, A., & Jayakumar, C.
(2018). Trust based authentication technique for cluster
based vehicular ad hoc networks (VANET). Wireless
Networks, 24(2), 373-382.
[11]. Fatemidokht, H., & Rafsanjani, M. K. (2020). QMM-
VANET: An efficient clustering algorithm based on QoS
and monitoring of malicious vehicles in vehicular ad hoc
networks. Journal of Systems and Software, 110561.
[12]. Ankit Temurnikar, Pushpneel Verma, Jay Trilok,
Choudhary. Securing Vehicular Adhoc Network Against
Malicious Vehicle Using Advanced Clustering
Technique. Paper Under Proceeding “ IDEA 19-20
IEEE conference RGPV Bhopal.
[13]. Clausen, T., Hansen, G., Christensen, L., &
Behrmann, G. (2001). The optimized link state routing
protocol, evaluation through experiments and
simulation. In IEEE symposium on wireless personal
mobile communications, 1-6
[14]. Santa, J., Tsukada, M., Ernst, T., Mehani, O., &
Gomez-Skarmeta, A. F. (2009). Assessment of VANET
multi-hop routing over an experimental
platform. International Journal of Internet Protocol
Technology, 4(3), 158-172.
[15]. Badis, H., & Agha, K. (2005). QOLSR, QoS routing
for ad hoc wireless networks using OLSR, European
Transactions on Telecommunications, 16, 427–442.
[16]. Otrok, H., Mourad, A., Robert, J. M., Moati, N., &
Sanadiki, H. (2011). A cluster-based model for QoS-
OLSR protocol. In 2011 7th International Wireless
Communications and Mobile Computing Conference,
1099-1104.
How to cite this article: Temurnikar, A., Verma, P. and Choudhary, J. (2020). Development of Multi-Hop Clustering
Approach for Vehicular Ad-hoc Network. International Journal on Emerging Technologies, 11(4): 173–177.