This ppt gives you a brief knowledge on protocols used in VANETs using real time vehicular traffic information. These have overruled the the existing MANET protocols. It also give you a description regarding forwarding optimisation
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
In mobile ad hoc networks (MANETs), multipath routing protocols are more popular due to overcomes the certain limitation of single path routing like lower end-to-end delay, load balancing, energy efficiency and network lifetime. By providing multiple paths between a source-destination pair, multipath routing protocols are avoid such above problems. AOMDV (Ad Hoc On-Demand Multipath Distance Vector) routing protocol is an on-demand multipath routing and which is a relatively maturity and extensive application protocol. It doesn’t consider residual energy and load situation of the node on the time of route discovery process. So AOMDV’s efficiency declines sharply in case of high load and fast moving velocity. To solve the above problems, we propose an improved protocol Energy Efficient- AOMDV (EAOMDV) of AOMDV routing algorithm. EAOMDV is based on a strategy of energy model and load balancing concept. It will consider the residual energy and the load situation of the nodes, when it starts the route discovery phase. After considering the above concept and according to the simulation results, the EAOMDV routing protocol improves the efficiency, the packet delivery ratio and reduces the routing load.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
In mobile ad hoc networks (MANETs), multipath routing protocols are more popular due to overcomes the certain limitation of single path routing like lower end-to-end delay, load balancing, energy efficiency and network lifetime. By providing multiple paths between a source-destination pair, multipath routing protocols are avoid such above problems. AOMDV (Ad Hoc On-Demand Multipath Distance Vector) routing protocol is an on-demand multipath routing and which is a relatively maturity and extensive application protocol. It doesn’t consider residual energy and load situation of the node on the time of route discovery process. So AOMDV’s efficiency declines sharply in case of high load and fast moving velocity. To solve the above problems, we propose an improved protocol Energy Efficient- AOMDV (EAOMDV) of AOMDV routing algorithm. EAOMDV is based on a strategy of energy model and load balancing concept. It will consider the residual energy and the load situation of the nodes, when it starts the route discovery phase. After considering the above concept and according to the simulation results, the EAOMDV routing protocol improves the efficiency, the packet delivery ratio and reduces the routing load.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different
approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in
increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for
efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and
disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
Know More About The Vehicle Warning LightsOrange Motors
If something goes wrong in the vehicle, warning lights on the vehicle dashboard blinks to warn us. Some problems are urgent and need to be fixed as soon as possible. And some problems are there to warn us that may become fatal if not repaired even after the warning. Some lights are for the driver information only. Have you experienced ever? Well, most of the drivers are not aware about all the warning lights displayed. Check the slide here to know about these warning lights in detail.
Smart Parking systems typically obtains information about available parking spaces in a particular geographic area and process is real-time to place vehicles at available positions .It involves using low-cost sensors, real-time data collection, and mobile-phone-enabled automated payment systems that allow people to reserve parking in advance or very accurately predict where they will likely find a spot.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
This paper is examining the VANET techniques by understanding the various papers published by the
authors in IEEE transactions. In this paper the new technique is explored where no of the routing method is
applied for connecting the nodes. But using the other information such as speed ,density,time,range and
calculating the time required by the vehicle on the road of interests we can link them full time period of their
run. We can use the standard frequency bands widths allocated by the Governments
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Ad hoc networks are multi-hop networks consisting of wireless autonomous hosts, where each host may serve as a router to assists traffic from other nodes. Wireless ad hoc networks cover a wide range of network scenarios, including sensor, mobile ad hoc, personal area, and rooftop/mesh networks
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. VANET
A subclass of Mobile Ad hoc networks.
Uses vehicular traffic as its nodes.
Allows high node mobility.
Takes advantage of restricted paths (Roads).
3. Limitations of MANET[1]:
• Inefficient mobile node handling.
• Leads to frequent makings and breakings of
path between source and destination.
5. RBVT
Every node is equipped with-
1) GPS Transceiver
2) Digital Maps
3) A Navigation System
RBVT Protocols:
1. RBVT-R – A reactive protocol
2. PBVT-P – A pro active protocol
– Road based using vehicular traffic Information
protocols.
6. RBVT-R: A Reactive Protocol
Creates road based paths by using
connected road segments.
Information about the route is stored in
the header of the packet.
Routing is done in 3 steps:
1) Route Discovery
2) Route Reply
3) Route Maintenance
7. 1. Route Discovery
Source floods an RD packet.
Uses improved flooding mechanism.
RD Packet gets
updated with the
identities [Ij] of
Intersections.
8. 2. Route Reply
Destination node generates RR
packet.
Data in RD is copied to RR.
RR reaches source through the same
path
After receiving RR,
source transmits
data packets.
9. 3. Route Maintenance
Route once generated cannot be the
same forever.
RU packets are used to update routes.
RE packets are uni-casted back to
source if any intersection
is unreachable.
Only after few REs,
RD packets are
generated by source.
10. RBVT-P : A proactive protocol
Periodically computes real time graph of
connected road segments.
Maintains consistent view of network
connectivity at each node.
Source uses location based queries to
find destination’s location.
Routing is done in 4 steps:
1) Topology Discovery
2) Topology Dissemination
3) Route Computation
4) Route Maintenance
11. 1. Topology Discovery
CPs are unicasted in the network.
A Node decides to transmit CP or not -
by itself independently.
CP operates in a limited perimeter –
decided by its generator
Endpoints of traversed
segments are stored in CP
CP returns back to its
generator with neteork
topology info.
12. 2. Topology Dissemination
Topology info from CP is copied to
RU packets.
Old routing table at nodes are updated
by new RU content.
Routing tables are
updated in segment
by segment basis.
13. 3. Route Computation
Source node computes the shortest
path.
Series of intersections representing
path are stored in header.
Timestamp is also included for
freshness comparison.
14. 4. Route Maintenance
Header of data packets are updated
with fresher information by intermediate
nodes.
In case of any route break, auto
transition to geographical routing takes
place.
When packet reaches a node that has
fresher information, then it switches
back to RBVT-P.
15. Forwarding Optimization
Beaconing “Hello” messages in GR
reduces overall end-end performance
But is important for maintaining accurate
list of surrounding nodes
To overcome this IEEE 802.11 RTS/CTS
mechanism is extended where next hop is
self elected by receiver itself
17. Conclusion:
RBVT –R and RBVT-P are the two
efficient protocols to handle highly
mobile vehicular nodes.
RBVT-R : best average delivery rate
[2]
RBVT-P : Least average delay.
18. References:
[1] Elizabeth M. R. and Chai-Keong
T.,,”A review of current routing
protocols for ad hoc mobile wireless
networks”, Technical report, University
of California and eorgia Institute of
Technology, USA, 1999
[2] Josiane Nzouonta, Neeraj Rajgure,
Guiling Wang and Cristian Borcea, ”
VANET Routing on City Roads Using
Real-Time Vehicular Traffic
Information”, IEEE Transactions on
Vehicular Technology, Vol. 58, No. 7,
pp. 3609-3626, September 2009.
Editor's Notes
Good after noon to one and all. Today I am going to discuss about Vanet routing in city roads using real time vehicular traffic information.
This is the paper that was submitted in September of 2009.
Now, let me explain it in brief.
Vanets are a sub class of mobile ad hoc networks which uses vehicles to transmit data. The main difference between these mobile ad hoc networks and vehicular ad hoc networks is that – In VANETs, node mobility is restricted to only the predefined paths – nothing but roads. Moreover, VANETs support a very high node mobility. Whereas, In MANETs node mobility is not restricted to specific paths.
But, the MANET protocols cannot give a satisfactory output with the high mobile nodes like vehicles.
Highly mobile nodes lead to the frequent making and breaking of the routes.
Because,
For example, If this is the source. And this is the destination. The traditional protocols of MANET will identify the best route present. The whole route information is stored in the header of the packets being transmitted. Now, if the mobile node moves from its position to the position of A – Then the route must be reconstructed by removing Io in the header of the packet. This frequent making and breaking of routes lead to unnecessary overhead.
To overcome these drawbacks of MANETs, one other alternative is the usage of Geographical Routing. In this routing, data is transmitted b/w source and destination without any formation of route between them. Data is transferred from source to destination in the form of packets through the node present in between them. In this protocol, any node that ensures progress towards destination can be used for forwarding.
But, the main drawbacks are, Geographical routing may route packets towards dead ends. As shown here, in order to transfer packets from source to destination, GR protocols may use Node like n1 and n2. This may lead to unwanted traffic overhead.
And sometimes, this GR protocols cannot handle the high mobile nodes. Also, as shown here, geographical routing may chose the weaker paths. Here, in this case, probability of path breakage is more.
So, this paper has put forward – the two protocols called as RBVT protocols, for the efficient data transfer using mobile nodes.
These RBVT protocols requres that, every node is equpped with a GPS Transceiver, Digital Maps
Those two protocols are nothing but –
RBVT –R : A reactive protocol
RBVT –P : A pro active protocol
Now, let me discuss about RBVT reactive protocol. This protocol creates road based paths by using CONNECTED road segments. Here the connected road segments are nothing but, road between two intersections with a sufficient traffic density. And the information about the route from source to destination is stored in the header of the data packets.
And this routing is done in three steps.
Route Discovery
Route Reply
Route Maintenance.
When source S needs to transmit data to destination D. First of all, a route discovery packet is broadcasted by source ,S . All the nodes surrounding S receives this RD packet. As soon as the RD packet is received- it will not be rebroadcasted immediately. For example, RD packet broadcasted by S is received by A and B. Then these nodes will retain that packet with them for a certain period of time – called asTTL. TTL is inversely proportional to its distance from the source. If once the TTl expires , then that node will rebroadcast the RD packet. That means, farthest node will get an opportunity to rebroadcast first. And if the same RD packet is received for second time by a node – then it will not rebroadcast the packet with it..
Hence, farthest node will get an opportunity to forward data.
By following the similar process, RD packet reaches destination as shown here.
Once the destination receives RD packet, Destination generates RR packet. The routing information present in the RD packet will be copied to the RR packet. This RR packet will be sent back to the source following the same path.
As soon as the source receives the RR packet, then it starts transmitting data through this path.
===============================================================================
If the destination receives more than 1 RD packets, then it will compute the best route. But most probably, first one will be the best. Because, it is the one which has transmitted RD packet more faster than the remaining.
As RR is received by the source, source starts transmitting data to destination. It stores the routing information in the header of the data packet.
But as the vehicular nodes are mobile – sometimes source may move from its initial position to this position. Then, in that case identity of I1 should be removed from the headers of data packets. This is accomplished by using route update packets. These will be transmitted between source and destination just like RD packets.
Sometimes some road segments get sparsely populated by the nodes. And a node in that segment may not be able to send data to the next intersection. Then in that case, RE packet will be generated by that node and it will be sent back to the source. Then source will find an alternate route.
Now, let me discuss RBVT- proactive protocols. This protocol periodically computes the real time graph of connected road segments. It assumes that source can use location based queries to know the position of destination. Then, using graphs of network topologies present in the nodes, source computes the shortest path for transmission and sends the data packets.
Here in this protocol, routing is done in 4 steps.
Topology discovery
Topology Dissemination
Route computation
Route Maintenance
Fist of all, a few nodes in the network transmits connectivity packets into the network. Nodes decide themselves to transmit packets independently depending on the last update received by them, estimated number of nodes in the network by historic hourly traffic information. The perimeter to be traversed by the nodes is defined by the CP generator itself. When a Connectivity packet is traversed through a segment, then the end points of the segment are stored accordingly in the CP stack. As shown in the figure CP generated by G traverses through the connected segments and returns back to the generator with network topology information.
The network topology information in CP is copied to route update packets. These route update packets are brodcasted into the networks. And the remaining nodes update their routing table with the data present in RU packets. When a node receives a new RU packet, then it will replace its routing table completely with content in new RU table. Instead of that, it updates the content in that in segment by segment basis – as the perimeter of all connectivity packets are not same.
Now, all the nodes will be continuously get updated by RU packets. Now if a node wants to send a packet to destination, it computes the best route available by obtaining the location of Destination using location based queries. And the routing information is stored in the header of the da
Inorder to maintain the clear info about the surrounding nodes, nodes usually transmit the continuous beaconing hello msgs. But these continuous hello message creates heavy conjestion in the network. So to overcome this problem, this these guys used RTS/CTS mects mechanism to overcome this problem. So
Hence, we can conclude that, RBVT-R and RBVT-P are the 2 efficient protocols which has outperformed the traditional protocols of MANET. Simulation results in the urban setting has shown that, RBVT-R best in terms of average delivery rate and RBVT-P has performed best in terms of average delay.