SlideShare a Scribd company logo
(ieee transactions on vehicular technology, vol. 58, no. 7, september 2009
VANET
 A subclass of Mobile Ad hoc networks.
 Uses vehicular traffic as its nodes.
 Allows high node mobility.
Takes advantage of restricted paths (Roads).
Limitations of MANET[1]:
• Inefficient mobile node handling.
• Leads to frequent makings and breakings of
path between source and destination.
Geographical Routing:
 May got failed
in case of dead ends.
 Inefficient Route
Selection
RBVT
 Every node is equipped with-
1) GPS Transceiver
2) Digital Maps
3) A Navigation System
RBVT Protocols:
1. RBVT-R – A reactive protocol
2. PBVT-P – A pro active protocol
– Road based using vehicular traffic Information
protocols.
RBVT-R: A Reactive Protocol
 Creates road based paths by using
connected road segments.
 Information about the route is stored in
the header of the packet.
Routing is done in 3 steps:
1) Route Discovery
2) Route Reply
3) Route Maintenance
1. Route Discovery
 Source floods an RD packet.
 Uses improved flooding mechanism.
 RD Packet gets
updated with the
identities [Ij] of
Intersections.
2. Route Reply
 Destination node generates RR
packet.
 Data in RD is copied to RR.
 RR reaches source through the same
path
 After receiving RR,
source transmits
data packets.
3. Route Maintenance
 Route once generated cannot be the
same forever.
 RU packets are used to update routes.
 RE packets are uni-casted back to
source if any intersection
is unreachable.
 Only after few REs,
RD packets are
generated by source.
RBVT-P : A proactive protocol
 Periodically computes real time graph of
connected road segments.
 Maintains consistent view of network
connectivity at each node.
 Source uses location based queries to
find destination’s location.
Routing is done in 4 steps:
1) Topology Discovery
2) Topology Dissemination
3) Route Computation
4) Route Maintenance
1. Topology Discovery
 CPs are unicasted in the network.
 A Node decides to transmit CP or not -
by itself independently.
 CP operates in a limited perimeter –
decided by its generator
 Endpoints of traversed
segments are stored in CP
 CP returns back to its
generator with neteork
topology info.
2. Topology Dissemination
 Topology info from CP is copied to
RU packets.
 Old routing table at nodes are updated
by new RU content.
 Routing tables are
updated in segment
by segment basis.
3. Route Computation
 Source node computes the shortest
path.
 Series of intersections representing
path are stored in header.
 Timestamp is also included for
freshness comparison.
4. Route Maintenance
 Header of data packets are updated
with fresher information by intermediate
nodes.
 In case of any route break, auto
transition to geographical routing takes
place.
 When packet reaches a node that has
fresher information, then it switches
back to RBVT-P.
Forwarding Optimization
 Beaconing “Hello” messages in GR
reduces overall end-end performance
 But is important for maintaining accurate
list of surrounding nodes
 To overcome this IEEE 802.11 RTS/CTS
mechanism is extended where next hop is
self elected by receiver itself
Continue…
•RTS is sent
•CTS by n2
•DATA by nS
•ACK by n2
Conclusion:
 RBVT –R and RBVT-P are the two
efficient protocols to handle highly
mobile vehicular nodes.
 RBVT-R : best average delivery rate
[2]
 RBVT-P : Least average delay.
References:
[1] Elizabeth M. R. and Chai-Keong
T.,,”A review of current routing
protocols for ad hoc mobile wireless
networks”, Technical report, University
of California and eorgia Institute of
Technology, USA, 1999
[2] Josiane Nzouonta, Neeraj Rajgure,
Guiling Wang and Cristian Borcea, ”
VANET Routing on City Roads Using
Real-Time Vehicular Traffic
Information”, IEEE Transactions on
Vehicular Technology, Vol. 58, No. 7,
pp. 3609-3626, September 2009.
Vanet routing

More Related Content

What's hot

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
Prasanta kumr Manohari
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
Malik Riahi
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
Mastan Shaik
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Pradeep Kumar TS
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Michele Weigle
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
Prof. Dr. Noman Islam
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 
Manet
ManetManet
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 

What's hot (19)

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Manet
ManetManet
Manet
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 

Viewers also liked

Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
Mastan Shaik
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
Behroz Zarrinfar
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
IOSR Journals
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
Sayed_Hossain
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
Sridhar Raghavan
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
Akanksha Upadhyay
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
Akash Raghunath
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
Editor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
idescitation
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
Know More About The Vehicle Warning Lights
Know More About The Vehicle Warning LightsKnow More About The Vehicle Warning Lights
Know More About The Vehicle Warning Lights
Orange Motors
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETAnkit Gupta
 
Vanet - routage unicast et adressage
Vanet - routage unicast et adressageVanet - routage unicast et adressage
Vanet - routage unicast et adressage
Ghazi Tekaya
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
Jamal Toutouh, PhD
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
Smart parking - Happiestminds !
Smart parking - Happiestminds !Smart parking - Happiestminds !
Smart parking - Happiestminds !
Happiest Minds Technologies
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
ciza2013
 

Viewers also liked (20)

Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Know More About The Vehicle Warning Lights
Know More About The Vehicle Warning LightsKnow More About The Vehicle Warning Lights
Know More About The Vehicle Warning Lights
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANET
 
Vanet - routage unicast et adressage
Vanet - routage unicast et adressageVanet - routage unicast et adressage
Vanet - routage unicast et adressage
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Final_Vanet
Final_VanetFinal_Vanet
Final_Vanet
 
Smart parking - Happiestminds !
Smart parking - Happiestminds !Smart parking - Happiestminds !
Smart parking - Happiestminds !
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 

Similar to Vanet routing

Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
ijwmn
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
iosrjce
 
I017616468
I017616468I017616468
I017616468
IOSR Journals
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
kapss043
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
En33838844
En33838844En33838844
En33838844
IJERA Editor
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
ssuser06fbd31
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 

Similar to Vanet routing (20)

Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
I017616468
I017616468I017616468
I017616468
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 

Vanet routing

  • 1. (ieee transactions on vehicular technology, vol. 58, no. 7, september 2009
  • 2. VANET  A subclass of Mobile Ad hoc networks.  Uses vehicular traffic as its nodes.  Allows high node mobility. Takes advantage of restricted paths (Roads).
  • 3. Limitations of MANET[1]: • Inefficient mobile node handling. • Leads to frequent makings and breakings of path between source and destination.
  • 4. Geographical Routing:  May got failed in case of dead ends.  Inefficient Route Selection
  • 5. RBVT  Every node is equipped with- 1) GPS Transceiver 2) Digital Maps 3) A Navigation System RBVT Protocols: 1. RBVT-R – A reactive protocol 2. PBVT-P – A pro active protocol – Road based using vehicular traffic Information protocols.
  • 6. RBVT-R: A Reactive Protocol  Creates road based paths by using connected road segments.  Information about the route is stored in the header of the packet. Routing is done in 3 steps: 1) Route Discovery 2) Route Reply 3) Route Maintenance
  • 7. 1. Route Discovery  Source floods an RD packet.  Uses improved flooding mechanism.  RD Packet gets updated with the identities [Ij] of Intersections.
  • 8. 2. Route Reply  Destination node generates RR packet.  Data in RD is copied to RR.  RR reaches source through the same path  After receiving RR, source transmits data packets.
  • 9. 3. Route Maintenance  Route once generated cannot be the same forever.  RU packets are used to update routes.  RE packets are uni-casted back to source if any intersection is unreachable.  Only after few REs, RD packets are generated by source.
  • 10. RBVT-P : A proactive protocol  Periodically computes real time graph of connected road segments.  Maintains consistent view of network connectivity at each node.  Source uses location based queries to find destination’s location. Routing is done in 4 steps: 1) Topology Discovery 2) Topology Dissemination 3) Route Computation 4) Route Maintenance
  • 11. 1. Topology Discovery  CPs are unicasted in the network.  A Node decides to transmit CP or not - by itself independently.  CP operates in a limited perimeter – decided by its generator  Endpoints of traversed segments are stored in CP  CP returns back to its generator with neteork topology info.
  • 12. 2. Topology Dissemination  Topology info from CP is copied to RU packets.  Old routing table at nodes are updated by new RU content.  Routing tables are updated in segment by segment basis.
  • 13. 3. Route Computation  Source node computes the shortest path.  Series of intersections representing path are stored in header.  Timestamp is also included for freshness comparison.
  • 14. 4. Route Maintenance  Header of data packets are updated with fresher information by intermediate nodes.  In case of any route break, auto transition to geographical routing takes place.  When packet reaches a node that has fresher information, then it switches back to RBVT-P.
  • 15. Forwarding Optimization  Beaconing “Hello” messages in GR reduces overall end-end performance  But is important for maintaining accurate list of surrounding nodes  To overcome this IEEE 802.11 RTS/CTS mechanism is extended where next hop is self elected by receiver itself
  • 16. Continue… •RTS is sent •CTS by n2 •DATA by nS •ACK by n2
  • 17. Conclusion:  RBVT –R and RBVT-P are the two efficient protocols to handle highly mobile vehicular nodes.  RBVT-R : best average delivery rate [2]  RBVT-P : Least average delay.
  • 18. References: [1] Elizabeth M. R. and Chai-Keong T.,,”A review of current routing protocols for ad hoc mobile wireless networks”, Technical report, University of California and eorgia Institute of Technology, USA, 1999 [2] Josiane Nzouonta, Neeraj Rajgure, Guiling Wang and Cristian Borcea, ” VANET Routing on City Roads Using Real-Time Vehicular Traffic Information”, IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, pp. 3609-3626, September 2009.

Editor's Notes

  1. Good after noon to one and all. Today I am going to discuss about Vanet routing in city roads using real time vehicular traffic information. This is the paper that was submitted in September of 2009. Now, let me explain it in brief.
  2. Vanets are a sub class of mobile ad hoc networks which uses vehicles to transmit data. The main difference between these mobile ad hoc networks and vehicular ad hoc networks is that – In VANETs, node mobility is restricted to only the predefined paths – nothing but roads. Moreover, VANETs support a very high node mobility. Whereas, In MANETs node mobility is not restricted to specific paths.
  3. But, the MANET protocols cannot give a satisfactory output with the high mobile nodes like vehicles. Highly mobile nodes lead to the frequent making and breaking of the routes. Because, For example, If this is the source. And this is the destination. The traditional protocols of MANET will identify the best route present. The whole route information is stored in the header of the packets being transmitted. Now, if the mobile node moves from its position to the position of A – Then the route must be reconstructed by removing Io in the header of the packet. This frequent making and breaking of routes lead to unnecessary overhead.
  4. To overcome these drawbacks of MANETs, one other alternative is the usage of Geographical Routing. In this routing, data is transmitted b/w source and destination without any formation of route between them. Data is transferred from source to destination in the form of packets through the node present in between them. In this protocol, any node that ensures progress towards destination can be used for forwarding. But, the main drawbacks are, Geographical routing may route packets towards dead ends. As shown here, in order to transfer packets from source to destination, GR protocols may use Node like n1 and n2. This may lead to unwanted traffic overhead. And sometimes, this GR protocols cannot handle the high mobile nodes. Also, as shown here, geographical routing may chose the weaker paths. Here, in this case, probability of path breakage is more.
  5. So, this paper has put forward – the two protocols called as RBVT protocols, for the efficient data transfer using mobile nodes. These RBVT protocols requres that, every node is equpped with a GPS Transceiver, Digital Maps Those two protocols are nothing but – RBVT –R : A reactive protocol RBVT –P : A pro active protocol
  6. Now, let me discuss about RBVT reactive protocol. This protocol creates road based paths by using CONNECTED road segments. Here the connected road segments are nothing but, road between two intersections with a sufficient traffic density. And the information about the route from source to destination is stored in the header of the data packets. And this routing is done in three steps. Route Discovery Route Reply Route Maintenance.
  7. When source S needs to transmit data to destination D. First of all, a route discovery packet is broadcasted by source ,S . All the nodes surrounding S receives this RD packet. As soon as the RD packet is received- it will not be rebroadcasted immediately. For example, RD packet broadcasted by S is received by A and B. Then these nodes will retain that packet with them for a certain period of time – called asTTL. TTL is inversely proportional to its distance from the source. If once the TTl expires , then that node will rebroadcast the RD packet. That means, farthest node will get an opportunity to rebroadcast first. And if the same RD packet is received for second time by a node – then it will not rebroadcast the packet with it.. Hence, farthest node will get an opportunity to forward data. By following the similar process, RD packet reaches destination as shown here.
  8. Once the destination receives RD packet, Destination generates RR packet. The routing information present in the RD packet will be copied to the RR packet. This RR packet will be sent back to the source following the same path. As soon as the source receives the RR packet, then it starts transmitting data through this path. =============================================================================== If the destination receives more than 1 RD packets, then it will compute the best route. But most probably, first one will be the best. Because, it is the one which has transmitted RD packet more faster than the remaining.
  9. As RR is received by the source, source starts transmitting data to destination. It stores the routing information in the header of the data packet. But as the vehicular nodes are mobile – sometimes source may move from its initial position to this position. Then, in that case identity of I1 should be removed from the headers of data packets. This is accomplished by using route update packets. These will be transmitted between source and destination just like RD packets. Sometimes some road segments get sparsely populated by the nodes. And a node in that segment may not be able to send data to the next intersection. Then in that case, RE packet will be generated by that node and it will be sent back to the source. Then source will find an alternate route.
  10. Now, let me discuss RBVT- proactive protocols. This protocol periodically computes the real time graph of connected road segments. It assumes that source can use location based queries to know the position of destination. Then, using graphs of network topologies present in the nodes, source computes the shortest path for transmission and sends the data packets. Here in this protocol, routing is done in 4 steps. Topology discovery Topology Dissemination Route computation Route Maintenance
  11. Fist of all, a few nodes in the network transmits connectivity packets into the network. Nodes decide themselves to transmit packets independently depending on the last update received by them, estimated number of nodes in the network by historic hourly traffic information. The perimeter to be traversed by the nodes is defined by the CP generator itself. When a Connectivity packet is traversed through a segment, then the end points of the segment are stored accordingly in the CP stack. As shown in the figure CP generated by G traverses through the connected segments and returns back to the generator with network topology information.
  12. The network topology information in CP is copied to route update packets. These route update packets are brodcasted into the networks. And the remaining nodes update their routing table with the data present in RU packets. When a node receives a new RU packet, then it will replace its routing table completely with content in new RU table. Instead of that, it updates the content in that in segment by segment basis – as the perimeter of all connectivity packets are not same.
  13. Now, all the nodes will be continuously get updated by RU packets. Now if a node wants to send a packet to destination, it computes the best route available by obtaining the location of Destination using location based queries. And the routing information is stored in the header of the da
  14. Inorder to maintain the clear info about the surrounding nodes, nodes usually transmit the continuous beaconing hello msgs. But these continuous hello message creates heavy conjestion in the network. So to overcome this problem, this these guys used RTS/CTS mects mechanism to overcome this problem. So
  15. Hence, we can conclude that, RBVT-R and RBVT-P are the 2 efficient protocols which has outperformed the traditional protocols of MANET. Simulation results in the urban setting has shown that, RBVT-R best in terms of average delivery rate and RBVT-P has performed best in terms of average delay.