MANET For Smart Transportation
MANET For Smart Transportation
com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
ScienceDirect
Procedia Computer Science 00 (2018) 000–000
Procedia
Procedia Computer
Computer Science
Science 16000 (2018)
(2019) 000–000
758–765 www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia
Abstract
Abstract
Communication networks knew a lot of development from their first creation, from wired networks, to wireless communication
Communication networks knew
networks with infrastructure, and anow
lot we
of development from communication
talk about wireless their first creation, from wired
networks withoutnetworks, to wireless
infrastructure, communication
also called MANETs.
networks withcommunication
The wireless infrastructure, and now wewithout
networks talk about wireless communication
infrastructure, allows a quick, networks without
easy and infrastructure,
efficient also called MANETs.
network deployment, often used
The wireless
in rescue communication
operations, networks
after a natural without
disaster, infrastructure,
to replace allows
the existing a quick,
network easy and efficient
infrastructure, network
or in the deployment,
military ofteninused
field. We focus our
in rescue operations, after a natural disaster, to replace the existing network infrastructure, or in the military field.
work on the intelligent transport system, that improve the traditional transport system, with reducing the risk of human errors We focus in our
to
work on the
save lives, intelligent
and with the transport system, that improve
effective management of traffic the traditional
congestion transport
to save system,
time and with reducing
minimize the energytheconsumption.
risk of human errors to
save lives, and have
The MANETs with athe
loteffective management
of different of trafficincongestion
routing protocols, this articletowe
save time and
compare theminimize the energy
performance of someconsumption.
of this routing protocols
The
in case of using different communication applications based on HTTP, FTP and Voice protocols. of some of this routing protocols
MANETs have a lot of different routing protocols, in this article we compare the performance
in case of using different communication applications based on HTTP, FTP and Voice protocols.
©c 2019
2018 The
The Authors.
Authors. Published
Published by
by Elsevier
Elsevier B.V.
B.V.
c 2018
This The Authors. Published by Elsevier B.V.
This is an open access article under the CC BY-NC-ND license
is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
(http://creativecommons.org/licenses/by-nc-nd/4.0/)
This is an open
Peer-review access
under article under
responsibility
responsibility theConference
ofthe
of the CC BY-NC-ND
Conference license
Program
Program (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Chairs.
Chairs.
Peer-review under responsibility of the Conference Program Chairs.
Keywords: Mobile AdHoc Networks (MANET); Intelligent Transportation Systems (ITS); Cybercars; Mobile routing protocols; Mobile routing
Keywords:
constraints. Mobile AdHoc Networks (MANET); Intelligent Transportation Systems (ITS); Cybercars; Mobile routing protocols; Mobile routing
constraints.
1. Introduction
1. Introduction
Nowadays, the use of wireless technology has invaded the network market. Several technologies have emerged,
for Nowadays, the use[1],
example: ZigBee of WiFi
wireless
[1],technology
WIMAX [2]. hasThese
invaded the network
technologies market.
equip a wideSeveral
range technologies have emerged,
of mobile devices like: lap-
for example: ZigBee [1], WiFi [1], WIMAX [2]. These technologies equip a wide range of mobile devices
tops, mobile phones, smart cars, and others. This technological advancement means that wireless telecommunications like: lap-
tops, mobile phones, smart cars, and others. This technological advancement means that wireless telecommunications
networks are currently among the most active areas of computer research. There are two main families of wireless
networks
networks: are currently
networks withamong the most and
infrastructure active areas ofwithout
networks computer research. There
infrastructure are two
or AdHoc. In main families
networks with of wireless
infrastruc-
networks: networks with infrastructure and networks without infrastructure or AdHoc. In networks with
ture, communications are made via a fixed base station. This approach is used in traditional wireless networks such infrastruc-
ture, communications
as Global are made
System for Mobile via a fixed base(GSM)
Communications station. This approach
networks is used
and wireless in traditional
LANs. However,wireless networks in
communications such
an
as
AdHoc network occur in the absence of any fixed communication infrastructure. If the communicating devices are an
Global System for Mobile Communications (GSM) networks and wireless LANs. However, communications in in
AdHoc network occur in the absence of any fixed communication infrastructure. If the communicating devices are in
the transmission zone of each other, the communication is carried out in point-to-point mode, and if the communicat-
ing nodes are far apart, several intermediate nodes participate in the routing of the data to their destinations. In this
case, we speak of the ”multi jumps” routing.
AdHoc mobile networks [3] are fast and easy to deploy, they are particularly interesting for military applications
where the installation of fixed infrastructure is often impossible, they can also be used in search and rescue opera-
tions, train stations and airports for communication and collaboration between staff members, in our work we focus
particularly on the intelligent transportation system that improves the transport domain by reducing the error rate of
drivers, and minimizing the production of greenhouse gases. Several routing protocols for mobile AdHoc networks
(MANET) have been developed, depending on how routes are created and maintained during data routing, and can
be classified into five categories: reactive, proactive, hybrid, hierarchical and geographical protocols. Our work is part
of the study of the behavior of some selected MANET routing protocols (AODV [4], DSR [5], OLSR [6] and TORA
[7]) in the case of using applications that are based on HTTP, FTP and Voice communication protocols as well as the
rate of control messages generated by these protocols.
In section two we define the mobile AdHoc network its characteristic, and types, in section three we talk about the
intelligent transport system as an application of the MANETs, we give the context of ITS and the migration to the
Cybercars, in section four we talk about the constraints of routing in the MANETs, description and representation of
different types of protocols, and simulation with performance comparison between selected MANET routing proto-
cols.
2. AdHoc mobile networks
2.1. Definition of AdHoc networks
An AdHoc network [3] is a set of hosts equipped with antennas that can communicate with each other without any
centralized administration, using wireless communication technology such as: ZigBee [1], WiFi [1], WiMAX [2] and
others. In contrast to wired networks where only certain nodes called ”routers” are responsible for the routing of data,
in an AdHoc network all nodes are both routers and terminals. The choice of nodes that will ensure a communication
session in an AdHoc network is done dynamically according to the connectivity of the network, hence the name
”AdHoc”. In an AdHoc network, a node can communicate directly (point-to-point mode) with any node if its in
the same transmission zone, while communication with a node outside its transmission zone is done via several
intermediate nodes (multi-hop mode).
• Energy constraints: mobile hosts are powered by autonomous energy sources such as batteries or other consum-
able sources. The energy parameter must be taken into consideration in any control made by the system.
• Limited physical security: AdHoc mobile networks are more affected by the security parameter than conven-
tional wired networks. This is justified by the physical constraints, and limitations, that make the control of
transferred data to be minimized.
• Lack of infrastructure: mobile AdHoc networks are distinguished from other wireless networks by the absence
of pre-existing infrastructure and any kind of centralized administration. Mobile hosts are responsible for estab-
lishing and maintaining network connectivity in a continuous manner.
3.2. To Cybercars
ITS are composed of a wide range of technologies aimed at improving the quality of the different types of existing
transport systems. The ITS evolution is continuous, rapid and ultimately aims at the complete automation of these
systems. This outcome is already named and under development, it is called Cybercars [17]. The concept of Cybercar
[17] was born in the early 90s in Europe. The first Cybercars related system was set up in the Netherlands in 1997 for
the transit of passengers at Schiphol airport. To more formally define Cybercars, we can say that these are road vehicles
that operate completely autonomously apart from maintenance. Therefore, no driver is needed in such vehicles. They
are intended for the transport of people and goods on well defined road networks, and are supposed to be able to
adapt to various traffic conditions (bad weather, traffic jams, obstacles on the road, etc.). However, several levels of
automation can be defined for autonomous vehicles:
• level 0: classic vehicle, without automatic character.
• level 1: the driver directs, but he is assisted in his driving (parking assistance, cruise control for example).
• level 2: the automation is partial but the driver must still manage the pipe (the system can take over for example
in traffic jams).
• level 3: automation is real under certain predefined conditions. The driver is sometimes required to resume
manual control of his vehicle (automatic system adapted to highways for example).
• level 4: high automation, ie: that the vehicle operates autonomously in a large field of defined conditions (even
in urban areas), but a driver must be present and can theoretically regain control.
• level 5: the automation is complete and the vehicle can operate alone under all conditions that may be encoun-
tered. The presence of a driver is not necessary.
According to this scale, the Cybercar [17] is level 5 since it does not require the presence of any driver. However, in
the current state of the advance of research, such vehicles exist only for particular conditions, whether they are well
defined urban areas (as was done in La Rochelle or Clermont-Ferrand) etc. To date, a number of projects exist around
the world. We obviously think of the Google Car developed by the Google company, but many in Europe, including
the INRIA (National Institute of Research in Computer Science and Automation) and their project CyCab developed
by the RITS team.
• Network load minimization: is achieved by improving network resources to reduce the number of routing loops
and the concentration of traffic around certain nodes or links.
• Provide support for reliable multipoint communications: the fact that the paths used to route data packets can
evolve should not have any problem with the proper routing of data. The elimination of a link, due to breakdown
or mobility should, ideally, increase the latency as little as possible.
• Ensure optimal routing: the routing strategy must create optimal paths and be able to take into account different
cost metrics (bandwidth, number of links, network resources, etc.). If the construction of optimal paths is a hard
problem, the maintenance of such paths can become even more complex, so the routing strategy must ensure
efficient road maintenance with the least possible cost.
• Latency: Increasing network connectivity affects the increase in latency quality.
4.3. Simulation and performance comparison between selected MANET routing protocols
4.3.1. The simulation scenario
The following scenario simulates the behavior of 20 mobile nodes that exchange HTTP, FTP, and Voice data over a
period of 50 minutes using a Mobile AdHoc network. Our job is to study and compare the performance of our network
when it uses the AODV [4], DSR [5], OLSR [6] and TORA [7] protocols for routing information. The simulation is
done the June 12 2019 it starts at 05:56:40 pm and ends at 06:50:00 pm.
Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765 763
6 ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000
simulation. The curve that represents the TORA [7] protocol reaches 2500 bits/sec at the beginning and then it turns
out slowly to arrive at less than 500 bytes/sec towards the end of the simulation. The curve representing the DSR [5]
protocol is at the end of the ranking, it is at 2000 bytes/sec at the beginning then it makes a slow decay that goes to
less than 500 bytes/sec at the end of the simulation.
To conclude we classify the performance of protocols in the case of use of the FTP protocol: OLSR, AODV, TORA,
then DSR.
5. Conclusion
MANET is a new network technology based on wireless communication protocols without any pre-existent in-
frastructure used a lot on train station and airport for communication and collaboration between staff members and
military applications. In our work we focus especially on the intelligent transportation systems that save lives by
reducing the risk of human errors, it can also minimise the energy consummation by the efficient management of
the traffic congestion. The diversity on the existing routing protocols in the MANETs make the choice of the most
efficient protocol to route the information a real problem. Our performance study of some selected routing protocol
results by advantage AODV then OLSR in case of using an HTTP application, in using a FTP application OLSR and
then AODV, and in using a Voice application OLSR then TORA.
References
[1] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Comparison between IOT protocols: ZigBee and WiFi using the OPNET
simulator. In : Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications. ACM, 2018. p. 22.
[2] ZEMRANE, Hamza, ABBOU, Aiman Nait, BADDI, Youssef, et al. Wireless Sensor Networks as part of IOT: Performance study of WiMax-
Mobil protocol. In : 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech). IEEE, 2018. p.
1-8.
[3] SHEN, Chen, YUN, Mira, ARORA, Amrinder, et al. Efficient Mobile Base Station Placement for First Responders in Public Safety Networks.
In : Future of Information and Communication Conference. Springer, Cham, 2019. p. 634-644.
[4] WU, Jianze, SHI, Shuo, LIU, Zhongyue, et al. Optimization of AODV Routing Protocol in UAV Ad Hoc Network. In : International Conference
on Artificial Intelligence for Communications and Networks. Springer, Cham, 2019. p. 472-478.
[5] SHARMA, Vivek, ALAM, Bashir, et DOJA, M. N. An Improvement in DSR Routing Protocol of MANETs Using ANFIS. In : Applications
of Artificial Intelligence Techniques in Engineering. Springer, Singapore, 2019. p. 569-576.
[6] SCHWEITZER, Nadav, STULMAN, Ariel, HIRST, Tirza, et al. Network bottlenecks in OLSR based ad-hoc networks. Ad Hoc Networks,
2019, vol. 88, p. 36-54.
[7] PRATAMA, Dikky Bagus. ANALISA PERBANDINGAN PERFORMANSI VOD (VIDEO ON DEMAND) DAN VOIP (VOICE OVER IN-
TERNET PROTOCOL) PADA JARINGAN MANET MENGGUNAKAN ALGORITMA ROUTING TORA. 2019. Thse de doctorat. Univer-
sity of Muhammadiyah Malang.
[8] LUONG, Le, HAVERINEN, Anssi, FUKUOKA, Yoshiro, et al. Wireless personal area network transmit beamforming. U.S. Patent Applica-
tion No 15/640,410, 3 janv. 2019.LUONG, Le, HAVERINEN, Anssi, FUKUOKA, Yoshiro, et al. Wireless personal area network transmit
beamforming. U.S. Patent Application No 15/640,410, 3 janv. 2019.
[9] THOMAS, Kvin, FOUCHAL, Hacne, CORMIER, Stephane, et al. Intelligent Transport System Based on Bluetooth. In : International Work-
shop on Communication Technologies for Vehicles. Springer, Cham, 2019. p. 50-59.
[10] SCHLESSINGER, Monroe. Infrared technology fundamentals. Routledge, 2019.
[11] GONG, Michelle X. Peer to peer networking and sharing systems and methods. U.S. Patent Application No 16/103,563, 1 aot 2019.
[12] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. SDN-Based Solutions to Improve IOT: Survey. In : 2018 IEEE 5th International
Congress on Information Science and Technology (CiSt). IEEE, 2018. p. 588-593.
[13] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Internet of Things Smart Home Ecosystem. In : Emerging Technologies for
Connected Internet of Vehicles and Intelligent Transportation System Networks. Springer, Cham, 2020. p. 101-125.
[14] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. IoT Smart Home Ecosystem: Architecture and Communication Protocols. In
: 2019 International Conference of Computer Science and Renewable Energies (ICCSRE). IEEE, 2019. p. 1-8.
[15] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Ehealth smart application of WSN on WWAN. In : Proceedings of the 2nd
International Conference on Networking, Information Systems Security. ACM, 2019. p. 26.
[16] GANIN, Alexander A., MERSKY, Avi C., JIN, Andrew S., et al. Resilience in Intelligent Transportation Systems (ITS). Transportation Re-
search Part C: Emerging Technologies, 2019, vol. 100, p. 318-329.
[17] MONTANARO, Umberto, DIXIT, Shilp, FALLAH, Saber, et al. Towards connected autonomous driving: review of use-cases. Vehicle System
Dynamics, 2019, vol. 57, no 6, p. 779-814.
[18] DESAI, Aneri Mukeshbhai et JHAVERI, Rutvij H. Secure routing in mobile Ad hoc networks: A predictive approach. International Journal of
Information Technology, 2019, vol. 11, no 2, p. 345-356.
[19] SHAMAEE, Mahsa Soheil, SHIRI, Mohammad Ebrahim, et SABAEI, Masoud. A smart proactive routing protocol in cognitive radio networks.
International Journal of Ad Hoc and Ubiquitous Computing, 2019, vol. 31, no 2, p. 83-102.
[20] RANI, Sudesh et ASERI, Trilok C. Randomized Link Repair Reactive Routing Protocol for Vehicular Ad Hoc Network. International Journal
of Sensors Wireless Communications and Control, 2019, vol. 9, no 1, p. 64-79.
[21] SINHA, Sumana, SAHA, Snehanshu, et MISHRA, Sudeepta. COR-HR: an efficient hybrid routing approach using coefficient of restitution in
MANET. In : Proceedings of the 20th International Conference on Distributed Computing and Networking. ACM, 2019. p. 455-459.
[22] HAMZAH, Abdulmughni, SHURMAN, Mohammad, AL-JARRAH, Omar, et al. Energy-Efficient Fuzzy-Logic-Based Clustering Technique
for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors, 2019, vol. 19, no 3, p. 561.
[23] ZAIMI, Imane, BOUSHABA, Abdelali, HOUSSAINI, Zineb Squalli, et al. A fuzzy geographical routing approach to support real-time multi-
media transmission for vehicular ad hoc networks. Wireless Networks, 2019, vol. 25, no 3, p. 1289-1311.