Vanet Traffic Report All Re
Vanet Traffic Report All Re
Vanet Traffic Report All Re
INTRODUCTION
1.1INTRODUCTION
Computer Network was always the key element of today’s technological advancement. In
previous chapter a brief introduction and detail project outline were discussed. This chapter is
aim to provide an initial of overview of Vehicular Ad-hoc network, which is the topic area for this
research and also a literature analysis will be carried out containing similar previous research
materials and outcomes of those researches.
VANET is a particular case of wireless multihop network, which has the constraint of fast
topology changes due to the high node mobility. With the increasing number of vehicles equipped
with computing technologies and wireless communication devices, intervehicle communication
is becoming a promising field of research, standardization, and development. VANETs enable a
wide range of applications, such as prevention of collisions, safety, blind crossing, dynamic route
scheduling, real-time traffic condition monitoring, etc. Another important application for
VANETs is providing Internet connectivity to vehicular nodes.
1
used in Defence networks, Search and Rescue operation for example a soldier transfers
information about the situation in battlefield or a rescue operation passing detail information from
flood or hurricane affected area. VANET does not contain any infrastructure and each node within
the network acts as a router to form their own network, with these characteristics VANET
networks sometimes called infrastructure less network.
Vehicular Ad-hoc Network has a number of protocols for difference types of VANET. These
protocols are classified as Reactive, Proactive and Hybrid1.
Traffic congestion on the roads is today a large problem in big cities. The congestion and related
vehicle accommodation problem is accompanied by a constant threat of accidents as well.
Absence of road traffic safety takes a toll of precious human lives and poses a dire threat to our
environment as well. Other negative consequences are related to energy waste and environmental
pollution. According to National Highway Traffic Safety Administration, the following figures
indicate some of the consequences of recent car accidents.
• The economy effects caused due to these accidents were more than $230 billion
Preliminary precautions like seat belts and airbags are used but they cannot eliminate problems
due to driver’s inability to foresee the situation ahead of time [14]. On a highway a vehicle cannot
currently predict the speed of other vehicles. However, with use of sensor, computer and wireless
communication equipment, speed could be predicted and a warning message sent every 0.5
seconds could limit the risk of potential accidents [3]. Wireless communication is ubiquitous
because of its flexibility to adapt to different scenarios. Mobile Ad Hoc Networks (MANETS) is
a term coined for the continuously varying network topology handheld mobiles devices.
Vehicular Ad Hoc Networks (VANETS) is one of its types. It deploys the concept of continuously
varying vehicular motion. The nodes or vehicles as in VANETS can move around with no
2
boundaries on their direction and speed. This arbitrary motion of vehicles poses new challenges
to researchers in terms of designing a protocol set more specifically for VANETS. Tests are being
carried out through simulated environments to check the way VANETS perform, before they are
used in commercial application in the real world.
This thesis aims at presenting and analysing the shortcomings of current simulators aimed at or
useful for VANETS. One of them would be chosen for test under certain environmental situations
to check the simulations.
To evaluate VANET protocols and services, the first step is to perform an outdoor
experiment. Many wireless technologies such as GPRS, IEEE 802.11p and IEEE 802.16 have
been proposed for reliable traffic information. Before the technology hits the ground and can
meet the expectations, a series of experiments should be performed to test it. These experiments
could be expensive and highly complex to inherit all kinds of situation. For this purpose software
simulations can play a vital role in imitating real world scenarios. VANET relies on and is related
to two other simulations for its smooth functioning, namely traffic simulation and network
simulation. Network simulators are used to evaluate network protocols and application in a
variety of conditions. The traffic simulators are used for transportation and traffic engineering.
These simulations work independently but to satisfy the need of VANET, a solution is required
to use these simulators together. Numerous traffic and network simulations have been tried to
resolve the issues with VANET but every solution has had its shortcomings. There are a large
3
number of traffic and network simulator and they need to be used together into what can be called
VANET simulator. There are few tools for VANET simulation but most of them have the problem
of proper ‘interaction’. Thus a proper selection of a simulator is also a question for simulation.
Therefore, we will debate on present tools and will suggest the choice with proper ‘interaction’.
In this thesis we present NCTUns (National Chiao Tung University) [32] simulator, a powerful
network and traffic simulator freely available for the research community. NCTUns replaced
Harvard simulators in 2002 and after the release of version 4, it greatly supports the simulation
of ITS (Intelligent Transpiration System) network.
4
work in volatile networks. Finding well-suited parameter configurations of existing mobile ad
hoc network protocols is a way of improving their performance, even making the difference
between a network that does work or does not, e.g. the networks with high routing load suffer
from congestion and cannot ensure timely and reliable delivery of messages.
In the present work, we aim at defining and solving an off-line optimization problem in
order to efficiently and automatically tune OLSR, a widely used mobile ad hoc network unicast
proactive routing protocol. Although specific routing protocols are emerging for VANET
networks, a number of authors are currently using OLSR to deploy vehicular networks. This
protocol has been chosen mainly because it presents a series of features that make it well-suited
for VANETs: it exhibits very competitive Parking Delays in the transmission of data packets in
large networks (that is an important feature for VANET applications), it adapts well to the
continuous topology changes, and OLSR has simple operation that allows it to be easily
integrated into different kinds of systems. More details about the use of OLSR in VANETs are
provided in the following section.
However, the continuous exchange of routing control packets causes the appearance of
network congestion, then limiting the global performance of the VANET. Thus, the quality-of-
service (QoS) of OLSR significantly depends on the selection of its parameters, what determine
the protocol operation. As shown in the results presented in and in the present study, OLSR has a
wide range of improvement by changing the configuration parameters. Therefore, computing an
optimal configuration for the parameters of this protocol is crucial before deploying any VANET,
since it could decisively improve the QoS, with a high implication on enlarging the network data
rates and reducing the network load. Then, all these features make OLSR a good candidate to be
optimally tuned.
In this work, we define an optimization problem in order to tune OLSR protocol obtaining
automatically the configuration that best fits the specific characteristics of VANETs. An
optimization problem is defined by a search space and a quality or fitness function. The search
space restricts the possible configurations of a solution vector, which is associated with a
numerical cost by the fitness function. Thus, solving an optimization problem consists in finding
the least-cost configuration of a solution vector. In spite of the moderate number of configurable
parameters that govern OLSR, the number of possible combinations of values that they can take
makes this task very hard.
5
Due to the high complexity that this kind of problems usually shows, the use of automatic
intelligent tools is a mandatory requirement when facing them. In this sense, metaheuristic
algorithms emerge as efficient stochastic techniques able to solve optimization problems. Indeed,
these algorithms are currently employed in a multitude of engineering problems showing a
successful performance. Unfortunately, the use of metaheuristics in the optimization of ad hoc
networks (and concretely in VANETs) is still limited, and just a few related approaches can be
found in the literature.
In Alba et al. a specialized Cellular Multi-Objective Genetic Algorithm (cMOGA) was
used for finding an optimal broadcasting strategy in urban mobile ah hoc networks (MANETs).
In Dorronsoro et al. (2008), six versions of a GA (panmictic and descentralized) were evaluated
and used in the design of ad hoc injection networks. A Genetic Algorithm was also employed by
Cheng et al. [18] for solving the multicast routing problem in MANETs. Due to its specific design,
Shokrani et al. [19] developed new routing protocols for MANETs based on Ant Colony
Optimization (ACO). Particle Swarm Optimization (PSO) algorithm has been used to manage the
network resources by Huang et al. proposing a new routing protocol based on this algorithm to
make scheduling decisions for reducing the packet loss rate in a theoretical VANET scenario.
More recently, Garc´ıa-Nieto et al. optimized the file transfer service (VDTP protocol) in realistic
VANET scenarios (urban and highway) by using different metaheuristic techniques.
We here evaluate four different techniques: Particle Swarm Optimization (PSO),
Differential Evolution (DE), Genetic Algorithm (GA), and Simulated Annealing (SA). We have
chosen these algorithms because they represent a wide and varied set of solvers for real parameter
optimization, based in different search/optimization schemes and strategies. The popular network
simulator ns-2 is used in the fitness function evaluation of the solutions (tentative OLSR
parameters) generated by the optimization algorithms to guide the search process. A set of
VANET instances have been defined by using real data (roads specification and mobility)
concerning a urban area of the city of M´alaga, in Spain.
In summary, the main contributions of this work are:
1) Proposing an optimization strategy in which a number of metaheuristic algorithms are
(separately) coupled with a network simulator (ns-2) to find quasi-optimal solutions.
6
2) This optimization strategy is used in this work to find as fine-tuned as possible configuration
parameters of the OLSR protocol, although it could be directly used also for a number of other
routing protocols (AODV, PROAODV, GPSR, FSR, DSR, etc.).
3) Obtaining OLSR configurations automatically that outperforms the standard one and those used
by human experts in the current state-of-the-art.
4) Generating a set of realistic VANET scenarios based in real area of M´alaga (Spain). These
instances are publicly available online for the sake of future experiments.
The remainder of this paper is organized as follows. In the next section, the OLSR routing
protocol is introduced. Section III describes the optimization design followed to tackle the
problem. Section IV presents the experiments carried out. Results, comparisons, and analyses are
shown in Section V. Finally, conclusions and future work are drawn in Section VI.
7
This chapter describes the problem definition and description of each and every modules and
module diagram to represent the modules in details.
Chapter 6: System Requirements
This chapter describes the hardware and software requirements for the projects.
Chapter 7: Coding
This chapter describes about the coding part.
Chapter 8: Testing
This chapter describes about the testing process of the system.
Chapter 9: Performance Evaluation
In this chapter, it is explain about the performance of the proposed system using simulation
graph.
Chapter 9: Conclusion and Future Enhancement
The conclusion of report is present in this chapter. It also specifies the enhancements that could
be done in days yet to come.
8
CHAPTER 2
LITERATURE SURVEY
The section explores the initial developments that were carried in creating a simulator that
was aimed at testing VANET. Furthermore, the background work in the whole project has also
been presented.
GrooveSim [40] was the first tool created for evaluation of VANET performance mainly
motivated by vehicular traffic flow and forecasting. The concept of application involves testing
the possibilities of real time events as time-critical safety messages. GrooveSim was coded in
C++ and Matlab provides GUI for drawing structures and graphs. GrooveSim could operate in
five different modes: predetermined, on-road, simulation, hybrid, research. A group of five
vehicles travelling around the city and highway were simulated for recording certain parameters
like message penetration, Parking Delay, vehicle grouping, packets dropped etc and packet time
to live values were calculated in the simulator. GrooveSim did not include any network simulator
and also it was unable to create traces for any network simulator.
NHTSA (National Highway Traffic Safety Application) [35] provided VANET estimation
and focused on a global perception of VANET performance. This platform is a computer-based
tool and accepts a text file during vehicular simulation. The NHTSA simulator was designed with
networking research in mind and was built on the top of NS-2 simulator. The simulator is
platform-independent and is capable to run on both Win32 as well as Linux. It has strong GUI
support implemented by C++. The main purpose of NHTSA project was to promote DSRC
standardization, and during the test-bed, a GPS receiver, Windows-based notebook and IEEE
802.11a wireless device were used as a hardware module for DSRC standard. The platform is
very scalable and flexible for researchers to alter the configuration according to the requirements.
9
2.3 FleetNet Network Demonstrator
This project was aimed to provide a platform based on simulation results from simulation
tools and a software prototype called FleetNet Demonstrator FND [34, 41]. The development of
this software was aimed to state the problems found in inter-vehicular communication and
realistic evaluation of VANET. The focus of this project was primarily on how mobility is
achieved with position based routing protocols. The demonstrator of the project performed an
outdoor experiment with six vehicles. Each vehicle had two laptops, one as a Linux system for
the communication between the vehicles and vehicular to infrastructure through WIFI card. The
other laptop had a Windows system to provide a GUI for vehicular communication as well as
communication with the GPS receiver. The demonstrator concluded some results by inspecting
the vehicular behaviour on highways and in the city, the transmission of data, velocity and
distances amongst vehicles.
project was developed to provide a wireless traffic service platform between the cars.
Vehicles were equipped with wireless transceivers to communicate with road-side infrastructure.
In addition, vehicles were also able to form ad-hoc network with each other. The base station was
able to collect car real-time data such as local weather, traffic density and all information about
current traffic and pass them to central unit for database updating, which is then sent back to the
vehicles driving past the base-station. The CARLINK project developed applications like FSF
(Finding and Sharing Files) and PB (Adhoc puzzle bubble) [38] on the java based application
called JANE. The purposes of the applications were to facilitate researchers to apply their tests
in simulated environment before being installed into the real ad-hoc network. Both these
applications could be installed into the laptops or PDA.
2.7 IP PReVENT
• Collision Migration
• Intersection safety
• Evaluation of ADAS
11
2.8 Cooperative Vehicles and Infrastructure Systems (CVIS)
CVIS is a project with the purpose to increase road safety and effectiveness and reduce
the environmental impact of road safety. CVIS tests technologies to permit vehicles to
communicate with each other and near by road side. The project has started in 2006 and will end
till 2010. CVIS controls traffic control systems and to reach the destination with different routes.
The main purpose of this project is [16]:
• Bringing more precision in the vehicle location and generation of more dynamic and accurate
local maps using satellite navigation and other modern methods of location referencing.
• New systems for cooperative traffic and network monitoring in both vehicle and roadside
infrastructure and to detect incidents immediately.
• Range of cooperative applications for traffic management, mobility services and driver
assistance.
• Development of toolkits to address key deployment. Local floating Car data application: The
service updates the service centre about different parameters of vehicles.
Tsukuba and Japan have joined together for the demonstration of the cooperative driver
assistance system DEMO 2000 [11]. They aim to evaluate feasibility and technologies for inter
vehicle communication and are linked together to communicate with each other. DOLPHIN
(Dedicated Omni Purposed Inter-vehicle linkage) protocol was used in 5.8 GHz DCRC and
CSMA was used to access medium. Each vehicle was equipped with laser radar for the
measurement of distance, obstacles, and LCD for displaying vehicle communication.
This is a European project to help driver based on communication between vehicles. The
communication basis in this project is self ad-hoc radio network with the purpose of developing
12
future technology. Car talk 2000 [10], [17] is a 3 year project within the IST cluster of the 5th
framework program of European commission. Car talk 2000 provides reliable components for
Advance driver Assistance (ADAS) such as Advance cruise control (ACC). With the different
approaches, the communication can greatly improve and provide better safety and fewer injuries
that are caused by collisions. The objectives of car talk 2000 are safety and to evaluate the advance
driver assistance. The Fleet net a German Project will cover the additional complements of the
project. The driver assistance system might be seen as a different perspective, research path and
methodologies but successful research has been presented by CHAUFFEUR and PATH. In order
to attain promising car driver assistance car talk 2000 creates application in the following way:
• Co-operative assistance system. Information and warning function: All the parameters are
informed by the mean of information signal. These parameters include traffic load, conditions,
road accidents etc. This prior information allows a driver a pre-sense capability about safety
measures. Communication-based longitudinal control system: The ACC systems were only
capable of capturing about the vehicle in the front but it is now possible to know about any
vehicle in front that is braking. This leads to more favourable behaviour and the avoidance of
any collision that is due to the vehicle in the front. Because of more safety all these must be given
more accurate. Car Talk 2000 is now searching for more future technologies. In a denser
environment, these signals will reach through multi-hop strategy. Co-operative Assistance
System: As nowadays, misunderstanding between the drivers on merging points occurs. It will
help us in merging points. The speed and lane of the entire vehicle must be known in advance for
better communication.
13
Table 2.1 Summary of Driver Behavior Detection Methodologies
Driver Body
Author Techniques` Devices Detection Vehicle Environment
used Part Measurements Factor
On-board
system for Multi
Artaud P detecting Sensor Face - Real Time
lapses
Conditional Head
Schmidt Automated Camera Movement, - Real Time
Driving Eye
Entropy and
Chi Complexity EEG Brain, Heart - Real Time
Zhang Method beat
Real Time
Robust Non-
EXISTING SYSTEM
3.1 INTRODUCTION
Several routing schemes are suggested to eliminate these issues. Nearly all of the schemes
are based on blind decision based. Whenever the vehicle reaches the intersection area it will select
the shortest path between source and destination,
for example GSR , GPSR , GYTAR , GPCR , A-STAR are previous approach algorithms.
However these techniques are aimed to reduce the overall Parking Delay, they will cause the
higher traffic of packets it leads to maximum Parking Delay.
In empirical path loss models were developed in four different vehicle-to-vehicle environments, i.e.,
highway, rural, urban and suburban. In analysis of one-dimensional, an analytical model was
proposed to investigate the connectivity of VANETs in the presence of Rayleigh, Rician and
Weibull channels, from a queuing theoretic perspective. In one-hop broadcasting, analytical models
were developed for broadcast efficiency and reliability in 802.11p for Rayleigh fading channels.
An efficient forwarding node selection scheme is presented to quickly select a remote neighboring
node by utilizing cluster selection mechanisms, which greatly lowers emergency message
transmission delay and reduces message redundancy.
Based on the forwarding node selection scheme, three broadcast strategies such as bi-directional
broadcast, multidirectional broadcast, and directional broadcast are then designed to quickly select
a single forwarding node in each road direction to disseminate emergency messages.
15
3.2 Dedicated Short Range Communication
In 1999, the United States Federal Communications Commission (FCC) allocated the 5,725 MHz
to 5,875 MHz band of radio frequency for DSRC communication. The ITS Joint Program Office of
the US Department of Transportation conducts research on DSRC and other wireless
communication technologies and their uses in vehicle safety.
DSRC has low latency and high reliability, is secure, and supports interoperability. It receives very
little interference, even in extreme weather conditions, because of the short range that it spans. This
makes it ideal for communication to and from fast-moving vehicles.
16
Fig 3,1 Dedicated Short Range Communication model
3.3 DISADVANTAGES
• Not always true in mobile vehicular environments
The most of the VANET networks are using following communication types as a medium
for the communication, first one is vehicle to vehicle and second one belongs to vehicle to
Infrastructure. However these two types of communications are used for improvising the safety
parameters of the road segments with the help of the guiding vehicle driver to avoid the unwanted
or dangerous events, this will leads to the comfortable journey for the whole passengers.
17
Example for this communications are the traffic related information’s are obtained by the real-
time roadside units to alternate the traveling path of the user in case of the over congestion rate.
To perform this operation the information related to travelling speed and destination points are
obtained the roadside segments to maintain the traffic light effectively.
Several routing schemes are suggested to eliminate these issues. Nearly all of the schemes are
based on blind decision based. Whenever the vehicle reaches the intersection area it will select
the shortest path between source and destination, for example GSR , GPSR , GYTAR , GPCR
, A-STAR are previous approach algorithms. However these techniques are aimed to reduce the
overall Parking Delay, they will cause the higher traffic of packets it leads to maximum Parking
Delay. To overcome this issue we propose a novel scheme based on distributed routing protocol
that will reduce the overall Parking Delay for the whole routing path before starting of the packet
communication. In this approach, our algorithm implements the power and Parking Delay
effective spine nodes on intersection of roadsides and connects all the spine nodes with help of
bridge nodes. These type of nodes helps to balance the higher no of nodes with effective Parking
Delay and connectivity co efficient. To transfer the data Packets routes which having lesser no of
weights are elected to transfer the packet.
18
CHAPTER 4
PROPOSED SYSTEM
4.1 Introduction
Ad-hoc networks are usually demanded for vehicle to vehicle (V2V) communication with
highly dynamic topologies and a stringent delay requirement.A priority based transmission scheme
is considered to guarantee the transmission of the emergency message. Priorities were considered
according to broadcasting messagesEnd-to-end packet latency increases with the increasing number
of vehicles associated with that path in vehicle network systems. In the case of Parking Delay-
sensitive applications, the exchange of information must be carried out very quickly in order to
ensure the quality of infotainment services.
Some essential information is expected to be enqueued before reaching the destination or is lost in
the event of excessive packet Parking Delay. The modified method of priority queuing is to solve
the constraints imposed by a Parking Delay in processing. By choosing a set of alternative paths
based on individual node buffer status, the proposed system dramatically minimises average
latency.
Finally, in order to the performance improvement of the proposed algorithm relative to existing
relaying schemes, both analytical and simulation results are given.
In this approach, our algorithm implements the power and Parking Delay effective spine nodes on
intersection of roadsides and connects all the spine nodes with help of bridge nodes. These type of
nodes helps to balance the higher no of nodes with effective Parking Delay and connectivity co
efficient.
To transfer the data Packets routes which having lesser no of weights are elected to transfer the
packet. In additional we are applying the Adaptive path rerouting scheme on urban vehicular adhoc
network to eliminate the traffic on road segments. When vehicle enters the roadside it should
automatically transfer packet which contains the Destination, speed, ID of the current vehicle.
Then the spine node will maintain the Real-time enhanced database of all vehicles currently
travelling on road segments. This Spine Nodes will control the traffic signals based on the collected
19
information from the vehicle.It will compute the traffic coefficient by the speed and destination of
current vehicles then it will intelligently reroute some vehicles with the help of traffic signals. For
simulation of this implementation we are using SUMO tool and getting parameter results we are
using ns2 simulation tool.
Multiple Communication Channels. TDMA-based MAC protocols for IWSNs have channel
hopping functions to enable coexistence of multiple networks in the same area and dynamic
bandwidth allocation. In this paper, we assume that three channels are available to use.
20
4.3 ADVANTAGES
• Overcoming the hidden terminal problem by using the admission control with network
encoding scheme
• Network encoding largely used to reduce the overall delay of the system.
• Admission control scheme applied to give the priority over the emergency packet to better
results.
• It can provide complete evaluation
Architecture
21
CHAPTER 4
MODULES
In general, modules specification are usw to deal with the steps that performer developing
the system.
5.2 MODULES
In this module we have to apply the overall network encoding scheme in which we have
to combine all the packets available in the transmission buffer for the purpose of reduction in the
overall delay while processing the data.
These packets are decoded using the receiver side and the overall complexity of the system was
reduced.
22
accurate response decisions illustrated Evidence collection. In this step, Intrusion Detection
System (IDS) gives an attack alert with a confidence value, and then Routing Table Change
Detector (RTCD) runs to figure out how many changes on routing table are caused by the
attack. Our risk aware response mechanism is divided into the following four steps Risk
assessment. Alert confidence from IDS and the routing table changing information would
be further considered as independent evidences for risk calculation and combined with the
extended D-S theory. Risk of countermeasures is calculated as well during a risk assessment
phase. Based on the risk of attacks and the risk of countermeasures, the entire risk of an
attack could be figured out. Decision making. The adaptive decision module provides a
flexible response decision-making mechanism, which takes risk estimation and risk
tolerance into account. To adjust temporary isolation level, a user can set different
thresholds to fulfill her goal.
In our approach, we use two different responses to deal with different attack methods:
routing table recovery and node isolation. Routing table recovery includes local routing table
recovery and global routing recovery. Local routing
recovery is performed by victim nodes that detect the attack and automatically recover its own
routing table. Global routing recovery involves with sending recovered routing messages by
victim nodes and updating their routing table based on corrected routing information in real time
by other nodes in VANET. Routing table recovery is an indispensable response and should serve
as the first response method after successful detection of attacks. In proactive routing protocols
like AODV, routing table recovery does not bring any additional overhead since it periodically
goes with routing control
messages. Also, as long as the detection of attack is positive, this response causes no negative
impacts on existing routing operations. Node isolation may be the most intuitive way to prevent
further attacks from being launched by malicious nodes in VANET. To perform a node isolation
response,
the neighbors of the malicious node ignore the malicious node by neither forwarding packets
through it nor accepting any packets from it. On the other hand, a binary node isolation response
23
may result in negative impacts to the routing operations, even bringing more routing damages
than the attack itself.
Since the attack response actions may cause more damages than attacks, the risks of both
attack and response should be estimated. We classify the security states of VANET into two
categories: {Secure, Insecure}. In other words, the frame of discernment would be
{_, {Secure}, {Insecure}, {Secure, Insecure}}. Note that {Secure, Insecure} means the security
state of VANET could be either secure or insecure, which describes the uncertainty of the security
state. BelfInsecureg is used to represent the risk of VANET. Our evidence selection approach
considers subjective evidence from experts’ knowledge and objective evidence from routing table
modification. We propose a unified analysis approach for evaluating the risks of both attack and
countermeasure.
In cluster initialization we have to divide all the Mobile Nodes depends upon the location
and we have to elect initial cluster head based on the residual energy.
Every cluster having group of Mobile Nodes as well as every Mobile Nodes having the cluster
head for the purpose communication with the sink node .
Before starting the transmission, it establishes a logical path or virtual connection using a
signaling protocol, between sender and receiver and all packets belongs to this flow will follow
this predefined route. Virtual Circuit ID is provided by switches/routers to uniquely identify this
virtual connection. Data is divided into small units and all these small units are appended with
help of sequence numbers. Packets arrive in order at the destination. Overall, three phases take
place here- The setup, data transfer and tear-down phases.
24
5.3.3.2 Wireless Access for Vehicular Environments (WAVE)
Broadcasting of data and control packets is expected to be crucial in this environment. Both
safety-related and non-safety applications rely on broadcasting for the exchange of data or status
and advertisement messages.
In this module we have to apply the overall network encoding scheme in which we have
to combine all the packets available in the transmission buffer for the purpose of reduction in the
overall delay while processing the data.
These packets are decoded using the receiver side and the overall complexity of the system was
reduced.
25
CHAPTER 6
SYSTEM REQUIREMENT
6.1 Introduction
Once the system has been designed, the next step is to convert the designed one in to
actual code, so as to satisfy the user requirements as excepted. If the system is approved to be
error free it can be implemented.
When the initial design was done for the system, the department was consulted for acceptance
of the design so that further proceedings of the system development can be carried on. After the
development of the system, a demonstration was given to them about working of the system. The
aim of the system illustration was to identify any malfunctioning of the system.
Implementation includes proper training to end-users. The implemented software should be
maintained for prolonged running of the software.
Initially the system was run parallel with manual system. The system has been tested with data
and has proved to be error-free and user-friendly. Training was given to end -user about the software
and its features.
Tools : ns-allinone-2.28
26
6.1.2 Hardware Specification
RAM : 128 MB
27
CHAPTER 7
SYSTEM DESIGN
Network Simulator (NS) is a simulation tool targeted at both wired and wireless (local
and satellite) networking research. NS is a very promising tool and is being used by universities
and researchers. In this report we provided information how to install NS2 on UNIX and
Windows. Then we discussed how to use NS2 to simulate wired and wireless networks. A simple
but limited method is to combine the existing components with OTcl scripts; a complex but
powerful method is to implement new components into NS2 using C++. We discussed both of
the two methods. Finally, the methods to animate (using NAM) and to analyze (using
Xgraph/GNUplot) the simulation results are presented.
Nam began at LBL. The Nam development effort was an ongoing collaboration with the
VINT project. Currently, it is being developed at ISI as part of the SAMAN and Conser projects.
The simple way NS2 can be used is for studying the property of a well-known protocol.
In this case, a script language OTcl is used to glue the network components (nodes, links, agents,
applications, etc) provided by NS2, configure the parameters (band-width, Parking Delay, routing
protocol, etc) and launch activities (data transfer, topology change, etc). NS2 will read these
configurations; simulate each network event, and record events and statistics in to trace files.
28
After the simulation, Nam can demonstrate the events in a visualized way. For the simple usage
of NS2, an understanding to the simulation framework is necessary.
When NS2 is used to simulate a new protocol, e.g., an ad hoc wireless routing protocol,
the simple way is not enough. The advanced way is to hack the source of NS2 with C++, define
new network components, rebuild the whole system and run the customized version of NS2. For
the advanced usage of NS2, knowledge of the simulator implementation is required.
7.2NS2 Installation:
Windows
29
The Elements of ns-2 are listed below:
• Create the event scheduler
• [Turn on tracing]
• Create network
• Setup routing
• Insert errors
• Create transport connection
• Create traffic
• Transmit application-level data
NS2 simulation is about the processing of packets. Packets are transported among network
nodes via network links. These packets are generated by network applications (data packet) or
network protocols (control packet). An event scheduler is in charge of ordering all the packets (or
events) by their arriving time and let nodes, links and agents to handle these packets in sequence.
A full trace of each packet or their statistics information can be stored in a trace file, and used to
generate graphs or animations. In this section, the concept of node, link, agent, and scheduler will
be introduced, as well as their usage in an OTcl script to configure a specific NS2 simulation.
The following script segment creates two nodes. When a node is created, it is automatically
assigned an address and a default routing module. Nodes are the sources and destinations of the
packets. In the script, $ns is the scheduler object and node is its method to create a node, $n0 and
$nl hold the reference to the newly created node object.
30
The following script segment creates one link to connect these two nodes with lM bandwidth
and l0ms Parking Delay. A link receives packets from one end, compute the Parking Delay and
transmission time, and send them to the other end after the time elapsed. If two or more packets
are going through the same link, the later packet should wait in a queue until all previous packets
are sent. If the number of packets waiting exceeds the queue limit, new packets sent to this link
are dropped.
The default routing algorithm is centralized link state algorithm (like Dijkstra's SPF). The
route from one node to each other node is computed by the simulator and stored in the routing
table of this node. From user's point of view, each node just 'know' how to reach another node in
the network.
When the network topology is created, agents can be attached to nodes to generate packets
and put them onto the network. There are agents in different network protocol layers. In the
transportation layer, there are TCP and UDP agents. The following OTcl script segment create a
UDP agent and put it on node $n0. When an agent is attached to a node, it send and receive packet
through this node.
In the application layer, there are agents for well known protocols like FTP, Telnet, HTTP, etc;
there are also special agents for simulation use, like CBR, which generate continues data streams.
The following OTcl script-segment creates a CBR agent and attaches it to the UDP agent. When
an agent is attached to another agent, it sends and receives data through this agent.
31
Agents are usually created in pairs, put in different nodes and exchange data between each other.
The following OTcl script segment creates a Null agent on node $n1 and connect it to the UDP
agent on node $n0. After the agents are connected, the data generated by the CBR agent and
passed to the UDP agent will go though node $n0, the link between node $n0 and $n1, node $n1,
and received by the Null agent. The Null agent is like a null device, it discards any packet it
receives.
There are also agents in other layers, e.g., the router agents when dynamic routing is used.
However, these agents are always hidden in the inner structure of nodes, and created
automatically by the simulator.
If nodes and links is the scene in the stage, agents are the actors; then the scheduler is the
director. The scene and actors don't know how to perform unless the director tells them. The
scheduler is a build-in object in NS2 user can tell it when to do what. The following OTcl script
segment asks the scheduler to open the traffic generator at 0.5 second of the simulation and close
it at 4.5 second. The script segment also told the scheduler the whole simulation will last for 5.0
seconds.
Actually, a scheduler's work is much more than that. Every time a packet is received by an agent
or a link, a Parking Delay time representing the processing time or network Parking Delay is
computed and actually the packet is handed to the scheduler as an event. The scheduler orders all
the events by time and fires them one by one; i.e., when the time comes, the agent or link will
send the early received packet to its destination. There are also other events than packets, e.g., a
TOP agent may set a timer for its time window and re-send a packet when timeout.
32
$ns run
The above OTcl script segment will start the simulation; i.e., the scheduler begins to fire the
events one by one, according to their time stamps. In NS2, the scheduler is non-real-time by
default. The time stamps are not physical time in the simulation, but used to order the events. So
a 5.0-second simulation may take 2.0 seconds or 1 hour, de-pending on the complexity of the
topology and the number of events fired during the simulation.
You start ns with the command 'ns <tclscript>' (assuming that you are in the directory
with the ns executable, or that your path points to that directory), where '<tclscript>' is the name
of a Tcl script file which defines the simulation scenario (i.e. the topology and the events). You
could also just start ns without any arguments and enter the Tcl commands in the Tcl shell, but
that is definitely less comfortable.
Everything else depends on the Tcl script. The script might create some output on stdout,
it might write a trace file or it might start nam to visualize the simulation. Or all of the above.
These possibilities will all be discussed in later sections.
7.4.1Starting nam
You can either start nam with the command 'nam <nam-file>' where '<nam-file>' is the
name of a nam trace file that was generated by ns, or you can execute it directly out of the Tcl
simulation script for the simulation which you want to visualize. For additional parameters to
nam, see the nam manual page. Below you can see a screenshot of a nam window where the most
important functions are being explained.
33
34
CHAPTER 8
SAMPLE CODING
PROPOSED CODE
#===================================
#===================================
#===================================
35
# Initialization
#===================================
#Create a ns simulator
create-god $val(nn)
36
$ns trace-all $route1
#===================================
37
#===================================
-llType $val(ll) \
-macType $val(mac) \
-ifqType $val(ifq) \
-ifqLen $val(ifqlen) \
-antType $val(ant) \
-propType $val(prop) \
-phyType $val(netif) \
-channel $chan \
-topoInstance $topo \
-agentTrace ON \
-routerTrace ON \
-macTrace ON \
-movementTrace ON
#===================================
# Nodes Definition
#===================================
#Create 30 nodes
38
$n(0) set Y_ 203
39
$n(4) set Z_ 0.0
40
$ns initial_node_pos $n(8) 20
set hrate1 1
set hrate2 2
41
source rssCalc.tcl
flush stdout
flush stdout
#color
set e($a1) 11
proc sensePower {} {
global array names n ns array names val array names e en1 en2 en3 energy sor
set count 0
42
for {set i 0} {$i<$val(nn)} {incr i} {
proc transPower { b t} {
$n(8) set Z_ 0.0 $ns initial_node_pos $n(8) 20 set n(9) [$ns node] $n(9) set X_ 645
43
$n(28) set Z_ 0.0 $ns
initial_node_pos $n(28) 20 set
n(29) [$ns node] $n(29) set X_
919
$n(29) set Y_ 183
44
$ns at $t "$n($i) label $e($i)"
puts $energy "$t $e($sor)"
}
proc transPower { b t} {
global ns array names n nn array names e rt re nn
set t [$ns now]
proc receivePower { ma t} {
45
$ns at $t "$n($ma) label $e($ma)"
set des 0
if {$des!=$j} {
set s $j
set flag 0
set RNc $s
puts "Route from $j to $des"
while {$RNc!=$des} {
foreach rn $neighborlist($RNc) {
puts "$rn"
46
if {$rn==$des} {
set flag 1
if {$flag==1} {
set RN1 $des
} else {
$y_pos*$y_pos]
lappend dL $D2
47
set disl [lsort -real $dL]
if {$i!=$des} {
if {$mindis==$nd($des,$i)} {
set RN1 $i
puts "$RNc"
$des
$route($j,$des)"
puts $route1 "$route($j,$des) $RNc j:$j des:$des"
}
48
} }
set des 0
set s $j set
flag 0 set RNc $s
# puts "Route from $j to $des"
while {$RNc!=$des} {
foreach rn $neighborlist($RNc) {
# puts "$rn" if
{$rn==$des} {
set flag 1
if {$flag==1} {
} else {
49
set x_pos [expr $x_pos1-$x_pos2]
set y_pos [expr $y_pos1-$y_pos2]
set v [expr $x_pos*$x_pos +
$y_pos*$y_pos]
lappend dL $D2
if {$i!=$des} {
if {$mindis==$nd($des,$i)} {
set RN1 $i
50
lappend route2($j,$des) $RNc
return $traffic
proc link {} {
global array names n array names nd ns array names route null2 source array names c
snode array names val sor dest array names e set sn $sor set dn $dest set s $sn
51
set sink $dn set r 0
set t [$ns now]
# $ns at [$ns now] "$n($s) label source"
# transPower $s $t
# receivePower $in $t
set $e($in) 12
52
set s $in incr
r puts "r:$r"
}
puts "Time:$t"
proc Transmission1 {} {
global array names n array names nd ns array names route null1 source array names c
snode array names val sor dest null2 route2 ni set sn $sor set dn $dest set s $sn
set sink $dn set r 0
set t [$ns now]
$ns at [$ns now] "$n($s) label source"
$ns at $t "$ns trace-annotate \" The route from $sn to sink\"" while
{$s!=$sink} { if {$r!=0} { set in [lindex $route($sn,$dn) $r]
} else { set ni [lindex
$route2($sn,$dn) $r]
set in $ni
53
$ns attach-agent $n($in) $null2
if {$r!=0} {
} else {
transPower $s $t
receivePower $in $t
$ns at $t "$cbr01 start"
54
set sn $sor set dn $dest set s $sn set
sink $dn set ni [lindex
$route2($sn,$dn) 0] set tru [open
thrval.tr w] for {set i 1}
{$i<$val(nn)} {incr i} { if {$i==$ni}
{ set thr($i) [myRand 60 75] puts
$tru "$i $thr($i)"
} else { set thr($i) [myRand
80 95] puts $tru " $i
$thr($i)"
}
proc Transmission2 {} {
global array names n array names nd ns array names route null1 source array names c snode
array names val sor dest array names route2
55
$ns at $t "$ns trace-annotate \" The route from $sn to sink\"" while
{$s!=$sink} { set in [lindex $route($sn,$dn) $r]
puts "in:$in"
receivePower $in $t
puts "Time:$t"
56
proc record {} {
global f1 f2 f3 f4 f5 f6 f7 f8 hrate1 hrate2 hrate3 hrate4 hrate5 pdrratio null1 null2 null3 dl
#Set The Time After Which The Procedure Should Be Called Again
57
set Size 64
#===================================
58
# Termination
#===================================
$ns run
59
MAIN.TCL
.menubar add cascade -label "VANET EXISTING SYSTEM " -menu .menubar.mFile1
.menubar add cascade -label "VANET PROPOSED SYSTEM " -menu .menubar.mFile2
60
.menubar add cascade -label Quit -menu .menubar.sFile
$File2 add command -label Run_Simulation -command {exec ./ns code.tcl &}
$File2 add command -label Simulation_Output -command {exec nam out.nam &}
$Comp add command -label "Packet Data Ratio" -command {exec xgraph
clopacketdataratio.tr normal-packetdataratio.tr -x "Time in Sec" -y "Data in Mbps" bg
"white" -t PDR -fg "blue" -lw 3 &}
$Comp add command -label "AVg Delay" -command {exec xgraph clo-delay.tr
normaldelay.tr -x "Time in Sec" -y "Data in Mbps" bg "white" -t AVG Delay -fg "blue" -
lw 3 &} $Comp add command -label "Throughput" -command {exec xgraph clo-
throughput.tr normal-throughput.tr -x "Time in Sec" -y "Data in Mbps" bg "white" -t
Throughput -fg "blue" -lw 3 &}
$Comp add command -label "Energy Consumption" -command {exec xgraph clo-energy.tr
normal-energy.tr -x "Network Size" -y "Energy Consumption Unit" bg "white" -t Energy
-fg "blue" -lw 3 &}
$Comp add command -label "Avg Routepath Length" -command {exec xgraph
cloavgroutelength.tr normal-avgroutelength.tr -x "Network Size" -y "
61
CHAPTER 9
SYSTEM TESTING
9.1 INTRODUCTION
Software testing is an important element of Software quality assurance and represents the
ultimate review of specification, design and coding. The increasing visibility of S/W as a system
element and the costs associated with Software failure are motivating forces for well planned,
through testing.
Though the test phase is often thought of as separate and distinct from the development
effort--first develop, and then test--testing is a concurrent process that provides valuable
information for the development team.
There are at least three options for integrating Project Builder into the test phase:
Testers do not install Project Builder, use Project Builder functionality to compile and
source-control the modules to be tested and hand them off to the testers, whose process
remains unchanged.
The testers import the same project or projects that the developers use.
Create a project based on the development project but customized for the testers (for
example, it does not include support documents, specs, or source), who import it.
Testing objectives:
They are
A good test case is one that has a high probability of finding an undiscovered error.
62
If testing is conducted successfully according to the objectives stated above, it will
uncover errors in the software.
Testing is the process of executing the program with the intent of finding errors. Testing
cannot show the absence of defects, it can only show that software errors are present. The Testing
principles used are
• Testing should begin ‘in-small’ and progress towards testing ‘in large’.
This test is conducted during the code generation phase itself. All the errors were rectified
at the moment of its discovery. During this testing, it is ensured that
• All independent paths within a module have been exercised at least one
• Interface errors
It is already stated that the methodology used for program development is the
A series of Acceptance tests were conducted to enable the employees of the firm to
Validate requirements. The End User conducted it. The suggestions, along with the additional
requirements of the end user were included in the project.
This provides the final assurance that the software meets all functional, behavioral and
performance requirements. The software is completely assembled as a package. Validation
succeeds when the software functions in which the user expects.
After performing the validation testing, next step is output testing of the proposed system
since no system could be useful if it does not produces the required output generated or considered
in to two ways. One is on screen and another is printed format. The output comes as the specified
requirements by the user. Hence output testing does not result in any correction in the system.
User acceptance of a system is the factor for the success of any system. The system under
consideration is tested for the user acceptance by constantly keeping in touch with the prospective
system users at the time of developing and making changes wherever required.
64
• Input screen design
Taking various kinds of test data does the above testing. Preparation of test data plays a
vital role in the system testing. After preparing the test data the system under study is tested using
the test data. While testing the system by using test data errors are again uncovered and corrected
9.3Unit Testing:
This is the first level of testing. In this different modules are tested against the
specifications produced during the design of the module. During this testing the number of
arguments is compared to input parameters, matching of parameter and arguments etc. It is also
ensured whether the file attributes are correct, whether the Files are opened before using, whether
Input/output errors are handled etc. Unit Test is conducted using a Test Driver usually.
Integration testing is a systematic testing for constructing the program structure, while at
the same time conducting test to uncover errors associated within the interface. Bottom-up
integration is used for this phase. It begins construction and testing with atomic modules. This
strategy is implemented with the following steps.
• Drivers are removed and clusters are combined moving upward in the program
structure.
by using above testing steps and corrections are also noted for future use.
65
TEST REPORT BY SYSTEM ANALYST / PROGRAMMER
1. INTERFACE TESTING
OK
b) User Friendlines
OK
c) Consistent menus OK
66
2. VALIDATION TESTING
OK
d) Check for inconsistent data types
67
3. DATA INTEGRITY/SECURITY
TESTING
b) Condition(Underflow, OK
Overflow exception)
OK
c) Check For Unauthorized
Access of data
OK
d) Check For Data Availability
4. EFFICIENCY TESTING
System
68
5. ERROR HANDLING ROUTINES
Intelligent / Understandable
69
b) Is the Appropriate menu bar
displayed in the appropriate
Context? YES
YES
70
YES
71
Highlighted? YES
Saved?
YES
YES
72
3. TEST FOR VERIFYING OUTPUTS
YES
73
CHAPTER 10
PERFORMANCE EVOLUATION
10.1INTRODUCTION
To uphold an effective way for using VANET solutions, there exists significant number
of challenges which includes an effective way for data dissemination especially at the threshold
levels. Considerable amount of solutions was proposed in VANET for resolving the issues.
However, a phenomenal method to address the issues is still in debate. In the related work it has
been addressed that the challenges taken up for solving the existing issues is one among the
following themes 1) Avoidance of transmission collisions by designing a new scheme for
channel access. 2) Effective method for controlling the collisions in dense regions without
compromising the performance of the network. 3) Methods for effective dissemination of data
to the vehicles.
The addressed challenges are, data dissemination and collision control. In this chapter both the
methodologies are combined together and the performance of this hybrid methodology has been
measured using appropriate performance measures. (i.e.) a single will be upholding both the
phases such as Adaptive data dissemination and fuzzy based congestion control for improving
and evaluating the performance of VANET. This chapter has been organized as follows where
section 6.2 describes the hybrid approach in brief. In section 6.3 the detailed methodology of
proposed approach has been represented in the form of diagram. In section 6.4 the performance
of the proposed approach is measured using appropriate metrics. In section 6.5, statistical tools
are indulged to show the significance of the proposed method.
In objective I, an efficient Adaptive Load Balancing has been proposed for effective data
dissemination in VANET and in the second objective an effective k-means machine learning
algorithm has been proposed for congestion control.
74
In this objective a hybrid approach of ALB and Fuzzy C-means data congestion control has been
efficiently proposed and it performance has been evaluated under different VANET simulation
scenarios. The RSU’s at the junctions has been imposed with proposed Adaptive Data
Dissemination for efficient data dissemination and proposed Machine Learning based
congestion control mechanism for collision control. This Hybrid Approach has been tested with
different communication densities (Message count) and the results are interpreted with Packet
Reception Rate (PRR) and End to End (E2E) Parking Delay.
In this phase the proposed method has been evaluated and existing communication models
Nakagami and 2wayRound
Hybrid methodology in this phase fuses the Phase-I Adaptive Load Balancing (ALB) and
Phase-II Fuzzy based Collision Control technique in a single RSU and tests the performance of
it in terms of End-to-End Parking Delay and packet reception rate. The detailed configuration of
Hybrid Approach is given in Figure 6.1.
In figure 6.1 it is shown that the hybrid approach is the club between ALB and Fuzzy congestion
control in which ALB composes of all the cases such as scheduled request, Ondemand request
and broadcasting of data. And from the fuzzy based congestion control the phases such as
detection of collision, data control phase and collision control phase are included. With this
hybrid approach, an RSU is fed with both the phases and the performance has been evaluated
and compared with the existing approache.
75
10.3 Experimental Setup
Total Runs 20
76
10.3.3 Performance Metrics
Two different performance metrics are used for evaluating the proposed hybrid
methodology under different simulation region such as different communication range, varied
communication density and different cluster size, varied message density, delivery ratio.
Packer reception rate is defined as the probability of a packet to be delivered to the receiver
in a successful manner. It can be formulated as
In which 𝑁 is the total number of tagged nodes that actually receive messages from the
node that are actually tagged to it and 𝑀 denotes total number of nodes that are tagged with the
communication range.
End to End Parking Delay is defined as the total Parking Delay it takes for a message to
be received by the end user from the source the message originated.
Table 6.2 shows the simulation results of the proposed hybrid approach along with
existing propagation model such as Nakagami and 2RayRound with respect to different
communication range of RSU. Figure 6.2 shows the graphical representation of PRR results
with different communication range for comparing the proposed algorithm along with the
existing approaches.
range of RSU
1.2
0.8
0.6
0.4
0.2
0.2 0.4 0.6 0.8 1 1.2 1.4
DISTANCE OVER MAXIMUM COMMUNICATION RANGE (D/CR)
On observing the performance of algorithms in Table 6.2 for different communication range, the
proposed algorithm outperforms the existing approach 2RayRound with 10%, 30%, 37.5%, 50%
and 75% for communication range with 0.6, 0.8,
1.0, 1.2 and 1.4 respectively. It performs equally on communication range 0.2 and 0.4. When
compared with Nakagami the proposed algorithm performs 100% well on communications with
1.2 and 1.4. For the other communication ranges from 0.2 to 0.8 both performs equally. And for
the communication rage with 0.6 Nakagami outperforms the hybrid approach with 37%
efficiency.
78
Table 6.3 shows the simulation results of the proposed hybrid approach along with existing
algorithms such as MORS [80, 81], VDA [82], DCF [83] and ROVER [84] with respect to
different communication density of RSU. Figure 6.3 shows the graphical representation of E2E
Parking Delay results with varied communication density for comparing the proposed algorithm
along with the existing approaches.
Table 10.3 Simulation Results of E2E Parking Delay w.r.t varied communication
density
79
Figure 10.3 E2E Parking Delay w.r.t varied communication density
On addressing the performance of the proposed algorithm from Table 6.3, the proposed
algorithm outperforms existing algorithm MORS with an efficiency of 40%, 20% and 20% for the
communication density values 8000, 9000 and 10000 respectively. On comparing the results with
VDA for communication density from 5000 to 10000 the proposed outperforms with 25%, 25%,
40%, 40%, 20% and 42.9% efficiency. On DCF, hybrid approach outperforms with 66.7%, 66.7%,
70%, 70%, 60%, and 66.7% efficiency for different communication density ranges from 5000 to
10000 with an interval of 1000. Over ROVER, proposed approach outperforms with 94%, 94%,
95%, 95%, 94% and 95% for communication density ranges from 5000 to 10000 with an interval
of 1000 respectively.
Table 10.4 Simulation Results of E2E Parking Delay w.r.t varied communication density and
cluster size of hybrid approach
80
k=4 k=5 k=6
0.1
Figure 10.4: Simulation Results of E2E Parking Delay w.r.t varied communication density
and cluster size of hybrid approach
Table 6.4 shows the performance of proposed approach on varied communication density with
different cluster size. Figure 6.4 shows the graphical representation of the proposed approach with
different cluster size. On interpreting the results of Table 6.4, the proposed algorithm shows better
performance when the cluster size is six.
Table 6.5 shows the simulation results of the proposed hybrid approach along with existing
algorithms with respect to different message density of RSU. Figure 6.5 shows the graphical
representation of PRR results with varied message density for comparing the proposed algorithm
along with the existing approaches.
81
Table 10.5 Simulation Results of PRR w.r.t varied message density
82
On addressing the performance of the proposed algorithm from Table 6.5, the proposed algorithm
outperforms existing algorithm MORS with an efficiency of 13%, 0% 2%, 6%, 14%, 17% 37&,
42%, 57%, 77% and 84% for the message density ranges from 5000 to 15000 with 1000 as interval
respectively. On comparing the results with DCF for message density from 5000 to 15000 the
proposed outperforms with 19%, 22%, 26%, 31%, 27%, 31%, 44%, 57%,71%, 73% and 76%
efficiency respectively. On ROVER, hybrid approach outperforms with 56%, 55%, 39%, 37%,
21%, 10%, 2%, 5%, 14%, 23% and 40% respectively.
Table 10.6 Simulation Results of PRR w.r.t varied message density and cluster size
of hybrid approach
83
k=4 k=5 k=6
1.2
0.8
0.6
5000 6000 7000 8000 9000 10000 11000 12000 13000 14000 15000
MESSAGE DENSITY
Figure 10.6: Simulation Results of PRR w.r.t varied message density and cluster size
of hybrid approach
Table 6.6 shows the performance of proposed approach on varied message density with different
cluster size. Figure 6.6 shows the graphical representation of the proposed approach with different
cluster size. On interpreting the results of Table 6.6, the proposed algorithm shows better
performance when the cluster size is four.
Table 6.7 shows the simulation results of the proposed hybrid approach along with existing
algorithms with respect to different message density of RSU. Figure 6.7 shows the graphical
representation of PRR over Parking Delay ratio results with varied message density for comparing
the proposed algorithm along with the existing approaches.
Table 10.7 Simulation Results of PRR over Parking Delay ratio w.r.t varied message density
84
10000 27 39 32 50
11000 25 38 30 48
12000 20 37 21 46
13000 16 34 16 43
14000 13 32 13 41
15000 10 30 10 40
Figure 10.7 PRR over Parking Delay ratio w.r.t varied message density
On addressing the performance of the proposed algorithm from Table 6.7, the
proposed algorithm outperforms existing algorithm VDA with an efficiency of 15%,
15% 15%, 24%, 39%, 46% 47%, 56%, 62%, 68% and 75% for the message density
ranges from 5000 to 15000 with 1000 as interval respectively. On comparing the
results with MORS for message density from 5000 to 15000 the proposed
outperforms with 15%, 9%, 1%,
14%, 16%, 22%, 20%, 19%, 20%, 21% and 25% efficiency respectively. On DCF, hybrid
85
approach outperforms with 23%, 23%, 28%, 30%, 36%, 37%, 54%, 62%, 68% and 75%
respectively.
ANOVA
of Squar
PRR
w.r.t GroupsWit
hin 2.540 18 .141
Different
communicati Groups
on Total 2.663 20
86
Table 6.8 shows the ANOVA and DMRT test results for PRR with respect to different
communication range with other existing algorithms. On observing the sigma value in Table 6.8
which is greater than 0.05 represents that there is no significant difference among the algorithms.
Hence, post hoc analysis cannot be performed.
Table 6.9 Statistical tests on performance of E2E Parking Delay w.r.t varied
communication density
1 2
HYBRI 6 .033
MORS 6 .040
DCA 6 .050
VDF 6 .100
ROVER 6 .6167
Sig. .055 1.000
87
DMRT Based Result analysis
Table 6.9 shows the ANOVA and DMRT test results for E2E Parking Delay w.r.t varied
communication density with other existing algorithms. On observing the sigma value in Table
6.9(a) which is less than 0.05 represents that there exists a significant difference among the
algorithms. To find the homogenous group between the algorithms, DMRT test has been
performed as the Post-hoc analysis after ANOVA and the results are tabulated in Table 6.9 (b).
The result shows that there exist two groups are present in which the proposed HYBRID approach
and existing approaches MORS, DCF, VDA lies in the same group whereas ROVER exist in
different group.
Table 6.10 Statistical tests on performance of E2E Parking Delay w.r.t varied
communication density
ANOVA
of Squar
varied
88
ANOVA Based Result analysis
1 2
HYBRID 11 .721
MORS 11 .761
ROVER 11 .5373
VDA 11 .53
DCF 11 .44
Sig. .611 .264
Table 6.10 shows the ANOVA and DMRT test results of E2E Parking Delay w.r.t varied
communication density with other existing algorithms. On observing the sigma value in Table
6.10(a) which is less than 0.05 represents that there exists a significant difference among the
algorithms. To find the homogenous group between the algorithms, DMRT test has been
performed as the Post-hoc analysis after ANOVA and the results are tabulated in Table 6.10 (b)
in which the proposed HYBRID approach and existing approach MORS lies in the same group
whereas VDA, DCF and ROVER exist in different group.
89
Table 6.11 Statistical tests on performance of E2E Parking Delay w.r.t varied
communication density
ANOVA
of Squar
1 2
HYBRID 11 51.36
MORS 11 43.00
VDA 11 31.27
DCF 11 30.81
Sig. .132 .934
90
CHAPTER 11
CONCLUSION
In this paper, we proposed a new analytical model for the performance analysis and clustering
design in VANETs.
• Our model integrates SCRP protocol operations, Vehicle wireless channel conditions, and the
moving pattern of the vehicles. We also derived closed-form expressions for average packet
loss probability and throughput of a VANET cluster.
• Validated by extensive simulations, our model represents a new approach for the performance
study of VANET.
• In particular, we derived system measures that quantify the effects of cluster design criteria
on VANET performance.
• Such measures can be used to determine the suitable cluster size, typical network
Connectivity, and adequate data traffic control to achieve the desired system reliability and
network throughput.
• The proposed model and analysis provided guidelines for the design and management of
VANETs to maintain acceptable communication performance.
• In particular, we derived system measures that quantify the effects of cluster design criteria
on VANET performance.
• Such measures can be used to determine the suitable cluster size, typical network
Connectivity, and adequate data traffic control to achieve the desired system reliability and
network throughput.
• The proposed model and analysis provided guidelines for the design and management of
VANETs to maintain acceptable communication performance.
91
REFERENCE
• Amendment 6: Wireless Access in Vehicular Environment (Part 11: Wireless LAN medium
access control (MAC) and physical layer (PHY) specifications), IEEE Std 802.11p TM-2010,
Jun. 17, 2010.
provisionings over vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp.
3309–3323, Nov. 2007.
• Z. Wang, L. Liu, M. Zhou, and N. Ansari, “A position based clustering technique for ad hoc
intervehicle communication,” IEEE Trans. Syst., Man Cybern.—Part C: Appl. Rev., vol. 38, no.
2, pp. 201–208, Mar. 2008.
• Xu Wang; Jian Liu “Design and Implementation for Ambulance Route Search Based on the
Internet of Things” 2011 Third International Conference on Communications and Mobile
Computing
• Ashutosh Sharma; Rajiv Kumar “An optimal routing scheme for critical healthcare HTH
services — an IOT perspective” 2017 Fourth International Conference on Image Information
Processing (ICIIP) .
92
• Dipali B. Gaikwad; Yogesh W. Wanjari; K. V. Kale “Disaster management by integration of
web services with geospatial data mining” 2014 Annual IEEE India Conference
(INDICON)
• Amuleen Gulati; Gagangeet Singh Aujla; Neeraj Kumar; Sahil Garg; Georges Kaddoum
“Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in
COVID-Like Scenarios” IEEE Internet of Things Magazine ( Volume: 4, Issue: 3, September
2021)
APPENDIX
93