Beruflich Dokumente
Kultur Dokumente
Faculty of Engineering
Telecommunication Engineering Department
Graduation Project Report 1
I
Acknowledgment
First, we would like to thank God! Without Him, we wouldn't be where we are today.
We would like to express our gratitude for everyone who helped us during our
graduation project. Our supervisor Dr. Saed Tatapiah and all other amazing doctors.
Thanks for our families who were there for us every single time, our friend and
colleagues.
II
Table of Contents
Abstract .......................................................................................................................... 1
Chapter 1 : Introduction to VANET .............................................................................. 2
1.1: Ad hoc network and MANET ............................................................................. 2
1.2 What is VANET? ................................................................................................. 3
1.3: VANET Characteristics ...................................................................................... 4
1.4: VANET communication types ............................................................................ 5
1.4.1: Vehicle to Vehicle (V2V) ............................................................................. 5
1.4.2: Vehicle to Infrastructure (V2I) ..................................................................... 6
1.4.3: Hybrid ........................................................................................................... 8
1.5: VANETs Standards (Standards for Wireless Access in VANETs) .................... 8
1.5.1 Long Range Communications ....................................................................... 8
1.5.2 Medium Range Communications ................................................................ 10
1.5.3 Short Range Communication....................................................................... 15
Chapter 2 : Routing Protocol ....................................................................................... 18
2.1: Topology-based Ad-hoc Routing Protocols ...................................................... 19
2.1.1 On-Demand Distance Vector routing (AODV) ........................................... 19
2.1.2 The Optimized Link State Routing (OLSR) ................................................ 20
2.1.3 Destination-Sequenced Distance Vector (DSDV) ....................................... 20
2.1.4 Dynamic Source Routing Protocol (DSR)................................................... 21
2.2 Position-based Routing Protocol ........................................................................ 21
2.2.1 Greedy Perimeter Stateless Routing (GPSR) .............................................. 21
2.2.2 Distance Routing Effect Algorithm for Mobility (DREAM) ...................... 22
2.2.3 Reliability Improving Position-based Routing (RIPR) ............................... 22
2.2.4 Hybrid Location-based Ad-hoc Routing Protocol (HLAR) ........................ 22
2.3 Broadcast Routing Protocol ............................................................................... 23
2.3.1 BROADCOMM........................................................................................... 23
2.3.2 Distributed vehicular broadcast protocol (DV-CAST) ................................ 23
2.3.3 Edge-aware epidemic protocol (EAEP) ...................................................... 23
2.4 Cluster-based Routing Protocols ........................................................................ 24
2.4.1 Cluster Based Location Routing (CBLR) .................................................... 24
2.4.2 Cluster-Based Directional Routing Protocol (CBDRP) .............................. 24
2.4.3 Hierarchical Cluster Based Routing (HCB) ................................................ 24
2.5 Geocast Based Routing Protocol ........................................................................ 25
III
2.5.1 Location Based Multicast (LBM) ................................................................ 25
2.5.2 GeoGrid ....................................................................................................... 25
Chapter 3 Chapter 3: Network Simulator .................................................................... 26
3.1 What is NS3?...................................................................................................... 26
3.2 Advantages of ns3 .............................................................................................. 26
Chapter 4 NS3 simulation for VANET routing protocols performance evaluation .... 27
4.1 AODV Routing Protocol .................................................................................... 27
4.2 OLSR Routing Protocol ..................................................................................... 28
4.3 DSDV Routing Protocol..................................................................................... 28
4.4 DSR Routing Protocol........................................................................................ 28
4.5 GPSR Routing Protocol ..................................................................................... 29
4.6 NS3 Simulation results. ...................................................................................... 30
Chapter 5 Conclusion ................................................................................................... 34
References .................................................................................................................... 35
IV
List of Figures
Figure1 Mobile Ad-hoc Network (MANET) ........................................................................... 2
Figure2 : V2V Communication ................................................................................................. 5
Figure3 : V2I Communication................................................................................................... 7
Figure4 : VANET Communication types .................................................................................. 7
Figure5 : Hybrid Communication ............................................................................................. 8
Figure6 :Cellular Technology.................................................................................................... 8
Figure7 :WIMAX Technology .................................................................................................. 9
Figure8 : DSRC frequency allocation in the US ..................................................................... 10
Figure9 : Wireless Access in Vehicular Environments (WAVE), IEEE 1609, IEEE 802.11p
and the OSI Reference Model ................................................................................................. 12
Figure10 : WI-FI Technology ................................................................................................. 13
Figure11 : 802.11b Wi-Fi Technology ................................................................................... 14
Figure12 : 802.11a Wi-Fi Technology .................................................................................... 14
Figure13 : Wi-Fi and WiMAX in VANET ............................................................................. 14
Figure14 : Average throughput for AODV ............................................................................. 30
Figure15 : Overhead for AODV .............................................................................................. 31
Figure16 : NS3 Code to obtain Packet loss ............................................................................. 32
Figure17 : AODV Packet loss VS Number of nodes .............................................................. 33
Figure18 : Packet loss Vs Total time simulation ..................................................................... 33
V
Abbreviation
VANET: Vehicular Ad-hoc Network
MANET: Mobile Ad-hoc Network
GPS: Global positioning system
V2V: Vehicle to Vehicle
V2I: Vehicle to Infrastructure
RSU: Road side Unit
OBU: On-Board Unit
OBE: On-Board Equipment
DSRC: Dedicated Short-Range Communications
HMI: Human Machine Interface
WAVE: Wireless Access in Vehicular Environments
GSM: Global System for Mobile communications
FDMA: frequency division multiple access
TDMA: Time division multiple access
IEEE: Institute of Electrical and Electronics Engineers
WIMAX: Worldwide Interoperability for Microwave Access
DSL: Digital subscriber line
FCC: Federal Communications Commission
ASTM: American Society for Testing and Materials
CCH: Control channel
SCH: service channel
ARIB: Association of Radio Industries and Businesses
CEN: European Committee for Standardization
ASK: Amplitude Shift Keying
PSK: Phase Shift Keying
OFDM: Orthogonal Frequency Division Multiplexing
MAC: Media Access Control
IP: Internet Protocol
TCP: Transmission Control Protocol
VI
UDP: User Datagram Protocol
Wi-Fi: Wireless Fidelity
ISM: industrial, Scientific and Medical
PAN: personal Area Network
WSN: Wireless Sensor Network
QPSK: Quadrature Phase Shift Keying
VoIP: Voice Over IP
UWB: Ultra-Wide Band
WPAN: Wireless Personal Area Network
QoS: Quality of Service
DGPS: differential Global positioning System
AODV: Ad-hoc on-Demand Distance Vector Routing
OLSR: The Optimized Link State Routing
LAN: Local Area Network
MPR: Multi-point Relay
DSDV: Destination-Sequenced Distance Vector
RIP: Routing Information Protocol
DSR: Dynamic Source Routing Protocol
GPSR: Greedy Perimeter Stateless Routing
DREAM: Distance Routing Effect Algorithm for Mobility
LAR: Location Aided Routing
GLS: Grid Location Service
RIPR: Reliability Improving Position-based Routing
HLAR: Hybrid Location-based Ad-hoc Routing Protocol
DV-CAST: Distributed vehicular broadcast protocol
EAEP: Edge-aware epidemic protocol
CBLR: Cluster Based Location Routing
Cluster-Based Directional Routing Protocol
HCB: Hierarchical Cluster Based Routing
LBM: Location Based Multicast
VII
Abstract
The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars as
nodes in a network to create a mobile network. VANET has taken enormous attention
in the recent years so lot of research have been done for using VANETs in many
applications including accident prevention, real time safety alerts, improved navigation
system, media and entertainment in vehicles.
VANET is a sub form of Mobile Ad-Hoc Network (MANET) that provides
communication between vehicles and between vehicles and road-side base stations with
an aim of providing efficient and safe transportation.
A vehicle in VANET is considered to be an intelligent mobile node capable of
communicating with its neighbors and other vehicles in the network. It turns every
participating car into a wireless router or node, allowing cars approximately 100 to 300
meters of each other to connect and, in turn, create a network with a wide range.
VANET introduces more challenges aspects as compare to MANET because of high
mobility of nodes and fast topology changes. Researches have introduced many routing
protocols for VANET considering the major challenges involved using the network
simulator NS3
The existing routing protocols for VANET are not efficient to meet every traffic
scenarios. Thus, design of an efficient routing protocol has taken significant attention.
So, it is very necessary to identify the pros and cons of routing protocols which can be
used for further improvement or development of any new routing protocol. This project
presents VANET routing protocols for vehicle communication. Chapter 1 is
introduction to Ad hoc network and MANET in general, also introduces VANET, its
types, standards. Chapter 2 introduces different types of routing protocols. chapter 3 is
about the used network simulator NS3, and finally chapter 4 compares the performance
of the different routing protocols.
1
Chapter 1 : Introduction to VANET
1.1: Ad hoc network and MANET
An ad hoc network is a type of temporary computer-to-computer connection. In ad hoc
mode, you can set up a wireless connection directly to another computer without having
to connect to Wi-Fi or router. Many ad hoc networks are local area networks thus the
computers need to be within 100 meters of each other.
Ad hoc network is useful since files or other data are directly shared between computers
with no need for a centralized access point. More than one laptop can be connected to
the ad hoc network, as long as all of the adapter cards are configured for ad-hoc mode
and connect to the same SSID (service state identifier).but if the computer that sets up
the ad hoc network is disconnected, then all other connected users will disconnect.
MANET is a type of ad hoc network that can change locations and configure itself on
the fly. Because MANETS are mobile, they use wireless connections to connect to
various networks. This can be a standard Wi-Fi connection, or another medium, such
as a cellular or satellite transmission. MANET nodes are free to move randomly as the
network topology changes frequently. Each node behaves as a router as they forward
traffic to other specified node in the network.
2
1.2 What is VANET?
The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars as
nodes in a network to create a mobile network. VANET turns every participating car
into a wireless router or node, allowing cars approximately 100 to 300 meters of each
other to connect and, in turn, create a network with a wide range.
Earlier, drivers were using their voice, gestures, horns, and observation of each other’s
trajectory to manage their behavior and communicate between each other, but when the
number of vehicles increased, roads couldn't be managed by these traditional methods,
in the second half of the 19th century, traffic police took charge of controlling and
managing the traffic using hand signals, semaphores and colored lights. In 1930's and
1940's, the automation of traffic signals and car indicators were spread widely,
Variable-message signs were introduced in the 1960s to provide information to the
drivers to adapt according to the current circumstances. However, information that are
shared via all of these methods are very less and restricted.
Recently, drivers can exchange more information, such as traffic information and
directions, to each other via car phones or citizen band radio.
the concept of VANET came into limelight which has opened new possibilities to avail
the use of safety applications and the ability to contact over a wireless medium and
exchange useful information between vehicle and another. this information can be
categorized into four types of messages:
1. Emergency and warning messages:
Emergency messages can include any type of critical emergency such as
accidents, passing of ambulance, fire or police vehicles. Warnings regarding
repair on roads, traffic congestion come under the category of warning
messages.
2. Inter-personal messages:
Messages related to the profile of a driver and other passengers on the vehicle
come under this category.
3
A small network is created at the same moment with the vehicles and other devices
behaving as nodes in the network. Whatever information the nodes possess is
transferred to all other nodes. Similarly, all the nodes after transferring their set of data
receives the data being transmitted by other nodes. After accumulating all of such data,
nodes then work to generate useful information out of the data and then again transmit
the information to other devices, the communication between devices expands in such
as way where nodes are free to join and leave the network since it's an open network.
Car manufacturer these days are lunching cars with equipped on board sensors which
make it easy for the vehicle to easily join and merge in the network and leverage the
benefits of VANET.
One big difference between MANET and VANET is that MANET consists of nodes
that communicate with no central network and nodes are equipped with networking
capabilities, where nodes in VANET are free to enter or leave the network. That’s
require different routing protocols than MANETs.
3. Mobility modeling
A large section of vehicles follows a certain pattern to move which is generally
a function of traffic signals, speed limits, highways, streets, road conditions etc.
These patterns when observed help in the creation of routing protocols for
VANET
4
5. Onboard sensors
onboard sensors like GPS device helps for effective communication and
routing decisions, since the current position and nodes movement can be sensed
easily.
5
Disadvantages of V2V communication:
• Frequent topology partitioning due to high mobility.
• Problems in long range communication.
• Using traditional protocol is challenging.
• Problem in broadcasting messages in high traffic & environmental forces.
Applications of V2V
Applications are classified into 3 categories
a. Road safety applications
• Preventing collisions.
• Preventing obstacles, it can be fixed or mobile
• Distributing whether information
b. Driver assistance applications
• Helps in vehicle passing.
• Prevention of straight or carved lane exists
c. Comfort applications:
• Mobile access to the Internet.
• Electronic messaging.
• Inter-vehicle chat.
• Network games, etc.
6
Figure3 : V2I Communication
OBUs are vehicle side of V2I system. OBUs are logically composed of radio
transceiver (typically DSRC), a GPS system, an applications processor and
interfaces to vehicle systems and vehicle’s human machine interface (HMI)
communications network. OBUs provide communications between both
vehicles and RSUs and between the vehicles and other nearby vehicles. The
OBUs transmits status messages regularly to other OBUs to support safety
applications between vehicles. At intervals, the OBUs gather data to support
public applications. The OBUs will accommodate storage of many snapshots
of data, depending upon its memory and communications capacity. After some
period of time, the oldest data is overwritten. The OBUs also assemble vehicle
data together with GPS data as a series of snapshots for transmission to RSU.
RSUs located at intersections and other locations providing the interface to
vehicles within their range.
An RSU is composed of radio transceiver (DSRC or WAVE), an application
processor, and interface to V2I communications network. It also has a GPS unit
attached. Through an additional interface, it may support local infrastructure
safety applications. The RSU is connected to V2I communications network.
Using its interface to V2I communications network, it can send private data to
and from the OEMs. The RSU manage the prioritization of messages to and
from the vehicle. OBU also has priorities set within its applications and
prioritization must also be set within the RSU to ensure that available
bandwidth is not exceeded. Local and vehicle to vehicle safety applications
have highest priority, messages associated with various public and private
network applications have lower priority. Entertainment messages have lowest
priority.
7
1.4.3: Hybrid
This is combination of both V2V and V2I architectures. some of the vehicles
can communicate with each other directly while others may need some RSU to
communicate.
8
Cellular technology is what mobile phone networks are based on, and it’s the
technology that gave mobile phones the name “cell phones”. Cellular technology
basically refers to having many small interconnected transmitters as opposed to one big
one.
The other main concept of cellular technology was that they were “multiple access”,
meaning that they placed multiple voice or data connections into a single radio channel.
Global system for Mobile (GSM) uses both frequency division multiple access
(FDMA) and time division multiple access (TDMA) schemes. Two frequency bands
are available for GSM 890– 915 MHz for uplink and 935–960 MHz for downlink; these
frequency bands are divided into channels and the capacity of each channel is 200 kHz.
IEEE 802.11 standards can be applied to provide wireless connectivity; IEEE802.11a
works at 5GHz and provides a data rate of 54Mbps with a communication range of at
least 38m indoor and a 140m range for outdoor use. Another standard for IEEE 802.11
is IEEE 802.11g, which provides the same data rate and covers the same range as
IEEE802.11a but working at 2.4GHz.
The strengths of cellular communication include wide coverage, small mobile units,
low cost, high functionality, and the ability to integrate voice and data on the same
network.
9
1.5.2 Medium Range Communications
1.5.2.1 DSRC
Dedicated Short Range Communications (DSRC) is a short to medium range
communications service that was developed to support vehicle-to-vehicle and vehicle-
to-roadside communications. Such communications cover a wide range of applications,
including vehicle-to-vehicle safety messages, traffic information, toll collection, drive-
through payment, and several others. DSRC is aimed at providing high data transfers
and low communication latency in small communication zones. In 1999, the United
States Federal Communications Commission (FCC) allocated 75 MHz of spectrum at
5.9 MHz to be used by DSRC. In 2003, The American Society for Testing and Materials
(ASTM) approved the ASTM-DSRC standard which was based on the IEEE 802.11a
physical layer and 802.11 MAC layer. This standard was later published as ASTM
E2213-03. In February 2004, the report issued by the FCC established service and
licensing rules that govern the use of the DSRC band. DSRC is a free but licensed
spectrum. It is free since the FCC does not charge for usage of that spectrum but it is
licensed which means that it is more restricted in terms of its usage. For instance, the
FCC requires the use of specific channels and all radios developed should conform to
the standard. The DSRC spectrum is organized into 7 channels each of which is 10
MHz wide. One channel called the control channel (CCH) and it is restricted for safety
communications only while two other channels called the service channel (SCH) are
reserved for special purposes (such as critical safety of life and high-power public
safety). All the remaining channels are service channels which can be used for either
safety or non-safety applications. Safety applications are given higher priority over non-
safety applications to avoid their possible performance degradations and at the same
time save lives by warning drivers of imminent dangers or events to enable timely
corrective actions to be taken.
10
Table 1 compares recent regional standards for DSRC in Japan, Europe and USA:
Feature Japan Europe USA
(ARIB) (CEN) (ASTM)
Communication Half-duplex (OBU) / Half-duplex Half-duplex
Full-duplex (RSU)
Radio Frequency 5.8 GHz 5.8 GHZ band GHz band
Band 80 MHz bandwidth 20 MHz 75 MHz bandwidth
bandwidth
Channels Downlink: 7 4 7
Uplink: 7
Channel Separation Down/Uplink 5 MHz 10 MHz
1 or 4 MBits/s
Data Transmission Down/Up-link Down-link Down/Up-link 3-27
rate 1 or 4 MBits/s 500 Kbits/s Mbits/s
Up-lin 250 Kbits/s
1.5.2.2 WAVE
Wireless connectivity between moving vehicles can be provided by existing 802.11a
compliant devices with data rates of up to 54 Mbps being achieved with 802.11a
hardware. However, vehicular traffic scenarios have greater challenges than fixed
wireless networks, caused by varying driving speeds, traffic patterns, and driving
environments. Traditional IEEE 802.11 Media Access Control (MAC) operations
suffer from significant overheads when used in vehicular scenarios. For instance, to
ensure timely vehicular safety communications, fast data exchanges are required. In
these circumstances the scanning of channels for beacons from an access point along
with multiple handshakes required to establish communication are associated with too
much complexity and high overheads (for example, in the case of a vehicle
encountering another vehicle coming in the opposite direction, the duration for possible
communication between them is extremely short making it difficult to establish
11
communications). To address these challenging requirements of IEEE MAC
operations, the DSRC effort of the ASTM 2313 working group migrated to the IEEE
802.11 standard group which renamed the DSRC to IEEE 802.11p
Wireless Access in Vehicular Environments (WAVE). In contrast to the regional
standards of DSRC, by incorporating DSRC into IEEE 802.11, WAVE will become a
standard that can be universally adopted across the world. As illustrated in figure 9, it
is worth noting that IEEE 802.11p is limited by the scope of IEEE 802.11 which strictly
works at the media access control and physical layers. The operational functions and
complexity related to DSRC are handled by the upper layers of the IEEE 1609
standards. These standards define how applications that utilize WAVE will function in
the WAVE environment, based on the management activities defined in IEEE P1609.1,
the security protocols defined in IEEE P1609.2, and the network-layer protocol defined
in IEEE P1609.3. The IEEE 1609.4 resides above 802.11p and this standard supports
the operation of higher layers without the need to deal with the physical channel access
parameters.
Figure9 : Wireless Access in Vehicular Environments (WAVE), IEEE 1609, IEEE 802.11p and the OSI
Reference Model
12
1.5.2.3 Wi-Fi (Wireless Fidelity)
When you’re looking to buy new wireless networking gear or a mobile device, you’re
faced with an array of choices and abbreviations. Since Wi-Fi was first released to
consumers in 1997, its standards have been continually evolving – typically resulting
in faster speeds and further coverage. As capabilities are added to the original IEEE
802.11 standard, they become known by their amendment (802.11b, 802.11g, etc.).
• 802.11 b
802.11b uses the same 2.4 GHz frequency as the original 802.11 standard. It supports
a maximum theoretical rate of 11 Mbps and has a range up to 150 feet. 802.11b
components are cheap, but the standard has the slowest maximum speed of all the
802.11 standards. And since 802.11b operates in the 2.4 GHz, home appliances or other
2.4 GHz Wi-Fi networks can cause interference. Today, routers that only support
802.11n are no longer manufactured.
• 802.11 a
The ‘a’ amendment to the standard was released at the same time as 802.11b. It
introduced a more complex technique, known as OFDM (orthogonal frequency division
multiplexing) for generating the wireless signal. 802.11a offers a few advantages over
802.11b: it operates in the less crowded 5 GHz frequency band, making it less prone to
interference. And its bandwidth is much higher than 802.11b, with a theoretical max of
54 Mbps.
You probably haven’t encountered many 802.11a devices or routers. This is because
802.11b devices were cheaper and became more popular in the consumer market.
802.11a was mainly used in business applications.
13
• 802.11 g
The 802.11g standard uses the same OFDM technology introduced with 802.11a. Like
802.11a, it supports a maximum theoretical rate of 54 Mbps. But like 802.11b, it
operates in the crowded 2.4 GHz (and thus is subject to the same interference issues as
802.11b). 802.11g is backward compatible with 802.11b devices: an 802.11b device
can connect to an 802.11g access point (but at 802.11b speeds).
With 802.11g, consumers enjoyed a significant advance in Wi-Fi speeds and coverage.
At the same time, consumer wireless routers were getting better, with higher power and
better coverage than earlier generations.
14
1.5.3 Short Range Communication
1.5.3.1 BLUETOOTH
The ISM (industrial, Scientific and Medical) radio bands-based Bluetooth (IEEE
802.15.1) protocol is used to transfer data at the rate of up to 1 Mbps to 4 Mbps over a
distance of 10m. Bluetooth operates in the 2.4 GHz band and uses it uses Frequency
Hopping Spread Spectrum technique to overcome signal interference. Bluetooth
Version 3 can work on 6 GHz to 9 GHz frequency band, it uses 2.4 GHz band to
communicate with other devices. Bluetooth 4.0 uses low energy for transmission; it is
not compatible with earlier versions. It is predominantly used to create a Personal Area
Network (PAN). Bluetooth technology can be used to support both V2V and V2I
applications. As compared to other Wi-Fi standards, it requires low power. However, it
cannot be used to build safety applications because of slow transfer rate, short coverage
area and vulnerability to air inferences. It is not suitable for bandwidth intensive
infotainment applications such as VoIP and web browsing.
1.5.3.2 ZIGBEE
The ZigBee or ZigBee/IEEE 802.15.4 protocol is a specification created for wireless
networking. It includes hardware and software standard design for WSN (Wireless
sensor network) requiring high reliability, low cost, low power, scalability and low data
rate.
ZigBee uses the license-free 2.4 GHz band to transfer data at the rate of 250 Kbps up
to 70 meters. It also uses lower frequency bands 915 MHz (US) and 868 MHz (Europe)
to supports data transmission rates of 40 Kbps and 20 Kbps respectively. This
technology uses low powered radio signals to transfer data up to 100m using Offset
Quadrature Phase Shift Keying (O-QPSK) modulation. Since it uses low-power and
low-latency, it is widely used in PANs, remote controls, transport monitoring, and
sensor networks. It is simpler and cheaper than Wi-Fi and Bluetooth standards.
Moreover, it can support more mobile nodes simultaneously and has self-healing
capability. Like Bluetooth, it can be used to support V2V and V2I applications.
However, it is not suitable for bandwidth intensive infotainment applications such as
VoIP, web browsing. Bhargav et al used ZigBee to track the vehicular positional
coordinates during rescue missions of vehicular accidents.
15
1.5.3.3 Ultra-Wideband (UWB)
UWB is designed to replace cables with short-range, wireless connections, but it offers
much higher bandwidth needed to support huge amounts of data streams at very low
power levels.
IEEE 802.15.3 is the IEEE standard for high data rate (20Mbit/s or greater) Wireless
Personal Area Networks (WPAN) to provide Quality of Service (QoS) for real time
distribution of multimedia content. IEEE 802.15.3 is accomplished by the IEEE
P802.15.3 High Rate (HR) Task Group (TG3). The task group is charged with defining
a universal standard of ultra-wideband radios capable of high data rate over a distance
of 10 meters using the 3.1GHz to 10.6GHz band for TVs, cell phones, PCs, and so forth.
Besides a high data rate, the new standard will provide for low power, low cost solutions
addressing the needs of portable consumer digital imaging and multimedia
applications. In addition, ad hoc peer-to-peer networking, security issues are
considered. When combined with the 802.15.3 PAN standard, UWB will provide a very
compelling wireless multimedia network for the home.
In VANET, it can be used for collision avoidance. This standard and differential GPS
(DGPS) together were used to determine the relative position of a vehicle.
communication
tecchnology
Cellular
Wi-FiI Bluetooth
Technology
WAVE UWB
16
The following table summarizes the differences between the different technologies:
Cellular
technology 50 km High High 100-250 No Yes
17
Chapter 2 : Routing Protocol
History of VANET routing protocols starts from MANET protocols like Ad-hoc on-
Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR).
Vehicular Ad-hoc networks nodes are a dynamic nature and challenging for finding and
maintaining routes. In Vehicular Ad-hoc networks, different protocols were proposed
for routing and they provide routing the different messages for different purposes. In
Vehicular Ad-hoc networks there are different routing strategies have been defined
based on architecture and need of applications or scenarios. In VANET, the routing
protocols are categorized into five types: Topology, Position, broadcasting, Clustering,
and infrastructure routing protocol. These protocols are characterized based on area /
application where they are most suitable.
The all MANET protocols are not useful in VANET but various types of protocols used
in VANET.
Routing
Protocols
DSDV EAEP
RIPR
HCB
DSR GLS
18
2.1: Topology-based Ad-hoc Routing Protocols
Topology based routing protocols use link’s information within the network to send the
data packets from source to destination. Topology based routing approach can be
further categorized into proactive (table driven) and reactive (on-demand) routing.
Proactive routing protocols are mostly based on shortest path algorithms. They keep
information of all connected nodes in form of tables because these protocols are table
based. Furthermore, these tables are also shared with their neighbors. Whenever any
change occurs in network topology, every node updates its routing table.
Pros
• To update routing table not require periodic flooding the network. Flooding
requires when it is demanded.
• Beaconless so it saves the bandwidth.
Cons
19
In AODV, networks are silent until connections are established. Network nodes that
need connections broadcast a request for connection. The remaining AODV nodes
forward the message and record the node that requested a connection. Thus, they create
a series of temporary routes back to the requesting node.
A node that receives such messages and holds a route to a desired node sends a
backward message through temporary routes to the requesting node. The node that
initiated the request uses the route containing the least number of hops through other
nodes. The entries that are not used in routing tables are recycled after some time. If a
link fails, the routing error is passed back to the transmitting node and the process is
repeated.
20
2.1.4 Dynamic Source Routing Protocol (DSR)
In Dynamic Source Routing, each source determines the route to be used in transmitting
its packets to selected destinations. There are two main components, called Route
Discovery and Route Maintenance. Route Discovery determines the optimum path for
a transmission between a given source and destination. Route Maintenance ensures that
the transmission path remains optimum and loop-free as network conditions change,
even if this requires changing the route during a transmission.
21
above obtained geographic information and send to the destination node in accordance
with greedy forwarding method or perimeter forwarding method.
22
reached. Since the intermediate node does not have backward link to the source node,
HLAR does not ensure if a reliable route exists.
2.3.1 BROADCOMM
BROADCOMM is based on dividing the region into cells. After that, a cell reflector is
selected by the cell members. Consequently, the cell reflector will be responsible for
collecting messages from neighbors. In other words, the cell reflector will be acting as
a base station for all other nodes within the cell. Therefore, a cell reflector will forward
messages to other vehicles in the cell.
23
messages to its new neighbors or its neighbors have missed some messages. EAEP
overcomes the simple flooding problem but it incurs high delay of data dissemination.
24
2.5 Geocast Based Routing Protocol
Geocasting is the delivery of a message to nodes within a geographical region. With
geocast, new services and applications are feasible, such as finding friends who are
nearby, geographic advertising, and accident or wrong-way driver warning on a
motorway.
The protocols mainly differ in whether they are based on flooding, directed flooding,
or on routing without flooding, and whether they are suitable for ad hoc networks or for
infrastructure networks. LBM and Geogrid are examples of geocast-based routing
protocol.
2.5.2 GeoGrid
In Geogrid, the network is divided into a set of geographic regions and a representative
node is chosen in each region. Then, the protocol operates similar to LBM and data
packets are relayed from all the representative nodes which are located within a
forwarding zone defined as the smallest rectangle that contains the source and the
intended geocast destination.
25
Chapter 3 Chapter 3: Network Simulator
26
Chapter 4 NS3 simulation for VANET routing protocols
performance evaluation
The results obtained from NS3 program, which allows to run vehicular ad hoc network
(VANET) simulation scenarios to assess performance are presented in this chapter.
NS3 allows many parameters to be modified and includes predefined scenario. By
default, the scenario runs for 10 simulated seconds with 40 nodes (i.e. vehicles) moving
according to Random Way point Mobility Model with a speed of 20 m/s and no pause
time within a 300x1500 m region. The Wi-Fi is 802.11p with continuous access to a
10 MHz Control Channel (CH) for all traffic. All nodes transmit a 200-byte safety
message 10 times per second at 6 Mbps.
Additionally, all nodes (optionally) attempt to continuously route 64-byte packets at
an application rate of 2.048 Kbps to one of 10 other nodes, selected as sink nodes. The
default routing protocol is AODV and the Two-Ray Ground loss model is used. The
transmit power is set to 20 dBm and the transmission range for safety message packet
delivery is 145 m.
Other topology-based routing protocols were performed and the results were obtained,
these protocols include OLSR, DSDV, DSR and the default routing protocol AODV.
After studying the previously mentioned routing protocol, it was obtained that each
protocol has its positive and negative performance characteristic, all the results will be
explained in the following parts.
27
4.2 OLSR Routing Protocol
In this, whenever any change in the topology occur, MPR (multipoint relay) are
responsible to generate and forward the topology information to selected nodes
OLSR is well suited for high way density network and in broadcast scenario, it reduces
the number of retransmission of packets.
But the main negative feature of OLSR is that it require a large amount of bandwidth
and CPU Power to compute the optimal path, OLSR requires a routing table for all
possible routes and that would lead to overhead and constrains scalability.
IN DSDV, it provides loop free routing protocol and it require no route discovery since its
already stored in background.
28
4.5 GPSR Routing Protocol
In this protocol, as explained, each node has information about its current geographic
position and also the neighboring nodes position. It forwards the packet to nearest
node toward destination. It is also known as greedy algorithm because it follows the
nearest path to forward packet from Source to destination. In this, it first uses the
greedy algorithm to forward the packet if it does not work then it uses perimeter
forwarding.
GPSR is considered to be suitable for highways, also a node needs to remember only
one hop neighbor location in order to forward the packet. Knowing that forwarding a
packet decision are made dynamically.
GPSR has some unfavorable property such as it doesn’t operate well in a city
environment where radio obstacle involves very much, also If GPS fail, the GPSR
can't perform.
29
4.6 NS3 Simulation results.
For NS3, AODV routing protocol was simulated since it has many features to be
chosen.
30
2. Overhead
Data that is sent across a wireless network is housed in a data envelope (packet) Each
transmission includes additional information, called overhead, that is required to route
the data to the proper location. Network overhead can be calculated by sending a
fixed-size data transmission across the network and observing the number of extra
bytes of data transmitted for the action to be completed.
31
3. Packet loss
Packet Loss is the ratio of the number of packets that never reached the destination to
the number of packets originated by the source. Mathematically it can be shown as the
following equation
𝑁 𝑆𝑒𝑛𝑡 𝑃𝑎𝑐𝑘𝑒𝑡𝑠−𝑁 𝑅𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑃𝑎𝑐𝑘𝑒𝑡𝑠
𝑃𝐿 = 𝑁 𝑆𝑒𝑛𝑡 𝑃𝑎𝑐𝑘𝑒𝑡𝑠
Packet Loss for AODV could be obtained using NS3 simulator by the following piece
of code:
32
The following figures represents the results:
33
Chapter 5 Conclusion
The main goal of this project was to study the routing protocols proposed for VANET.
It provides a review of several traditional routing protocols devised for use in VANET,
the proactive and reactive protocols have inherent supposition of network connectivity.
Disconnection and discovery of new nodes is ignored hence these protocols are not well
suited for VANET. Several improved versions of the traditional routing protocols like
AODV and OLSR protocols are proposed for improving their performance.
Research is being carried out for designing protocols and algorithms that can perfectly
fit in the characteristics of VANET. The main limitation of many protocols is long time
delay and the number of retransmissions. It has been found that position-based routing
are most promising for data dissemination in VANET.
The study shows that a routing protocol works well only in a particular scenario like
city, urban environment etc. There is no universal protocol which is suitable for all
VANET’s application scenario. A specific routing protocol is needed to satisfy the
requirements of a particular VANET application, which is a difficult task.
Future work
In future, work needs to be done to generalize algorithms to fit in different scenarios.
Instead of designing new protocols, a protocol should be able to adapt to the abrupt
changes in network and diverse mobility patterns. Work can also be done for making
routing more secure as privacy is a major issue in VANET’s.
34
References
35
• VANET Routing Protocols and Architectures: An Overview Anas Abu Taleb
Department of Computer Science, King Hussein School of Computing
Sciences, Princess Sumaya University for Technology, P. O. Box 1438, Al-
Jubaiha, Amman 11941, Jordan
• A Survey of Geocast Routing Protocols. Available from:
https://www.researchgate.net/publication/224085111_A_Survey_of_Geocast_
Routing_Protocols
• Broadcasting Routing Protocols in VANET Uma Nagaraj, Poonam Dhamal
Pune University, Alandi, Pune India
• Inter-Vehicle Wireless Communications Technologies, Issues and Challenges
S. Habib, M.A. Hannan, M.S. Javadi, S.A. Samad, A.M. Muad and A. Hussain
36