首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this article, we utilize the idea of multipoint relays (MPRs) found in literature (Jacquet et al. in Proceedings of IEEE INMIC, 2001), to propagate accident information in a restricted way (e.g., only backwards). We devise an algorithm to identify MPRs that are geographically situated behind a particular node using only its neighbor table, and speed information of the neighboring vehicles. With the identification of the backward MPRs, it is possible to restrict the information dissemination to vehicles behind a particular vehicular ad-hoc network (VANET) node only. This might benefit the approaching vehicles so that the driver could take preventive measures in real-time since he/she will have an indication of the severity of road conditions ahead. We assume that there exists an inter vehicular network using optimized link state routing (OLSR) where accident information can be propagated to all nodes using on-going OLSR control packets. We envision our application will run on top of existing routing protocols (e.g., OLSR), thereby resulting in very little integration effort, and retaining OLSR’s reduced network traffic advantage through the use of MPRs. We analyze our back MPR identification algorithm in a detailed manner. We also show that by using our approach the location of the accident alert instigator node could be pinpointed if a subset of the nodes in the same VANET know their geographical positions. We use VANET mobility models generated by SUMO into NS-3 for our simulations, and also perform preliminary experiments to verify the algorithm’s effectiveness. Our analysis and experiments show favorable results.  相似文献   

2.
Network coding is an effective way to achieve the maximum flow of multicast networks. In this letter, we focus on the statistical properties of the maximum flow or the capacity of network coding for ad-hoc networks based on random graph models. Theoretical analysis shows that the maximum flow can be modelled as extreme order statistics of Gaussian distribution for both wired and wireless ad-hoc networks as the node number is relatively large under a certain condition. We also investigate the effects of the nodes' covering capabilities on the capacity of network coding.  相似文献   

3.
This paper proposes a novel adaptive time division multiple access (TDMA) slot assignment protocol (ATSA) for vehicular ad-hoc networks. ATSA divides different sets of time slots according to vehicles moving in opposite directions. When a node accesses the networks, it choices a frame length and competes a slot based on its direction and location to communication with the other nodes. Based on the binary tree algorithm, the frame length is dynamically doubled or shortened, and the ratio of two slot sets is adjusted to decrease the probability of transmission collisions. The theoretical analysis proves ATSA protocol can reduce the time delay at least 20% than the media access control protocol for vehicular ad-hoc networks (VeMAC) and 30% than the ad-hoc. The simulation experiment shows that ATSA has a good scalability and the collisions would be reduced about 50% than VeMAC, channel utilization is significantly improved than several existing protocols.  相似文献   

4.
In vehicular networks, efficient safety information dissemination is a crucial issue. Unique characteristics of such an environment like highly mobility, fast topology changing, short-lived and intermittent connectivity pose challenges for safety information dissemination. Although IEEE 802.11p is standardized as an amendment to the IEEE 802.11 for connection-based wireless communication in vehicular environments (WAVE), it is still an open topic and a challenge to efficiently handle high mobility, intermittent connectivity, and spontaneous characteristics of vehicles on the roadway during wireless communication. This paper exploits information centric networking approach to design an efficient information dissemination protocol for such a challenging environment. The protocol is designed for both communication schemes in vehicular networks including vehicles-to-vehicles and vehicle-to-road. By focusing on information object itself, instead of end-to-end connection, the proposed mechanism supports fast and efficient data dissemination among multiple content consumers and multiple content providers, removing dependence on end-to-end connection between two nodes, thus improve the overall network performance. Through experimental results over different scenarios, we show that the proposed protocol achieves a significant improvement in term of the network performance compared to the conventional approach (WAVE).  相似文献   

5.
A survey on real-world implementations of mobile ad-hoc networks   总被引:1,自引:0,他引:1  
Wolfgang  Martin 《Ad hoc Networks》2007,5(3):324-339
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simplification of real-world properties such as radio characteristics or node mobility. It has been shown that this may lead to results and conclusions which do not reflect the behavior of ad-hoc networks in the real world. Various prototype implementations demonstrate that even simple protocols such as flooding do not behave as it was predicted by earlier simulation. To overcome this problem, real-world experiments are required. In this paper, we present a survey on existing real-world implementations of mobile ad-hoc networks. We report on the technology used for the implementations as well as on key findings from experiments conducted with these implementations.  相似文献   

6.
Vehicular networks are popular in recent years to provide low cost communication medium during mobility. Vehicular Delay Tolerant Networks (DTNs) are one of the major categories of emerging technology. DTNs work on carry and forward mechanism to deliver data to the destination. The network performance gets severely affected due to reluctance shown by selfish nodes where few nodes show no interest in forwarding others data due to lack of any personal profit. The proposed mechanism is based on coalition game theory and discusses about incentive based mechanism which provides incentive to nodes which are forwarding data to forward to destination and motivates other vehicles in the network to participate in coalition to forward data. This scheme not only encourages other selfish nodes to forward their private data and other nodes’ public data as early as possible to destination but also increases reliability in the network as more nodes show their interest in selected routing protocol. The proposed scheme outperforms in overall benefit earned by individual node and whole coalition, and increases mutual cooperation which improves availability of data in the network.  相似文献   

7.
Vehicular Ad-Hoc Networks (VANETs) enable inter vehicle wireless communication as well as communication with road side equipment. Warning messages can be exchanged among nearby vehicles, helping to predict dangerous situations, and thus improving road safety. Such safety messages require fast delivery and minimal delay to local areas, in order for them to be effective. Therefore, a fast and efficient channel access scheme is required. A feasible solution, derived from the Mobile Ad-Hoc Networks (MANETs) field, groups nodes into smaller manageable sections called clusters. Such an approach can be beneficial for locally delivering messages under strict time constraints. In this paper, a Hierarchical Clustering Algorithm (HCA) is presented. HCA is a distributed randomized algorithm, which manages channel access by forming three hierarchy clusters. The proposed channel access scheme enables delay bounded reliable communication. Unlike other common clustering algorithm for VANETs, HCA does not require the knowledge of the vehicles’ locations. This feature guarantees accurate operation even when localization systems such as GPS are not available. The running time and message complexity were analyzed and simulated. Simulation results show that the algorithm behaves well especially under realistic mobility patterns; therefore, it is a suitable solution for channel access scheme for VANETs.  相似文献   

8.
9.
The recent breakthroughs in the automobile industries and telecommunication technologies along with the exceptional multimodal mobility services brought focus on intelligent transportation system (ITS), of which vehicular ad hoc networks (VANETs) gain much more attention. The distinctive features of software‐defined networking (SDN) leverages the vehicular networks by its state of the centralized art having a comprehensive view of the network. Its potential to bring the flexibility, programmability and other extensive advancements to vehicular networks has set the stage for a novel networking paradigm termed as software‐defined vehicular networks (SDVNs). Many researchers have demonstrated the SDN‐based VANETs with the various configuration of the SDN components in VANET architecture. However, a compilation of the work on the SDN‐based VANET system as a whole, incorporating its architecture, use‐cases, and opportunities, is still inadequate. We start with the summary of the recent studies that exist on the SDVNs, followed by the comprehensive explanation of its components. Next, we present the taxonomy of SDVN based on the architecture modes, protocols, access technologies, and opportunities with trending technologies. Finally, we highlight the challenges, open research issues, and future research directions.  相似文献   

10.
Vehicular ad-hoc network (VANET) is becoming a promising technology for improving the efficiency and the safety of intelligent transportation systems by deploying a wide variety of applications. Smart vehicles are expected to continuously exchange a huge amount of data either through safety or non-safety messages dedicated for road safety or infotainment and passenger comfort applications, respectively. One of the main challenges posed by the study of VANET is the data dissemination design by which messages have to be efficiently disseminated in a high vehicular speed, intermittent connectivity, and highly dynamic topology. In particular, broadcast mechanism should guarantee fast and reliable data delivery within a limited wireless bandwidth in order to fit the real time applications’ requirements. In this work, we propose a simple and efficient adaptive data dissemination protocol called “SEAD”. On the one hand, the originality of this work lies in its simplicity and efficiency regardless the application’s type. Simplicity is achieved through a beaconless strategy adopted to take into account the surrounding vehicles’ density. Thanks to a metric locally measured, each vehicle is able to dynamically define an appropriate probability of rebroadcast to mitigate the broadcast storm problem. Efficiency is manifested by reducing excessive retransmitted messages and hence promoting the network capacity and the transmission delay. The simulation results show that the proposed protocol offers very low packet drop ratio and network load while still maintaining a low end-to-end delay and a high packet delivery. On the other hand, SEAD protocol presents a robust data dissemination mechanism which is suitable either for safety applications or for other kinds of application. This mechanism is able to adapt the protocol performance in terms of packet delivery ratio to the application’s requirements.  相似文献   

11.
In wireless ad-hoc networks, users cooperate to transmit each others' messages. To some extent terminals therefore collectively act as an antenna array and create a virtual or distributed multiple-input multiple-output (MIMO) system. In order to mitigate interference at receivers, the dirty paper coding (DPC) schemes for various relaying schemes have become very important. In contrast to the conventional scheme that designs the reconstructed signal using DPC technique for each terminal, respectively, we propose a new scheme called joint dirty paper coding for decode-and-forward (DF) cooperative networks. The transmitter forms the reconstructed signal sequence based on its own signal and its partner's signal in terms of DPC technique. The precoding functions of transmitters are considered together, and interference is canceled at the receiver during the superposition of two signal sequences from the transmitter and its partner. The corresponding numerical results prove that, the gap between our proposed scheme and the perfect system without interference can be quite small. The proposed scheme can lead to a superior performance in the sense of frame error rate (FER), which improves as the power allocation ratio increases.  相似文献   

12.
13.
Recent advances in vehicular networks have enforced researchers to focus on various information dissemination techniques. Exchanging information among the vehicles is imperative due to the ever-changing network topology in vehicular networks. However, random transmitter selection in traditional CSMA based channel access mechanism limits the delay performance. Data, such as state information, is often time critical, and hence, efficient information dissemination techniques to improve delay performance are essential. In this work, we aim to minimize the average system age which is the mean number of time slots old a vehicle’s information is at all other vehicles in the network. To achieve this, we explore the benefits of simultaneous transmission along with piggybacking of information for multi-hop communication. While allowing simultaneous transmission guarantees faster dissemination of information, piggybacking facilitates dissemination of more information per transmission, thereby keeping the network more updated. We have also analysed the relationship between piggybacked information and number of vehicles in the network. Simulation results show improvement in network performance. Our analytical results are in good agreement with the simulation results.  相似文献   

14.
Ad-hoc networks suffer from the problem of hidden nodes (terminals), which leads to severe degradation of network throughput. This survey gives a comprehensive overview of Medium Access Control (MAC) protocols which directly or indirectly address this problem. The presented protocols are grouped in several categories and are described in the order of their publication date. To give the reader a deep understanding of the progress made in the area of alleviating the hidden node problem a brief summary of the key ideas as well as a detailed comparison of different protocols are presented. Open research directions are also discussed to serve as a starting point for future protocol design and evaluation.  相似文献   

15.
Network coding (NC) for wireless local area network has received a lot of attention from researchers. It replaces the traditional methods of video erasure protection. The principal of NC is to combine several packets together before their transmission. Thus, NC is able to provide higher throughput, reliability and efficient transmission. Up to now, many works have been done to ensure the advantages and the robustness of NC against the packet loss and link failures. The performance gains of NC are successfully processed not only for data to increase throughput, but also for video streaming over wireless networks. In this context, this paper surveys and discusses the most popular approaches based on NC of both data and video transmission over wireless network (static or dynamic). Strength and limitations for robust video streaming and data transmission are deeply discussed.  相似文献   

16.
With the increase in user mobility the most challenging issues are data scheduling which premises its users high quality of service in the context of the interoperability for microwave access in WiMAX for vehicular ad-hoc network (VANET). There is no complete proof of existing techniques accessible to provide better quality as there is a starvation problem due to the uncertainty in decision process with imprecise data. In VANET for the sake of interest while vehicles started increasing more and more in network traffic this paper devised a two stage Optimized priority scheduling scheme known as Evolving Intuitionistic Fuzzy Priority Classifier with Bio-inspiration Based Scheduling Scheme. This work takes into account the hesitation degree of each factor for priority and the bio-inspiration based classification. Through our simulation, it is shown that the projected proposal can work to acclimatize and make competent to improve the existing VANET approaches in terms of high spectrum effectiveness and low outage probability.  相似文献   

17.
Several wireless network coding schemes apply either inter-flow traffic or intra-flow traffic, but not both. This paper proposes a novel batched network coding scheme to deal with both inter-flow and intra-flow traffics, which attempts to combine the advantages of both network coding approaches. Based on the idea in the well-known network coding scheme COPE, our batched network coding scheme allows each node to make use of intra-flow network coding technique to improve the transmission reliability in a lossy environment, consequently obtaining higher throughput. Moreover, we also utilize the multiple-path transmitting scheme to further increase the throughput of wireless networks with low link delivery probability. Finally, using a simplified network topology model, we show theoretically that our proposed scheme outperforms COPE significantly, particularly when the link quality is low.  相似文献   

18.
In order to avoid transmission collisions in mobile ad hoc networks (MANETs), a reliable and efficient medium access control (MAC) protocol is needed. Vehicular MANETs (VANETs) have vehicles as network nodes and their main characteristics are high mobility and speed. Active safety applications for VANETs need to establish reliable communications with minimal transmission collisions. Only few MAC protocols designed for MANETs can be adapted to efficiently work in VANETs. In this article we provide a short overview on some MANET MAC protocols, and then we summarize and qualitatively compare the ones suited for VANETs  相似文献   

19.
In this paper, we investigate a hybrid network coding technique to be used at a wireless base station (BS) or access point (AP) to increase the throughput efficiency of single-hop wireless networks. Traditionally, to provide reliability, lost packets from different flows (applications) are retransmitted separately, leading to inefficient use of wireless bandwidth. Using the proposed hybrid network coding approach, the BS encodes these lost packets, possibly from different flows together before broadcasting them to all wireless users. In this way, multiple wireless receivers can recover their lost packets simultaneously with a single transmission from the BS. Furthermore, simulations and theoretical analysis showed that when used in conjunction with an appropriate channel coding technique under typical channel conditions, this approach can increase the throughput efficiency up to 3.5 times over the automatic repeat request (ARQ), and up to 1.5 times over the HARQ techniques.  相似文献   

20.
Consider transmitting a set of information sources through a communication network that consists of a number of nodes. Between certain pair of nodes, there exist communication channels on which information can be transmitted. At a node, one or more information sources may be generated, and each of them is multicast to a set of destination nodes on the network. In this paper, we study the problem of under what conditions a set of mutually independent information sources can be faithfully transmitted through a communication network, for which the connectivity among the nodes and the multicast requirements of the source information are arbitrary except that the connectivity does not form directed cycles. We obtain inner and outer bounds on the zero-error admissible coding rate region in term of the regions /spl Gamma//sub N//sup */ and /spl Gamma/~/sub N//sup */, which are fundamental regions in the entropy space defined by Yeung. The results in this paper can be regarded as zero-error network coding theorems for acyclic communication networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号