SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

                  Broadcasting Routing Protocols in VANET
                                        Uma Nagaraj,      Poonam Dhamal
                                       Pune University, Alandi, Pune India
                                       E-mail: umanagaraj67@gmail.com
Abstract
Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a
distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET
is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the
applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind
the designed, and traces the evolution of these routing protocols. This paper discusses the main 5 types of
protocols for VANET Topology Based, Positioned Based, Geo Cast, Broad Cast, and Cluster Based
Protocols. It also discusses the types of Broadcast Protocols like multi hop and reliable broadcast protocols.

Keywords: VANET, ITS, MANET, UMB, DV-CAST.


1. Introduction
Vehicular ad hoc network is a special form of MANET which is a vehicle to vehicle & vehicle roadside
wireless communication network. It is autonomous & self-organizing wireless communication network,
where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.
The network architecture of VANET can be classified into three categories: pure cellular/WLAN, pure ad
hoc, and hybrid [1]. Due to new technology it has taken huge attention from government, academy &
industry. There are many research projects around the world which are related with VANET such as
COMCAR [2], DRIVE [3], FleetNet [4] and NoW (Network on Wheels) [5], CarTALK 2000 [6], CarNet
[7]. There are several VANET applications such as Vehicle collision warning, Security distance warning,
Driver assistance, Cooperative driving, Cooperative cruise control, Dissemination of road information,
Internet access, Map location, Automatic parking, Driverless vehicles.



2. Routing Protocols
In VANET, the routing protocols are classified into five categories: Topology based routing protocol,
Position based routing protocol, Cluster based routing protocol, Geo cast routing protocol and Broadcast
routing protocol. These protocols are characterized on the basis of area / application where they are most
suitable.

2.1. Topology Based Routing Protocols

These routing protocols use links information that exists in the network to perform packet forwarding. They
are further divided into Proactive, Reactive & Hybrid Protocols.

2.1.1 Proactive routing protocols


                                                     13
Network and Complex Systems                                                                             www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

The proactive routing means that the routing information like next forwarding hope is maintained in the
background irrespective of communication requests. The packets are constantly broadcast and flooded
among nodes to maintain the path, then a table is constructed within a node which indicates next hop node
towards a destination. The advantage of proactive routing protocols is that there is no route discovery is
required since the destination route is stored in the background, but the disadvantage of this protocol is that
it provides low latency for real time application, it also leads to the maintenance of unused data paths,
which causes the reduction in the available bandwidth. The proactive protocol is also known as table driven
routing protocol. These protocols work by periodically exchanging the knowledge of topology among all
the nodes of the network.




                                      Figure-1 Routing Protocols for VANET

2.1.2 Reactive/Ad hoc based routing
Reactive routing opens the route only when it is necessary for a node to communicate with each other.
Reactive routing consists of route discovery phase in which the query packets are flooded into the network
for the path search and this phase completes when route is found. These protocols are called as on-demand
routing protocols as they periodically update the routing table, when some data is there to send. But these protocols use
flooding process for route discovery, which causes more routing overhead and also suffer from the initial route
discovery process, which make them unsuitable for safety applications in VANET.
2.1.3 Hybrid Protocols:
The hybrid protocols are introduced to reduce the control overhead of proactive routing protocols and
decrease the initial route discovery delay in reactive routing protocols.


2.2. Position Based Routing Protocols
Position based routing consists of class of routing algorithm. They share the property of using geographic
positioning information in order to select the next forwarding hops. The packet is send without any map
knowledge to the one hop neighbor which is closest to destination. Position based routing is beneficial
since no global route from source node to destination node need to be created and maintained. Position

                                                          14
Network and Complex Systems                                                                        www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

based routing is broadly divided in two types: Position based greedy V2V protocols, Delay Tolerant
Protocols.


2.3. Cluster Based Routing Protocols
In Cluster-based routing protocols vehicles near to each other form a cluster. Each cluster has one
cluster-head, which is responsible for intra and inter-cluster management functions. Intra-cluster nodes
communicate each other using direct links, whereas inter-cluster communication is performed via cluster
headers. In cluster based routing protocols the formation of clusters and the selection of the cluster-head is
an important issue. In VANET due to high mobility dynamic cluster formation is a towering process.


2.4. Geo Cast Routing Protocols
Geocast routing is basically a location based multicast routing. Its objective is to deliver the packet from
source node to all other nodes within a specified geographical region (Zone of Relevance ZOR). In Geocast
routing vehicles outside the ZOR are not alerted to avoid unnecessary hasty reaction. Geocast is considered
as a multicast service within a specific geographic region. It normally defines a forwarding zone where it
directs the flooding of packets in order to reduce message overhead and network congestion caused by
simply flooding packets everywhere. In the destination zone, unicast routing can be used to forward the
packet. One pitfall of Geocast is network partitioning and also unfavorable neighbors which may hinder the
proper forwarding of messages. These protocols are used to send a message to all vehicles in a pre-defined
geographical region.


2.5. Broadcast Based Routing Protocols
Broadcast routing is frequently used in VANET for sharing, traffic, weather and emergency, road
conditions among vehicles and delivering advertisements and announcements. Broadcasting is used when
message needs to b disseminated to the vehicle beyond the transmission range i.e multi hops are used.
Broadcast sends a packet to all nodes in the network, typically using flooding. This ensures the delivery of
the packet but bandwidth is wasted and nodes receive duplicates. In VANET, it performs better for a small
number of nodes. The various Broadcast routing protocols are BROADCOMM, UMB, V-TRADE,
DV-CAST, EAEP, SRB, PBSM, PGB, DECA and POCA.
2.5.1 BROADCOMM: [8]
BROADCOMM is based on hierarchal structure for highway network. In BRAODCOMM the highway is
divided into virtual cells which move like vehicles. The nodes in the highway are organized into two level
of hierarchy: the first Level includes all the nodes in a cell, the second level is represented by cell reflectors,
which are few nodes located closed to geographical centre of cell. Cell reflected behaves for certain interval
of time as cluster head and handles the emergency messages coming from same members of the cell or
nearby neighbor. This protocol performs similar to flooding base routing protocols for message
broadcasting and routing overhead.
2.5.2 UMB :     Urban Multihop Broadcast Protocol [9]
UMB is designed to overcome the interference, packet collision and hidden node problems during message
distribution in multi hop broadcast. In UMB the sender node tries to select the furthest node in the

                                                        15
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

broadcast direction for forwarding and acknowledging the packet without any prior topology information.
UMB protocol performs with much success at higher packet loads and vehicle traffic densities.
2.5.3 V-TRADE : Vector Based Tracing Detection [10]
It is a GPS based message broadcasting protocols. The basic idea is similar to unicast routing protocols
Zone Routing Protocol (ZRP). V-TRADE classifies the neighbors into different forwarding groups
depending upon position and movement information. For each group only a small subset of vehicles is
selected to rebroadcast the message. V-TRADE improves the bandwidth utilization but some routing
overheads are associated with selecting the next forwarding node in every hop.
2.5.4 DV-CAST: Distributed vehicular broadcast protocol [11]
It uses local topology information by using the periodic hello messages for broadcasting the information.
Each vehicle uses a flag variable to check whether the packet is redundant or not. This protocol divides the
vehicles into three types depending on the local connectivity as well connected, sparsely connected, totally
disconnected neighborhood. In well connected neighborhood it uses persistence scheme (weighted p
persistence, slotted 1and p persistence). In sparsely connected neighborhood after receiving the broadcast
message, vehicles can immediately rebroadcast with vehicles moving in the same direction. In totally
disconnected neighborhood vehicles are used to store the broadcast message until another vehicle enters
into transmission range, otherwise if the time expires it will discard the packet. This protocol causes high
control overhead and delay in end to end data transfer.
2.5.5. EAEP: Edge-aware epidemic protocol [12]
It is reliable, bandwidth efficient information dissemination based highly dynamic VANET protocol. It
reduces control packet overhead by eliminating exchange of additional hello packets for message transfer
between different clusters of vehicles and eases cluster maintenance. Each vehicle piggybacks its own
geographical position to broadcast messages to eliminate beacon messages. Upon receiving a new
rebroadcast message, EAEP uses number of transmission from front nodes and back nodes in a given
period of time to calculate the probability for making decision whether nodes will rebroadcast the message
or not. But EAEP does not address the intermittent connectivity issue. Specifically, a node does not know
whether it has missed any messages to its new neighbors or its neighbors have missed some messages.
EAEP overcomes the simple flooding problem but it incurs high delay of data dissemination.
2.5.6 SRB: Secure Ring Broadcasting [13]
It is to minimize number of retransmission messages and to get more stable routes. It classifies nodes into
three groups based on their receiving power as Inner Nodes (close to sending node), Outer Nodes (far away
from sending node), Secure Ring Nodes (preferable distance from sending node). It restricts rebroadcasting
to only secure ring nodes to minimize number of retransmissions.
2.5.7 PBSM: Parameter less broadcasting in static to highly mobile wireless ad Hoc [14]
It is an adaptive broadcasting protocol that does not require nodes to know about position and movement of
their nodes and itself. It uses connected dominating sets (CDS) and neighbor elimination concepts to
eliminate redundant broadcasting. It employs two-hop neighbor information obtained by periodic beacons
to construct CDS. Each vehicle A maintains two lists of neighboring vehicles: R and NR, containing
neighbors that already received and that which did not receive the packet. After a timeout, A rebroadcasts
the packet if the list NR is nonempty. Both lists R and NR are updated periodically by using beacon
                                                     16
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

messages. Nodes in CDS have less waiting timeout than nodes that are not in CDS. The main idea of
PBSM is two nodes do not transmit every time they discover each other as new neighbors. It is a parameter
less protocol which does not consider vehicle position, direction and velocity. To overcome this problem
authors proposed ACKPBSM which tries to reduce the control packet overhead in data forwarding. It uses
GPS to retrieve position information and acknowledgements are piggybacked in periodic beacon messages.
It employs 1-hop position information obtained by periodic beacons to construct CDS. As PBSM AND
ACKPBSM uses store and forward method to deliver the message in whole network which employs high
end to end delay this is not acceptable in safety application for VANET.
2.5.8 PGB: Preferred group broadcast [15]
PGB is not a reliable broadcasting protocol but it is a solution to prevent broadcast storm problem from
route request broadcasting . Each node in PGB will sense the level of signal strength from neighbor
broadcasting. The signal strength is used for waiting timeout calculation. Nodes in the edge of circulated
broadcast will set shorter waiting timeout. Only node with shortest timeout will rebroadcast the message.
PGB can reduce numbers of RREQ broadcasting. But there exists a problem on low density area.
2.5.9 DECA: Density-aware reliable broadcasting protocol [16]
It does not require position knowledge. DECA employ only local density information of I-hop neighbors
obtained by beaconing. Before broadcasting, a node selects one neighbor which has the highest local
density information to be the next rebroadcast node. Other nodes will randomly set their waiting timeout. If
they do not hear anyone rebroadcast the message before the timeout expiration, they will rebroadcast the
message. Furthermore, identifiers of the received broadcast messages are included into periodic beacons so
that a node can discover its neighbors, which have not received the messages and consequently rebroadcast
the messages for those neighbors. The advantage of DECA is it does not require position knowledge to
operate so it is more flexible to suit any operating environment.
2.5.9 POCA: Position-aware reliable broadcasting protocol [17]
It uses adaptive beacon[18] to get neighbors' position and velocity. When nodes want to broadcast
messages, they will select the neighbors in preferred distance to rebroadcast the message. The preferred
distance is based on the distance between nodes and selector nodes. The selected node will rebroadcast the
message immediately. In case the selected nodes do not rebroadcast the message, other nodes which have
set waiting timeout since they received message will do this task instead. The waiting timeout is calculated
depend on the distance between node and precursor node. So a node that is closest to selected node will
rebroadcast the messages. POCA also piggybacks the message identifier to beacon to handle intermittent
connectivity. Nodes can know if the neighbors miss some messages and rebroadcast the message to them
by set waiting timeout. So a node in the same road section will rebroadcast the messages to neighbors.


3. Conclusion

Routing is an important component in vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V)
communication. This paper discusses various routing protocols of VANET. Designing an efficient routing
protocol for all VANET applications is very difficult. Hence a survey of different VANET protocols,
comparing the various features is absolutely essential to come up with new proposals for VANET. The

                                                     17
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

performance of VANET routing protocols depend on various parameters like mobility model, driving
environment and many more. Thus this paper has come up with an exhaustive survey of different classes of
VANET routing protocols and different types of broadcast routing protocols


4. References

[1] "Survey of Routing Protocols in Vehicular Ad Hoc Networks," Kevin C. Lee, Uichin Lee, Mario Gerla,
Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, IGI Global, Oct, 2009.
[2] Ericson, “Communication and Mobility by Cellular Advanced Radio”, ComCar project,
www.comcar.de, 2002.
[3] Online, http://www.ist-drive.org/index2.html.
[4] W. Franz, H. Hartenstein, and M. Mauve, Eds., Inter-Vehicle-Communications Based on Ad Hoc
Networking Principles-The Fleet Net Project. Karlshue, Germany: Universitatverlag Karlsuhe,November
2005.
[5] A. Festag, et. al., “NoW-Network on Wheels: Project Objectives,Technology and Achievements”,
Proceedings International Journal of Computer Applications (0975 – 8887) Volume 20– No.3, April 2011
34 of 6th InternationalWorkshop on Intelligent Transportations (WIT), Hamburg, Germany,March 2008.
[6] Reichardt D., Miglietta M., Moretti L., Morsink P., and Schulz W.,“CarTALK 2000 – safe and
comfortable driving based upon inter-vehicle-communication,” in Proc. IEEE IV’02.
[7] Morris R., Jannotti J., Kaashoek F., Li J., Decouto D., “CarNet: A scalable ad hoc wireless network
system,” 9th ACM SIGOPS European Workshop, Kolding, Denmark, Sept. 2000.
[8] M. Durresi, "Emergency broadcast protocol for intervehicle communications," 2005.
[9] G. Korkmaz, "Urban multihop broadcast protocol for inter-vehicle communication systems".
[10] M. Sum, "GPS-based message broadcasting for Intervehicle”, 2000.
[11] O. K. Tonguz, N. Wisitpongphan, F. Bai, P. Mudalige and V. Sadekar, "Broadcasting in VANET",
Proc. IEEE INFOCOM MOVE Workshop 2007, Anchorage, USA, May, 2007.
[12] M. Nekovee, B. BjamiBogason, "Reliable and efficient information dissemination in intermittently
connected vehicular ad hoc networks", IEEE the 65th VTC'07 spring, Dublin, Ireland, April 22-25, 2007.
[13] Rainer Baumann, “Vehicular Ad hoc Networks”, Master’s Thesis in Computer Science, ETH Zurich 2004.
[14] Adnan Afsar Khan, Ivan Stojmenovic, Nejib Zaguia, ”Parameter less broadcasting in static to highly
mobile wireless ad hoc, sensor and actuator networks”, in Proc. ACM Int.Conference on Mobile
Computing and Networking (MobiCom), Seattle, USA, August 1999.
[15] V. Naumov, R. Baumann, and T. Gross, "An evaluation of inter-vehicle ad hoc networks based on
realistic vehicular traces," Proc. ACM the 7th ACM MohiHoc'06, Florence, italy, May 22-25, 2006.
[16] N. Na Nakom, and K. Rojviboonchai, "DECA: Density-Aware Reliable Broadcasting in Vehicular
Ad-Hoc Networks," IEEE the 7th ECTICON20IO, Chiang Mai, Thailand, May 19-21,2010.
[17] K. Na Nakom and K. Rojviboonchai, "POCA : Position-Aware Reliable Broadcasting in VANET," to
be appear in Proc. the 2nd Asia-Pacific Conference of Information Processing APCIP20IO, Nanchang,
China, September 7-18,2010.


                                                     18
Network and Complex Systems                                                            www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.2, 2011

[18] N. Na Nakom, and K. Rojviboonchai, "Efficient Beacon Solution for Wireless Ad-Hoc Networks," the
CSsnoJO, Bangkok, Thailand. May 12-14, 2010.




                                                 19
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Weitere ähnliche Inhalte

Was ist angesagt?

MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
 

Was ist angesagt? (14)

MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
L045037278
L045037278L045037278
L045037278
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
A0110104
A0110104A0110104
A0110104
 

Andere mochten auch

A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...ijasa
 
Congestion control using vehicular ad hoc network
Congestion control using vehicular ad hoc networkCongestion control using vehicular ad hoc network
Congestion control using vehicular ad hoc networkNarendra Soni
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 

Andere mochten auch (9)

A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...
 
Congestion control using vehicular ad hoc network
Congestion control using vehicular ad hoc networkCongestion control using vehicular ad hoc network
Congestion control using vehicular ad hoc network
 
14251D6514
14251D651414251D6514
14251D6514
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 

Ähnlich wie 11.broadcasting routing protocols in vanet

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalAlexander Decker
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...Alexander Decker
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
 

Ähnlich wie 11.broadcasting routing protocols in vanet (20)

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212final
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
E010322531
E010322531E010322531
E010322531
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and Odmrp
 
Br31467472
Br31467472Br31467472
Br31467472
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

11.broadcasting routing protocols in vanet

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 Broadcasting Routing Protocols in VANET Uma Nagaraj, Poonam Dhamal Pune University, Alandi, Pune India E-mail: umanagaraj67@gmail.com Abstract Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. This paper discusses the main 5 types of protocols for VANET Topology Based, Positioned Based, Geo Cast, Broad Cast, and Cluster Based Protocols. It also discusses the types of Broadcast Protocols like multi hop and reliable broadcast protocols. Keywords: VANET, ITS, MANET, UMB, DV-CAST. 1. Introduction Vehicular ad hoc network is a special form of MANET which is a vehicle to vehicle & vehicle roadside wireless communication network. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information. The network architecture of VANET can be classified into three categories: pure cellular/WLAN, pure ad hoc, and hybrid [1]. Due to new technology it has taken huge attention from government, academy & industry. There are many research projects around the world which are related with VANET such as COMCAR [2], DRIVE [3], FleetNet [4] and NoW (Network on Wheels) [5], CarTALK 2000 [6], CarNet [7]. There are several VANET applications such as Vehicle collision warning, Security distance warning, Driver assistance, Cooperative driving, Cooperative cruise control, Dissemination of road information, Internet access, Map location, Automatic parking, Driverless vehicles. 2. Routing Protocols In VANET, the routing protocols are classified into five categories: Topology based routing protocol, Position based routing protocol, Cluster based routing protocol, Geo cast routing protocol and Broadcast routing protocol. These protocols are characterized on the basis of area / application where they are most suitable. 2.1. Topology Based Routing Protocols These routing protocols use links information that exists in the network to perform packet forwarding. They are further divided into Proactive, Reactive & Hybrid Protocols. 2.1.1 Proactive routing protocols 13
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 The proactive routing means that the routing information like next forwarding hope is maintained in the background irrespective of communication requests. The packets are constantly broadcast and flooded among nodes to maintain the path, then a table is constructed within a node which indicates next hop node towards a destination. The advantage of proactive routing protocols is that there is no route discovery is required since the destination route is stored in the background, but the disadvantage of this protocol is that it provides low latency for real time application, it also leads to the maintenance of unused data paths, which causes the reduction in the available bandwidth. The proactive protocol is also known as table driven routing protocol. These protocols work by periodically exchanging the knowledge of topology among all the nodes of the network. Figure-1 Routing Protocols for VANET 2.1.2 Reactive/Ad hoc based routing Reactive routing opens the route only when it is necessary for a node to communicate with each other. Reactive routing consists of route discovery phase in which the query packets are flooded into the network for the path search and this phase completes when route is found. These protocols are called as on-demand routing protocols as they periodically update the routing table, when some data is there to send. But these protocols use flooding process for route discovery, which causes more routing overhead and also suffer from the initial route discovery process, which make them unsuitable for safety applications in VANET. 2.1.3 Hybrid Protocols: The hybrid protocols are introduced to reduce the control overhead of proactive routing protocols and decrease the initial route discovery delay in reactive routing protocols. 2.2. Position Based Routing Protocols Position based routing consists of class of routing algorithm. They share the property of using geographic positioning information in order to select the next forwarding hops. The packet is send without any map knowledge to the one hop neighbor which is closest to destination. Position based routing is beneficial since no global route from source node to destination node need to be created and maintained. Position 14
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 based routing is broadly divided in two types: Position based greedy V2V protocols, Delay Tolerant Protocols. 2.3. Cluster Based Routing Protocols In Cluster-based routing protocols vehicles near to each other form a cluster. Each cluster has one cluster-head, which is responsible for intra and inter-cluster management functions. Intra-cluster nodes communicate each other using direct links, whereas inter-cluster communication is performed via cluster headers. In cluster based routing protocols the formation of clusters and the selection of the cluster-head is an important issue. In VANET due to high mobility dynamic cluster formation is a towering process. 2.4. Geo Cast Routing Protocols Geocast routing is basically a location based multicast routing. Its objective is to deliver the packet from source node to all other nodes within a specified geographical region (Zone of Relevance ZOR). In Geocast routing vehicles outside the ZOR are not alerted to avoid unnecessary hasty reaction. Geocast is considered as a multicast service within a specific geographic region. It normally defines a forwarding zone where it directs the flooding of packets in order to reduce message overhead and network congestion caused by simply flooding packets everywhere. In the destination zone, unicast routing can be used to forward the packet. One pitfall of Geocast is network partitioning and also unfavorable neighbors which may hinder the proper forwarding of messages. These protocols are used to send a message to all vehicles in a pre-defined geographical region. 2.5. Broadcast Based Routing Protocols Broadcast routing is frequently used in VANET for sharing, traffic, weather and emergency, road conditions among vehicles and delivering advertisements and announcements. Broadcasting is used when message needs to b disseminated to the vehicle beyond the transmission range i.e multi hops are used. Broadcast sends a packet to all nodes in the network, typically using flooding. This ensures the delivery of the packet but bandwidth is wasted and nodes receive duplicates. In VANET, it performs better for a small number of nodes. The various Broadcast routing protocols are BROADCOMM, UMB, V-TRADE, DV-CAST, EAEP, SRB, PBSM, PGB, DECA and POCA. 2.5.1 BROADCOMM: [8] BROADCOMM is based on hierarchal structure for highway network. In BRAODCOMM the highway is divided into virtual cells which move like vehicles. The nodes in the highway are organized into two level of hierarchy: the first Level includes all the nodes in a cell, the second level is represented by cell reflectors, which are few nodes located closed to geographical centre of cell. Cell reflected behaves for certain interval of time as cluster head and handles the emergency messages coming from same members of the cell or nearby neighbor. This protocol performs similar to flooding base routing protocols for message broadcasting and routing overhead. 2.5.2 UMB : Urban Multihop Broadcast Protocol [9] UMB is designed to overcome the interference, packet collision and hidden node problems during message distribution in multi hop broadcast. In UMB the sender node tries to select the furthest node in the 15
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 broadcast direction for forwarding and acknowledging the packet without any prior topology information. UMB protocol performs with much success at higher packet loads and vehicle traffic densities. 2.5.3 V-TRADE : Vector Based Tracing Detection [10] It is a GPS based message broadcasting protocols. The basic idea is similar to unicast routing protocols Zone Routing Protocol (ZRP). V-TRADE classifies the neighbors into different forwarding groups depending upon position and movement information. For each group only a small subset of vehicles is selected to rebroadcast the message. V-TRADE improves the bandwidth utilization but some routing overheads are associated with selecting the next forwarding node in every hop. 2.5.4 DV-CAST: Distributed vehicular broadcast protocol [11] It uses local topology information by using the periodic hello messages for broadcasting the information. Each vehicle uses a flag variable to check whether the packet is redundant or not. This protocol divides the vehicles into three types depending on the local connectivity as well connected, sparsely connected, totally disconnected neighborhood. In well connected neighborhood it uses persistence scheme (weighted p persistence, slotted 1and p persistence). In sparsely connected neighborhood after receiving the broadcast message, vehicles can immediately rebroadcast with vehicles moving in the same direction. In totally disconnected neighborhood vehicles are used to store the broadcast message until another vehicle enters into transmission range, otherwise if the time expires it will discard the packet. This protocol causes high control overhead and delay in end to end data transfer. 2.5.5. EAEP: Edge-aware epidemic protocol [12] It is reliable, bandwidth efficient information dissemination based highly dynamic VANET protocol. It reduces control packet overhead by eliminating exchange of additional hello packets for message transfer between different clusters of vehicles and eases cluster maintenance. Each vehicle piggybacks its own geographical position to broadcast messages to eliminate beacon messages. Upon receiving a new rebroadcast message, EAEP uses number of transmission from front nodes and back nodes in a given period of time to calculate the probability for making decision whether nodes will rebroadcast the message or not. But EAEP does not address the intermittent connectivity issue. Specifically, a node does not know whether it has missed any messages to its new neighbors or its neighbors have missed some messages. EAEP overcomes the simple flooding problem but it incurs high delay of data dissemination. 2.5.6 SRB: Secure Ring Broadcasting [13] It is to minimize number of retransmission messages and to get more stable routes. It classifies nodes into three groups based on their receiving power as Inner Nodes (close to sending node), Outer Nodes (far away from sending node), Secure Ring Nodes (preferable distance from sending node). It restricts rebroadcasting to only secure ring nodes to minimize number of retransmissions. 2.5.7 PBSM: Parameter less broadcasting in static to highly mobile wireless ad Hoc [14] It is an adaptive broadcasting protocol that does not require nodes to know about position and movement of their nodes and itself. It uses connected dominating sets (CDS) and neighbor elimination concepts to eliminate redundant broadcasting. It employs two-hop neighbor information obtained by periodic beacons to construct CDS. Each vehicle A maintains two lists of neighboring vehicles: R and NR, containing neighbors that already received and that which did not receive the packet. After a timeout, A rebroadcasts the packet if the list NR is nonempty. Both lists R and NR are updated periodically by using beacon 16
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 messages. Nodes in CDS have less waiting timeout than nodes that are not in CDS. The main idea of PBSM is two nodes do not transmit every time they discover each other as new neighbors. It is a parameter less protocol which does not consider vehicle position, direction and velocity. To overcome this problem authors proposed ACKPBSM which tries to reduce the control packet overhead in data forwarding. It uses GPS to retrieve position information and acknowledgements are piggybacked in periodic beacon messages. It employs 1-hop position information obtained by periodic beacons to construct CDS. As PBSM AND ACKPBSM uses store and forward method to deliver the message in whole network which employs high end to end delay this is not acceptable in safety application for VANET. 2.5.8 PGB: Preferred group broadcast [15] PGB is not a reliable broadcasting protocol but it is a solution to prevent broadcast storm problem from route request broadcasting . Each node in PGB will sense the level of signal strength from neighbor broadcasting. The signal strength is used for waiting timeout calculation. Nodes in the edge of circulated broadcast will set shorter waiting timeout. Only node with shortest timeout will rebroadcast the message. PGB can reduce numbers of RREQ broadcasting. But there exists a problem on low density area. 2.5.9 DECA: Density-aware reliable broadcasting protocol [16] It does not require position knowledge. DECA employ only local density information of I-hop neighbors obtained by beaconing. Before broadcasting, a node selects one neighbor which has the highest local density information to be the next rebroadcast node. Other nodes will randomly set their waiting timeout. If they do not hear anyone rebroadcast the message before the timeout expiration, they will rebroadcast the message. Furthermore, identifiers of the received broadcast messages are included into periodic beacons so that a node can discover its neighbors, which have not received the messages and consequently rebroadcast the messages for those neighbors. The advantage of DECA is it does not require position knowledge to operate so it is more flexible to suit any operating environment. 2.5.9 POCA: Position-aware reliable broadcasting protocol [17] It uses adaptive beacon[18] to get neighbors' position and velocity. When nodes want to broadcast messages, they will select the neighbors in preferred distance to rebroadcast the message. The preferred distance is based on the distance between nodes and selector nodes. The selected node will rebroadcast the message immediately. In case the selected nodes do not rebroadcast the message, other nodes which have set waiting timeout since they received message will do this task instead. The waiting timeout is calculated depend on the distance between node and precursor node. So a node that is closest to selected node will rebroadcast the messages. POCA also piggybacks the message identifier to beacon to handle intermittent connectivity. Nodes can know if the neighbors miss some messages and rebroadcast the message to them by set waiting timeout. So a node in the same road section will rebroadcast the messages to neighbors. 3. Conclusion Routing is an important component in vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) communication. This paper discusses various routing protocols of VANET. Designing an efficient routing protocol for all VANET applications is very difficult. Hence a survey of different VANET protocols, comparing the various features is absolutely essential to come up with new proposals for VANET. The 17
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 performance of VANET routing protocols depend on various parameters like mobility model, driving environment and many more. Thus this paper has come up with an exhaustive survey of different classes of VANET routing protocols and different types of broadcast routing protocols 4. References [1] "Survey of Routing Protocols in Vehicular Ad Hoc Networks," Kevin C. Lee, Uichin Lee, Mario Gerla, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, IGI Global, Oct, 2009. [2] Ericson, “Communication and Mobility by Cellular Advanced Radio”, ComCar project, www.comcar.de, 2002. [3] Online, http://www.ist-drive.org/index2.html. [4] W. Franz, H. Hartenstein, and M. Mauve, Eds., Inter-Vehicle-Communications Based on Ad Hoc Networking Principles-The Fleet Net Project. Karlshue, Germany: Universitatverlag Karlsuhe,November 2005. [5] A. Festag, et. al., “NoW-Network on Wheels: Project Objectives,Technology and Achievements”, Proceedings International Journal of Computer Applications (0975 – 8887) Volume 20– No.3, April 2011 34 of 6th InternationalWorkshop on Intelligent Transportations (WIT), Hamburg, Germany,March 2008. [6] Reichardt D., Miglietta M., Moretti L., Morsink P., and Schulz W.,“CarTALK 2000 – safe and comfortable driving based upon inter-vehicle-communication,” in Proc. IEEE IV’02. [7] Morris R., Jannotti J., Kaashoek F., Li J., Decouto D., “CarNet: A scalable ad hoc wireless network system,” 9th ACM SIGOPS European Workshop, Kolding, Denmark, Sept. 2000. [8] M. Durresi, "Emergency broadcast protocol for intervehicle communications," 2005. [9] G. Korkmaz, "Urban multihop broadcast protocol for inter-vehicle communication systems". [10] M. Sum, "GPS-based message broadcasting for Intervehicle”, 2000. [11] O. K. Tonguz, N. Wisitpongphan, F. Bai, P. Mudalige and V. Sadekar, "Broadcasting in VANET", Proc. IEEE INFOCOM MOVE Workshop 2007, Anchorage, USA, May, 2007. [12] M. Nekovee, B. BjamiBogason, "Reliable and efficient information dissemination in intermittently connected vehicular ad hoc networks", IEEE the 65th VTC'07 spring, Dublin, Ireland, April 22-25, 2007. [13] Rainer Baumann, “Vehicular Ad hoc Networks”, Master’s Thesis in Computer Science, ETH Zurich 2004. [14] Adnan Afsar Khan, Ivan Stojmenovic, Nejib Zaguia, ”Parameter less broadcasting in static to highly mobile wireless ad hoc, sensor and actuator networks”, in Proc. ACM Int.Conference on Mobile Computing and Networking (MobiCom), Seattle, USA, August 1999. [15] V. Naumov, R. Baumann, and T. Gross, "An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces," Proc. ACM the 7th ACM MohiHoc'06, Florence, italy, May 22-25, 2006. [16] N. Na Nakom, and K. Rojviboonchai, "DECA: Density-Aware Reliable Broadcasting in Vehicular Ad-Hoc Networks," IEEE the 7th ECTICON20IO, Chiang Mai, Thailand, May 19-21,2010. [17] K. Na Nakom and K. Rojviboonchai, "POCA : Position-Aware Reliable Broadcasting in VANET," to be appear in Proc. the 2nd Asia-Pacific Conference of Information Processing APCIP20IO, Nanchang, China, September 7-18,2010. 18
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.2, 2011 [18] N. Na Nakom, and K. Rojviboonchai, "Efficient Beacon Solution for Wireless Ad-Hoc Networks," the CSsnoJO, Bangkok, Thailand. May 12-14, 2010. 19
  • 8. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).