SlideShare a Scribd company logo
1 of 1
Download to read offline
Using Vehicular Networks to Collect Common
                                 Traffic Data
                                           Hadi Arbabi and Michele C. Weigle
                           Department of Computer Science, Old Dominion University




                                                                              Figure 2. Message reception rate from VS2 in 5 km segment with 50%
                                                                              penetration rate and medium traffic flow.




                                                                             Figure 3. Message delay from VS2 with different delivery methods.


Figure 1. Two TOs and four dynamically defined VS in a highway.
                                                                             Table 1 shows the ability of DTMon to provide good quality
                                                                             estimation of time mean speed (TMS), travel time, and
Methods of Message Delivery in DTMon                                         space mean speed (SMS) compared to current technologies
  Regular Forwarding (RF) – A vehicle passing a VS will                     such as fixed point sensors and detectors (e.g., ILDs) and
   forward the message (including time, speed, location) to the              probe vehicle-based systems (e.g., AVL).
   closest possible TO from the list of TOs defined in the task.              Table 1. Overall comparison of DTMon with other technologies.
  Dynamic Transmission Range (DTR) – A vehicle will use                      (t-test alpha=0.05)
   RF initially with the standard DSRC range of 300 m. If the                                            Sensors and
                                                                                 Good Estimate?                                AVL            DTMon
   message cannot be forwarded (i.e., there is no vehicle                                                 Detectors
   within 300 m), then the vehicle will increase its transmission                 Flow Rate and
                                                                                                              Yes               No          See Table 2
   range to 600 m. If the vehicle is still not able to find a                        Density
   neighbor, it will increase its transmission range to 1000 m.                       TMS                    Yes       Underestimate            Yes
  Store-and-Carry (SAC) – A vehicle will store the message                        Travel Time           Not Available Overestimate             Yes
   and carry it to the next TO.                                                       SMS            Not Available Underestimate                Yes
  RF+SAC – A vehicle will forward the message to the                         Vehicle Classification Not Accurate     Limited                   Yes
   closest TO using RF and will store and carry the message
   to the next TO in order to ensure reception.                              Table 2 shows the recommended methods of message
  DTR+SAC - A vehicle will forward the message to the                       delivery in DTMon considering conditions such as distance
   closest TO using DTR and store and carry the message to                   from the TO, traffic density, and market penetration rate.
   the next TO.
                                                                              Table 2. Required method, traffic density, or penetration rate for high
Quality Estimation of Traffic Data                                            quality estimation of traffic data with 95% confidence (t-test alpha=0.05)
We have evaluated DTMon using ns-3 in free-flow and                                                          Traffic Density
transient traffic with different market penetration rates.                                High Quality                           Message
                                                                                                                    or
                                                                                           Estimation                            Delivery
Figure 2 shows the percentage of received messages from                                                       Penetration
                                                                                          Conf. ≥ 95%                            Method
                                                                                                                   Rate
vehicles passing VS2 (1 km from TO1 and 3 km from TO5)
using different message delivery methods in medium traffic                               Flow Rate and
                                                                                                                    High             Any
flow rate (1800 vehicles/h).                                                                Density

Figure 3 shows the average delay for messages received by                                                                         SAC, RF
                                                                                          Classification,
the TOs from VS2. RF and DTR have delays in milliseconds.                                                                          +SAC,
                                                                                              TMS                   Low
                                                                                                                                     or
Delay using SAC varies by the travel time of the segment.                                 Travel Time,
                                                                                                                                 DTR+SAC
More forwarding takes place using RF+SAC and DTR+SAC,                                           or
                                                                                              SMS               Medium or
which results in a lower average delay than SAC.                                                                                     Any
                                                                                                                  High



     Hadi Arbabi and Michele C. Weigle         {marbabi, mweigle}@cs.odu.edu         http://oducs-networking.blogspot.com/
                             Department of Computer Science, Old Dominion University, Norfolk, VA
                                                  ACM VANET, Beijing, China, September 2009

More Related Content

What's hot

MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
 
Multiplexing and Frequency Division Multiplexing
Multiplexing and Frequency Division MultiplexingMultiplexing and Frequency Division Multiplexing
Multiplexing and Frequency Division MultiplexingKath Mataac
 
Multiplexing (TDM)
Multiplexing (TDM)Multiplexing (TDM)
Multiplexing (TDM)Md Razib
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Improving service quality using Bayesian networks
Improving service quality using Bayesian networksImproving service quality using Bayesian networks
Improving service quality using Bayesian networksKiran Kaipa
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Randa Elanwar
 
region discription
region discriptionregion discription
region discriptionrajisri2
 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
 
Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5Yasir Azmat
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessvish0110
 
Multiplexing & types
Multiplexing & typesMultiplexing & types
Multiplexing & typesarslan895
 

What's hot (20)

Difference between tdm & fdm
Difference between tdm & fdmDifference between tdm & fdm
Difference between tdm & fdm
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
Multiplexing and Frequency Division Multiplexing
Multiplexing and Frequency Division MultiplexingMultiplexing and Frequency Division Multiplexing
Multiplexing and Frequency Division Multiplexing
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Aloha
AlohaAloha
Aloha
 
Multiplexing (TDM)
Multiplexing (TDM)Multiplexing (TDM)
Multiplexing (TDM)
 
Tdm and fdm
Tdm and fdmTdm and fdm
Tdm and fdm
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Improving service quality using Bayesian networks
Improving service quality using Bayesian networksImproving service quality using Bayesian networks
Improving service quality using Bayesian networks
 
SMS
SMSSMS
SMS
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5
 
region discription
region discriptionregion discription
region discription
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOS
 
138078380 gsm-timers
138078380 gsm-timers138078380 gsm-timers
138078380 gsm-timers
 
Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
Multiplexing & types
Multiplexing & typesMultiplexing & types
Multiplexing & types
 

Similar to Using Vehicular Networks to Collect Common Traffic Data

A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...Elizabeth Williams
 
Relay technologies for wi max and lte
Relay technologies for wi max and lteRelay technologies for wi max and lte
Relay technologies for wi max and lteDevdatta Ambre
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Yogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxYogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxAman564573
 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
Terminology In Telecommunication
Terminology In TelecommunicationTerminology In Telecommunication
Terminology In TelecommunicationOUM SAOKOSAL
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksIDES Editor
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...IOSRJECE
 

Similar to Using Vehicular Networks to Collect Common Traffic Data (20)

A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
 
Relay technologies for wi max and lte
Relay technologies for wi max and lteRelay technologies for wi max and lte
Relay technologies for wi max and lte
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Yogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxYogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptx
 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
A018210109
A018210109A018210109
A018210109
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Terminology In Telecommunication
Terminology In TelecommunicationTerminology In Telecommunication
Terminology In Telecommunication
 
three
threethree
three
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 
GSM Air Interface
GSM Air InterfaceGSM Air Interface
GSM Air Interface
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
Umts services
Umts servicesUmts services
Umts services
 
Ic3313881393
Ic3313881393Ic3313881393
Ic3313881393
 

More from Michele Weigle

Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Michele Weigle
 
WS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesWS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesMichele Weigle
 
Intro to Web Archiving
Intro to Web ArchivingIntro to Web Archiving
Intro to Web ArchivingMichele Weigle
 
Enabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesEnabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesMichele Weigle
 
Visualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeVisualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeMichele Weigle
 
How to Write an Academic Paper
How to Write an Academic PaperHow to Write an Academic Paper
How to Write an Academic PaperMichele Weigle
 
How to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationHow to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationMichele Weigle
 
My Academic Story via Internet Archive
My Academic Story via Internet ArchiveMy Academic Story via Internet Archive
My Academic Story via Internet ArchiveMichele Weigle
 
A Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksA Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksMichele Weigle
 
Strategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseStrategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseMichele Weigle
 
Detecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCDetecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCMichele Weigle
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksMichele Weigle
 
2015-capwic-gradschool
2015-capwic-gradschool2015-capwic-gradschool
2015-capwic-gradschoolMichele Weigle
 
2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-webMichele Weigle
 
Tools for Managing the Past Web
Tools for Managing the Past WebTools for Managing the Past Web
Tools for Managing the Past WebMichele Weigle
 
Archive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewArchive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewMichele Weigle
 
Telling Stories with Web Archives
Telling Stories with Web ArchivesTelling Stories with Web Archives
Telling Stories with Web ArchivesMichele Weigle
 
"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overviewMichele Weigle
 
TDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsTDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsMichele Weigle
 

More from Michele Weigle (20)

Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
 
WS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesWS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web Archives
 
Intro to Web Archiving
Intro to Web ArchivingIntro to Web Archiving
Intro to Web Archiving
 
Enabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesEnabling Personal Use of Web Archives
Enabling Personal Use of Web Archives
 
Visualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeVisualizing Webpage Changes Over Time
Visualizing Webpage Changes Over Time
 
How to Write an Academic Paper
How to Write an Academic PaperHow to Write an Academic Paper
How to Write an Academic Paper
 
How to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationHow to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic Presentation
 
My Academic Story via Internet Archive
My Academic Story via Internet ArchiveMy Academic Story via Internet Archive
My Academic Story via Internet Archive
 
A Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksA Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor Networks
 
Strategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseStrategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency Response
 
Detecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCDetecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARC
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless Nanonetworks
 
2015-capwic-gradschool
2015-capwic-gradschool2015-capwic-gradschool
2015-capwic-gradschool
 
2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web
 
Tools for Managing the Past Web
Tools for Managing the Past WebTools for Managing the Past Web
Tools for Managing the Past Web
 
Archive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewArchive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH Overview
 
Bits of Research
Bits of ResearchBits of Research
Bits of Research
 
Telling Stories with Web Archives
Telling Stories with Web ArchivesTelling Stories with Web Archives
Telling Stories with Web Archives
 
"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview
 
TDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsTDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETs
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Using Vehicular Networks to Collect Common Traffic Data

  • 1. Using Vehicular Networks to Collect Common Traffic Data Hadi Arbabi and Michele C. Weigle Department of Computer Science, Old Dominion University Figure 2. Message reception rate from VS2 in 5 km segment with 50% penetration rate and medium traffic flow. Figure 3. Message delay from VS2 with different delivery methods. Figure 1. Two TOs and four dynamically defined VS in a highway. Table 1 shows the ability of DTMon to provide good quality estimation of time mean speed (TMS), travel time, and Methods of Message Delivery in DTMon space mean speed (SMS) compared to current technologies   Regular Forwarding (RF) – A vehicle passing a VS will such as fixed point sensors and detectors (e.g., ILDs) and forward the message (including time, speed, location) to the probe vehicle-based systems (e.g., AVL). closest possible TO from the list of TOs defined in the task. Table 1. Overall comparison of DTMon with other technologies.   Dynamic Transmission Range (DTR) – A vehicle will use (t-test alpha=0.05) RF initially with the standard DSRC range of 300 m. If the Sensors and Good Estimate? AVL DTMon message cannot be forwarded (i.e., there is no vehicle Detectors within 300 m), then the vehicle will increase its transmission Flow Rate and Yes No See Table 2 range to 600 m. If the vehicle is still not able to find a Density neighbor, it will increase its transmission range to 1000 m. TMS Yes Underestimate Yes   Store-and-Carry (SAC) – A vehicle will store the message Travel Time Not Available Overestimate Yes and carry it to the next TO. SMS Not Available Underestimate Yes   RF+SAC – A vehicle will forward the message to the Vehicle Classification Not Accurate Limited Yes closest TO using RF and will store and carry the message to the next TO in order to ensure reception. Table 2 shows the recommended methods of message   DTR+SAC - A vehicle will forward the message to the delivery in DTMon considering conditions such as distance closest TO using DTR and store and carry the message to from the TO, traffic density, and market penetration rate. the next TO. Table 2. Required method, traffic density, or penetration rate for high Quality Estimation of Traffic Data quality estimation of traffic data with 95% confidence (t-test alpha=0.05) We have evaluated DTMon using ns-3 in free-flow and Traffic Density transient traffic with different market penetration rates. High Quality Message or Estimation Delivery Figure 2 shows the percentage of received messages from Penetration Conf. ≥ 95% Method Rate vehicles passing VS2 (1 km from TO1 and 3 km from TO5) using different message delivery methods in medium traffic Flow Rate and High Any flow rate (1800 vehicles/h). Density Figure 3 shows the average delay for messages received by SAC, RF Classification, the TOs from VS2. RF and DTR have delays in milliseconds. +SAC, TMS Low or Delay using SAC varies by the travel time of the segment. Travel Time, DTR+SAC More forwarding takes place using RF+SAC and DTR+SAC, or SMS Medium or which results in a lower average delay than SAC. Any High Hadi Arbabi and Michele C. Weigle {marbabi, mweigle}@cs.odu.edu http://oducs-networking.blogspot.com/ Department of Computer Science, Old Dominion University, Norfolk, VA ACM VANET, Beijing, China, September 2009