SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290
3156
PBMAC – Position Based Channel Allocation for
Vehicular Ad Hoc Networks
M.Abhilash Kumar Reddy
Department of Computer Science and Engineering
Sri Venkateswara University College of Engineering
Tirupati, Andhra Pradesh, India
abhilash.svu@gmail.com
A. Rama Mohan Reddy
Department of Computer Science and Engineering
Sri Venkateswara University College of Engineering
Tirupati, Andhra Pradesh, India
ramamohansvu@yahoo.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In Vehicular ad hoc networks road safety and traffic management applications required stable communication
channel with minimum disturbances. In vanets vehicles used bandwidth to forward packets towards destination
with the help of relay nodes. While exchanging information there are chances of collisions due to improper
bandwidth allocation in a network. Some applications such as safety and traffic management required consistent
channel conditions. However the design of an efficient medium access control (MAC) is a challenging task due to
dynamic topology changes. The existing cluster based TDMA MAC protocols used traffic loads for bandwidth
allocation in such a manner position of vehicle in the cluster is not considered. As part of that, vehicles located at
end of cluster region can request for channel, as consequence the cluster head (CH) allocates bandwidth based on
traffic loads. In this case vehicles are not in a stage to use total reserved slot allocated for usage, because in short
span vehicles move to next cluster region, it shows inefficient allocation of channel. In this paper we proposed an
efficient approach for allocation of bandwidth which depends on vehicle position in cluster. Here vehicles at
starting position can get more bandwidth when compare to end position vehicles. The simulation shows position
based bandwidth allocation where the channel is allocated based on effective and reduces collisions as result
improves overall network performance.
Keywords -– Vanets, collision free, cluster and position based MAC, QoS, and Queue theory.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Feb 06, 2017 Date of Acceptance: Feb 23, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Due to advancement in transport technology, VANETS
have attracted great interest from both industry and
research area. The key idea behind Vanets is to build
intelligent transport system to enhance safety driving,
entertainment services and traffic optimization [1].
VANET provides Vehicle-Vehicle (V2V) communication
and vehicle-infrastructure (V2I) communication and is
defined as a group of vehicles that are dynamically
establishing a network without any existing infrastructure.
The vanets consists of set of vehicles inbuilt
communication device called On-Board Units and Road-
Side Units, which is used to communicate with vehicles.
Another dimension of VANET uses Dedicated Short
Range Communication (DSRC) with 5.9 GHZ bandwidth
particularly for V2V and V2I [2]. Due to this dynamic
nature, there exists frequent disconnection of links
between vehicles, which leads to delay that affects
network performance. The Medium Access Control
(MAC) Protocol share common channel for sending and
receiving the data between nodes. However inefficient
usage of channel may lead to collisions, waste of
bandwidth and delay. In general MAC protocols are
broadly classified into two categories Contention-based
and Contention-free [3]. In Contention-based approach
every node requests for bandwidth to transmit data. In
Contention-free approach the channel is pre-allocated like
TDMA and FDMA where the medium becomes reserved
It is necessary to design an efficient MAC protocol which
plays major role that satisfies Quality of Service (QoS)
requirements. Several contention-free protocols have
been proposed which uses IEEE 802.11p standard with
different frequency band or time slots assigned to each
vehicle in a given channel. An interesting area of research
in the field of VANETs is TDMA based MAC protocols
where time slots are divided and distributed to all
vehicles. Only one vehicle must access channel at each
time slot. Existing MAC protocols like VESOMAC
[4],VC-MAC[5], and ACFMAC [8] used traffic load,
congestion and free slots information to allocate
bandwidth for nodes, all above protocols provides channel
access without collisions but still there are some issues to
consider because in cluster networks cluster head (CH) is
responsible for allocating bandwidth to members.CH
collects requirement from members and dynamically
assigns channel for their usage. However vehicle at end
position of cluster cannot use channel fairly. Bandwidth is
again re-allocated or wasted if vehicle moved to another
cluster. To address this issue we propose PBCMAC
system uses position information of vehicle in cluster i.e.
vehicles between starting to middle position in cluster
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290
3157
allocated maximum requested bandwidth, whereas
vehicles between middle to end position get calculated
bandwidth based on duration in cluster.
II. STATE- OF-THE-ART
In research [4] VESOMAC self-organising MAC protocol
supports dynamic topology changes with fast slot
rescheduling. Such environment mainly applicable for
cooperative collision avoidance applications (CCA) (E.g.:
an accident). This protocol efficiently used for highway
safety applications. In research [5] VC-MAC a
cooperative information downloading network is formed
into group of clusters. These clusters depend on the
direction of vehicles used for large volumes of data
transmission. It contains cluster head and cluster members
where they can communicate directly to each other. Here,
nodes add acknowledgment after receiving message. If
any node fails to receive message, Node ID is added to a
list which contains nodes that have not received any
message. Finally, cluster head sends the message in ideal
slots. In research [6] DMMAC uses CCH time and is
divided into Adaptive Broadcast Frame (ABF),
Contention-based Reservation Period (CRP), and a node
dynamically reserves time slot. DMMAC uses a dynamic
TDMA mechanism for basic channel reservation. In
research [7] Vanets Coordinator is elected through a
transmit and listen method. Here, CBT provides nodes to
dynamically choose a slot for bandwidth request. Inter-
cluster communication is used to share information
between group of clusters and intra cluster communication
is used to share bandwidth, control signals and necessary
information with in cluster. In research [8] used adaptive
collision free MAC protocol based on time division
multiplexing access. ACFM guarantees fairness in packet
delivery ratio and network throughput. RSU allots slots
for vehicles dynamically based on its coverage. However,
when the traffic in a particular region is thin then ACFM
will minimise assignment of slots. On other side, if the
traffic is high the ACFM could expand the slots. ACFM
adaptively changes slot assignment according to the
density of vehicles in its coverage. In research [9]
VEMAC protocol also called multi-channel TDMA
protocol, which reduced the broadcast collisions due to
high node mobility using disjoint sets. VEMAC allots
disjoint sets of time intervals to vehicles moving in
opposite directions and to road side units. In research [10]
CAHMAC intermediate nodes used as co-operative nodes
to transfer packets to the destination using unreserved
time slots. It aimed to improve packet transmission
probability. If failure occurs between source and
destination an intermediate node takes responsibility to
carry the packet to the destination by using unreserved
time slot. Therefore, here efficient use of unreserved time
slots for retransmission improves network throughput.
In research [11] ATSA vehicles chooses a frame length
and compete for time slots available in its direction. It
uses binary tree algorithm to avoid collisions and
unbalanced traffic conditions. In research [12] STDMA
self-organising time division multi access used to support
highway traffic with periodic packets broadcasting. This
protocol provides fair and predictable way communication
channel. This decentralised approach contains
initialisation, network entry, and frame allocation,
operation phases for channel allocation uses position
information and uses four phases to allot the channel
Initialisation.
In research [13] HERMAC (Hybrid Efficient and
Reliable) used dynamic TDMA slot allotment. It uses both
TDMA and CSMA access methods. It provides safety
message broadcast with TDMA access method in the
reserved time slot to increase the reliability.
In research [14] VERMAC, priority is given to emergency
packets (EMG), this protocol increases the EMG
broadcast reliability. It uses control channel (CCH) and
six service channels (SCH) to enhance service throughput.
The VERMAC uses CCH during the SCHs for
broadcasting the EMG packet and each periodic or event
EMG packet is send twice to increase packet delivery
ratio.
In research [15] DTMAC used accurate geographic
position of the vehicle (direction, speed and time) and
vehicle synchronisation performed by using GPS. It also
added features VEMAC protocol such that the channel
time is divided into frames. Here the motivation is to
minimise access collision and achieve high throughput.
III. PROPOSED METHODOLOGY
In this section we present position aware bandwidth
assignment in cluster based vehicular ad hoc networks,
now a day’s cluster networks gains lot of attention for
vanets due to fair channel allocation between nodes and
also effectively handles dynamic topology changes.
In cluster one node is selected as coordinator that is
responsible for slots assignment and making coordination
inside cluster members.
Collision can occur while two nodes in cluster try to
access same channel at a time this happens when limited
bandwidth shared among multiple nodes, sometimes
bandwidth unused if node moves out of cluster without
utilizing given slot.
In contrast, proposed approach focused on position of
node for channel allocation.The main intention is to
analyse and assign optimal bandwidth for all nodes in
cluster depends on exact usage irrespective of the channel
request.
In such methodology, initially cluster head (CH) analyses
bandwidth which is needed for all members and same is
requested on RSU for bandwidth and then RSU connected
to base station.
Later CH efficiently shares channel among nodes that are
allotted by RSU, similarly all cluster heads can performs
the same.
In General for cluster with more vehicles time frame i
given as
CMax (i) = n-Ti * ([n/Ti]) (1)
CMax – no of clusters
Ti – Time frames
n – size of available bandwidth
cluster with less number of vehicles
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290
3158
CMin (i) = Ti *( [n/Ti] )– n (2)
RSU allocates bandwidth to cluster head computed by (1)
and (2).Every node in vanets inbuilt with global
positioning system which provides accurate position,
direction and velocity information timely update the CH
table. Using table information CH take decisions. In our
approach cluster is divided into two zones namely green
and orange.
Fig.1 proposed system model.
TABLE 1. CH Table information.
Two queues are used and maintained by CH, in which
green queue stores information about vehicles in between
start position and middle position, similarly orange queue
maintains vehicles information in between middle
position and end position as shown in Fig 2. CH1 contains
3 Vehicles in green queue and 4 vehicles in orange queue.
Fig 2. Proposed system Queue Model.GQ –
green queue, OQ-orange queue, CH – cluster head.
Here our motive is to assign maximum slots for vehicles
in GQ than vehicles in OQ irrespective of their requests,
so that bandwidth would not waste. In such way, they stay
more time in cluster and uses slots efficiently when
compared with vehicles in OQ. So for optimal channel
allocation between cluster member’s combination of
round robin and priority scheduling algorithms are used.
Finally this method achieved acceptable performance and
computation also avoids drawbacks of existing timeslot
allocation techniques.
IV. ALGORITHM
/* fair round robin & priority technique
to allocate channel for all vehicles */
Var veh [max], BWreq [max] : initial vehicle vector.
Var Ti : Time slots index.
Var n : size of available
bandwidth.
Var GQ [max], OQ [max] : queues to store vehicles
based
on regions.
Var Bwreq, Bwassg : bandwidth request and assign.
Var CH : cluster head.
do
{
//CH stores all bandwidth requests BWreq [max] w.r.t
Veh [max].
For (i=1 to max) Initial slot allocation
{
Veh[i] = min slot..
}
// Calculating actual channel requirement
and assign slots for each vehicle.
While (1)
{
J=1;
If (pos[i] <MP)
// checking position of each vehicle in table given by
GPS.
{
GQ[j] =Veh[j].
//Assign two continuous channel slots.
Given Priority for vehicles in GQ.
}
else
{
OQ[j] =Veh[j].
// Assign one channel slot.
}
j++;
}
} While (end);
Node
ID
Zone Direction speed Required
bandwidth
2 orange right 13.56,2.92m/s 10MHz
3 orange right 14.56,2.92m/s 15MHz
4 green right 15.56,2.92m/s 9MHz
5 green right 12.56,2.92m/s 10MHz
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290
3159
Fig 5. Bandwidth allocation between vehicles
V. SIMULATION ENVIRONMENT
TABLE 2. Simulation parameters and range of values
VI. RESULTS
This section shows results of our proposed system verified
on NS2 simulator. Simulation results shows clearly that
proposed method improves performance in terms of
throughput, packet delivery ratio,collision rate is reduced
and channel usage is very fair because allocation of slots
totally depends on position so that vehicles at starting
position will get more slots dynamically compared to end
position in cluster. Graphs shows QOS metrice
performaces increased interms of Throughput and
Channel utlization, End to End delay is reducd overall
transmission probability is maximized.
Graph1. Channel Utlization Metric
Graph 2. Through Put Metric
Graph 3. End to End Delay Metric.
Graph 4. Transmission Probability Metric
Factor Range of Values
Simulation Area 1.2 * 1.2 km²
Inter vehicle distance 20m
No. of Vehicles 300
Communication range 100-300m
No. of vehicles in one
cluster
Max 20
Vehicle speed 10-60 mph
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290
3160
VII. CONCLUSION
Efficent channel utlization is required in VANETs
because node mobility is high also topology changes
frequently. In order to improve QOS requirements in this
paper we proposed position based slot assignment
protocol for cluster based vehicular Adhoc network,
which assigns bandwidth slots effectively based on
vehicle position in cluster.The simulation results shows
that the PB-MAC outperforms in aspects of channel
utlization,Throughput,End to End delay is reduced and
overall network performances is increased.
REFERENCES
[1] “Routing in vehicular Ad hoc networks”, IEEE
vehicular Technology magazine, June ,2007.
[2] Bhagirathi Patel, Kyushu shah “A survey vehicular
adhoc networks”, IOSR journal of computer engineering,
Dec,2013.
[3] Hadded , Laouiti , Zagrouba and Saidane “ TDMA-
Based MAC Protocols for VANETs: A survey ,Issues “,
IEEE 2015.
[4] F. Yu and S. Biswas “VESOMAC: A self-
reorganizing MAC protocol for inter-vehicle data transfer
applications in vehicular ad hoc networks” IEEE 2007.
[5] J. Zhang, Q. Zhang, and W. Jia “VC-MAC: A
Cooperative MAC Protocol in Vehicular Networks”
IEEE 2009.
[6] N. Lu, Y. Ji, F. Liu, and X.Wang “DMMAC: A
dedicated multi-channel MAC protocol design for
VANET with adaptive broadcasting “ ,IEEE 2010.
[7] Hang Su and Xi Zhang “Clustering-Based
Multichannel MAC Protocols for QoS Provisioning’s
Over Vehicular Ad Hoc Networks , 2012.
[8] WeijieGuo, Liusheng Huang, Long Chen, HongliXu,
and JietaoXie “ACFMAC: An Adaptive Collision-Free
MAC Protocol Based on TDMA for Inter-Vehicular
Communication”,IEE 2012.
[9] H. A. Omar, W. Zhuang, and L. Li “VEMAC: A
TDMA-based MAC protocol for reliable broadcast in
VANETs ” ,IEEE 2013.
[10] S.Bharati and W.Zhuang“CAHMAC: Cooperative
Ad hoc MAC for vehicular networks”,IEEE journals
2013.
[11] Y. Weidong, L. Pan, L. Yan, and Z. Hong song,”
ATSA: Adaptive TDMA slot assignment protocol for
vehicular ad-hoc networks” ,IEEE 2013.
[12] H. Yu, Z. He, and K. Niu “STDMA for vehicle-to-
vehicle communication in a highway scenario” ,IEEE
2013.
[13] D. N. M. Dang, H. N. Dang, V. Nguyen, Z. Htike,
and C. S. Hong " HERMAC: A hybrid efficient and
reliable MAC for vanets “ , IEEE 2014.
[14] Minhdang and Seon Hong “VERMAC: An efficient
and reliable MAC Protocol “ ,IEEE journals 2014.
[15] Mohamed Hadded, Anis Laouiti, Rachid Zagrouba
“DTMAC: A Fully Distributed TDMA based MAC
Protocol for Vehicular Ad Hoc Networks” , IEEE 2015.

Weitere ähnliche Inhalte

Was ist angesagt?

A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...sinaexe
 
1705.01235
1705.012351705.01235
1705.01235Faw Yas
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
 
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET Journal
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
A qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicA qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicAlexander Decker
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
 
26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthujaShivlal Mewada
 

Was ist angesagt? (20)

A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
 
1705.01235
1705.012351705.01235
1705.01235
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
H0343059064
H0343059064H0343059064
H0343059064
 
A qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicA qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamic
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
 
26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja
 

Andere mochten auch

Cámaras Digitales
Cámaras DigitalesCámaras Digitales
Cámaras Digitalesguestf95ccfe
 
Check list polishopcomvc
Check list   polishopcomvcCheck list   polishopcomvc
Check list polishopcomvcJosiane Canal
 
Go getter planejamento e metas
Go getter planejamento e metasGo getter planejamento e metas
Go getter planejamento e metasclaudio oliveira
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Angela Palleiro 4ºC
Angela Palleiro 4ºCAngela Palleiro 4ºC
Angela Palleiro 4ºCAngelasoyyo9
 
2da Unidad Jaume Trilla
2da Unidad Jaume Trilla2da Unidad Jaume Trilla
2da Unidad Jaume TrillaRosmeri
 
ludis yuyis yeta
ludis yuyis yetaludis yuyis yeta
ludis yuyis yetayulicita02
 
Nuestro Conocimiento Bloque Cero
Nuestro Conocimiento  Bloque CeroNuestro Conocimiento  Bloque Cero
Nuestro Conocimiento Bloque Ceroguest2ee187
 
Los 80 de Rosita
Los 80 de RositaLos 80 de Rosita
Los 80 de RositaSorlany
 
El Arte De Agradar
El Arte De AgradarEl Arte De Agradar
El Arte De Agradarguestcc145b
 
Deya brochure es_2013
Deya brochure es_2013Deya brochure es_2013
Deya brochure es_2013Euge Deyá
 

Andere mochten auch (20)

BNI - A importância de Convidar
BNI - A importância de ConvidarBNI - A importância de Convidar
BNI - A importância de Convidar
 
Viaje a Berlín
Viaje a BerlínViaje a Berlín
Viaje a Berlín
 
Cámaras Digitales
Cámaras DigitalesCámaras Digitales
Cámaras Digitales
 
Discurso publictario 2 fig retoricas
Discurso publictario 2 fig retoricasDiscurso publictario 2 fig retoricas
Discurso publictario 2 fig retoricas
 
Folleto informativo Portugal
Folleto informativo PortugalFolleto informativo Portugal
Folleto informativo Portugal
 
Check list polishopcomvc
Check list   polishopcomvcCheck list   polishopcomvc
Check list polishopcomvc
 
Go getter planejamento e metas
Go getter planejamento e metasGo getter planejamento e metas
Go getter planejamento e metas
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Renal
RenalRenal
Renal
 
Angela Palleiro 4ºC
Angela Palleiro 4ºCAngela Palleiro 4ºC
Angela Palleiro 4ºC
 
2da Unidad Jaume Trilla
2da Unidad Jaume Trilla2da Unidad Jaume Trilla
2da Unidad Jaume Trilla
 
ludis yuyis yeta
ludis yuyis yetaludis yuyis yeta
ludis yuyis yeta
 
Gonzalo Mejia
Gonzalo MejiaGonzalo Mejia
Gonzalo Mejia
 
Los valores 1
Los valores 1Los valores 1
Los valores 1
 
Nuestro Conocimiento Bloque Cero
Nuestro Conocimiento  Bloque CeroNuestro Conocimiento  Bloque Cero
Nuestro Conocimiento Bloque Cero
 
Tablas
TablasTablas
Tablas
 
Los 80 de Rosita
Los 80 de RositaLos 80 de Rosita
Los 80 de Rosita
 
El Arte De Agradar
El Arte De AgradarEl Arte De Agradar
El Arte De Agradar
 
Deya brochure es_2013
Deya brochure es_2013Deya brochure es_2013
Deya brochure es_2013
 
Cods38y9
Cods38y9Cods38y9
Cods38y9
 

Ähnlich wie PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks

A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Md. Hasibur Rashid
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
 
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septianIAESIJEECS
 
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...IJCSIS Research Publications
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET Journal
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...Eswar Publications
 
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Eswar Publications
 

Ähnlich wie PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks (20)

A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications
 
D044021420
D044021420D044021420
D044021420
 
VANET Clustering
VANET ClusteringVANET Clustering
VANET Clustering
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
 
Ec34781784
Ec34781784Ec34781784
Ec34781784
 
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...
Enhanced and Integrated Ant Colony-Artificial Bee Colony-Based QOS Constraine...
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 
B04020812
B04020812B04020812
B04020812
 
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...
 
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
 

Mehr von Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Mehr von Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290 3156 PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks M.Abhilash Kumar Reddy Department of Computer Science and Engineering Sri Venkateswara University College of Engineering Tirupati, Andhra Pradesh, India abhilash.svu@gmail.com A. Rama Mohan Reddy Department of Computer Science and Engineering Sri Venkateswara University College of Engineering Tirupati, Andhra Pradesh, India ramamohansvu@yahoo.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- In Vehicular ad hoc networks road safety and traffic management applications required stable communication channel with minimum disturbances. In vanets vehicles used bandwidth to forward packets towards destination with the help of relay nodes. While exchanging information there are chances of collisions due to improper bandwidth allocation in a network. Some applications such as safety and traffic management required consistent channel conditions. However the design of an efficient medium access control (MAC) is a challenging task due to dynamic topology changes. The existing cluster based TDMA MAC protocols used traffic loads for bandwidth allocation in such a manner position of vehicle in the cluster is not considered. As part of that, vehicles located at end of cluster region can request for channel, as consequence the cluster head (CH) allocates bandwidth based on traffic loads. In this case vehicles are not in a stage to use total reserved slot allocated for usage, because in short span vehicles move to next cluster region, it shows inefficient allocation of channel. In this paper we proposed an efficient approach for allocation of bandwidth which depends on vehicle position in cluster. Here vehicles at starting position can get more bandwidth when compare to end position vehicles. The simulation shows position based bandwidth allocation where the channel is allocated based on effective and reduces collisions as result improves overall network performance. Keywords -– Vanets, collision free, cluster and position based MAC, QoS, and Queue theory. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Feb 06, 2017 Date of Acceptance: Feb 23, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Due to advancement in transport technology, VANETS have attracted great interest from both industry and research area. The key idea behind Vanets is to build intelligent transport system to enhance safety driving, entertainment services and traffic optimization [1]. VANET provides Vehicle-Vehicle (V2V) communication and vehicle-infrastructure (V2I) communication and is defined as a group of vehicles that are dynamically establishing a network without any existing infrastructure. The vanets consists of set of vehicles inbuilt communication device called On-Board Units and Road- Side Units, which is used to communicate with vehicles. Another dimension of VANET uses Dedicated Short Range Communication (DSRC) with 5.9 GHZ bandwidth particularly for V2V and V2I [2]. Due to this dynamic nature, there exists frequent disconnection of links between vehicles, which leads to delay that affects network performance. The Medium Access Control (MAC) Protocol share common channel for sending and receiving the data between nodes. However inefficient usage of channel may lead to collisions, waste of bandwidth and delay. In general MAC protocols are broadly classified into two categories Contention-based and Contention-free [3]. In Contention-based approach every node requests for bandwidth to transmit data. In Contention-free approach the channel is pre-allocated like TDMA and FDMA where the medium becomes reserved It is necessary to design an efficient MAC protocol which plays major role that satisfies Quality of Service (QoS) requirements. Several contention-free protocols have been proposed which uses IEEE 802.11p standard with different frequency band or time slots assigned to each vehicle in a given channel. An interesting area of research in the field of VANETs is TDMA based MAC protocols where time slots are divided and distributed to all vehicles. Only one vehicle must access channel at each time slot. Existing MAC protocols like VESOMAC [4],VC-MAC[5], and ACFMAC [8] used traffic load, congestion and free slots information to allocate bandwidth for nodes, all above protocols provides channel access without collisions but still there are some issues to consider because in cluster networks cluster head (CH) is responsible for allocating bandwidth to members.CH collects requirement from members and dynamically assigns channel for their usage. However vehicle at end position of cluster cannot use channel fairly. Bandwidth is again re-allocated or wasted if vehicle moved to another cluster. To address this issue we propose PBCMAC system uses position information of vehicle in cluster i.e. vehicles between starting to middle position in cluster
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290 3157 allocated maximum requested bandwidth, whereas vehicles between middle to end position get calculated bandwidth based on duration in cluster. II. STATE- OF-THE-ART In research [4] VESOMAC self-organising MAC protocol supports dynamic topology changes with fast slot rescheduling. Such environment mainly applicable for cooperative collision avoidance applications (CCA) (E.g.: an accident). This protocol efficiently used for highway safety applications. In research [5] VC-MAC a cooperative information downloading network is formed into group of clusters. These clusters depend on the direction of vehicles used for large volumes of data transmission. It contains cluster head and cluster members where they can communicate directly to each other. Here, nodes add acknowledgment after receiving message. If any node fails to receive message, Node ID is added to a list which contains nodes that have not received any message. Finally, cluster head sends the message in ideal slots. In research [6] DMMAC uses CCH time and is divided into Adaptive Broadcast Frame (ABF), Contention-based Reservation Period (CRP), and a node dynamically reserves time slot. DMMAC uses a dynamic TDMA mechanism for basic channel reservation. In research [7] Vanets Coordinator is elected through a transmit and listen method. Here, CBT provides nodes to dynamically choose a slot for bandwidth request. Inter- cluster communication is used to share information between group of clusters and intra cluster communication is used to share bandwidth, control signals and necessary information with in cluster. In research [8] used adaptive collision free MAC protocol based on time division multiplexing access. ACFM guarantees fairness in packet delivery ratio and network throughput. RSU allots slots for vehicles dynamically based on its coverage. However, when the traffic in a particular region is thin then ACFM will minimise assignment of slots. On other side, if the traffic is high the ACFM could expand the slots. ACFM adaptively changes slot assignment according to the density of vehicles in its coverage. In research [9] VEMAC protocol also called multi-channel TDMA protocol, which reduced the broadcast collisions due to high node mobility using disjoint sets. VEMAC allots disjoint sets of time intervals to vehicles moving in opposite directions and to road side units. In research [10] CAHMAC intermediate nodes used as co-operative nodes to transfer packets to the destination using unreserved time slots. It aimed to improve packet transmission probability. If failure occurs between source and destination an intermediate node takes responsibility to carry the packet to the destination by using unreserved time slot. Therefore, here efficient use of unreserved time slots for retransmission improves network throughput. In research [11] ATSA vehicles chooses a frame length and compete for time slots available in its direction. It uses binary tree algorithm to avoid collisions and unbalanced traffic conditions. In research [12] STDMA self-organising time division multi access used to support highway traffic with periodic packets broadcasting. This protocol provides fair and predictable way communication channel. This decentralised approach contains initialisation, network entry, and frame allocation, operation phases for channel allocation uses position information and uses four phases to allot the channel Initialisation. In research [13] HERMAC (Hybrid Efficient and Reliable) used dynamic TDMA slot allotment. It uses both TDMA and CSMA access methods. It provides safety message broadcast with TDMA access method in the reserved time slot to increase the reliability. In research [14] VERMAC, priority is given to emergency packets (EMG), this protocol increases the EMG broadcast reliability. It uses control channel (CCH) and six service channels (SCH) to enhance service throughput. The VERMAC uses CCH during the SCHs for broadcasting the EMG packet and each periodic or event EMG packet is send twice to increase packet delivery ratio. In research [15] DTMAC used accurate geographic position of the vehicle (direction, speed and time) and vehicle synchronisation performed by using GPS. It also added features VEMAC protocol such that the channel time is divided into frames. Here the motivation is to minimise access collision and achieve high throughput. III. PROPOSED METHODOLOGY In this section we present position aware bandwidth assignment in cluster based vehicular ad hoc networks, now a day’s cluster networks gains lot of attention for vanets due to fair channel allocation between nodes and also effectively handles dynamic topology changes. In cluster one node is selected as coordinator that is responsible for slots assignment and making coordination inside cluster members. Collision can occur while two nodes in cluster try to access same channel at a time this happens when limited bandwidth shared among multiple nodes, sometimes bandwidth unused if node moves out of cluster without utilizing given slot. In contrast, proposed approach focused on position of node for channel allocation.The main intention is to analyse and assign optimal bandwidth for all nodes in cluster depends on exact usage irrespective of the channel request. In such methodology, initially cluster head (CH) analyses bandwidth which is needed for all members and same is requested on RSU for bandwidth and then RSU connected to base station. Later CH efficiently shares channel among nodes that are allotted by RSU, similarly all cluster heads can performs the same. In General for cluster with more vehicles time frame i given as CMax (i) = n-Ti * ([n/Ti]) (1) CMax – no of clusters Ti – Time frames n – size of available bandwidth cluster with less number of vehicles
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290 3158 CMin (i) = Ti *( [n/Ti] )– n (2) RSU allocates bandwidth to cluster head computed by (1) and (2).Every node in vanets inbuilt with global positioning system which provides accurate position, direction and velocity information timely update the CH table. Using table information CH take decisions. In our approach cluster is divided into two zones namely green and orange. Fig.1 proposed system model. TABLE 1. CH Table information. Two queues are used and maintained by CH, in which green queue stores information about vehicles in between start position and middle position, similarly orange queue maintains vehicles information in between middle position and end position as shown in Fig 2. CH1 contains 3 Vehicles in green queue and 4 vehicles in orange queue. Fig 2. Proposed system Queue Model.GQ – green queue, OQ-orange queue, CH – cluster head. Here our motive is to assign maximum slots for vehicles in GQ than vehicles in OQ irrespective of their requests, so that bandwidth would not waste. In such way, they stay more time in cluster and uses slots efficiently when compared with vehicles in OQ. So for optimal channel allocation between cluster member’s combination of round robin and priority scheduling algorithms are used. Finally this method achieved acceptable performance and computation also avoids drawbacks of existing timeslot allocation techniques. IV. ALGORITHM /* fair round robin & priority technique to allocate channel for all vehicles */ Var veh [max], BWreq [max] : initial vehicle vector. Var Ti : Time slots index. Var n : size of available bandwidth. Var GQ [max], OQ [max] : queues to store vehicles based on regions. Var Bwreq, Bwassg : bandwidth request and assign. Var CH : cluster head. do { //CH stores all bandwidth requests BWreq [max] w.r.t Veh [max]. For (i=1 to max) Initial slot allocation { Veh[i] = min slot.. } // Calculating actual channel requirement and assign slots for each vehicle. While (1) { J=1; If (pos[i] <MP) // checking position of each vehicle in table given by GPS. { GQ[j] =Veh[j]. //Assign two continuous channel slots. Given Priority for vehicles in GQ. } else { OQ[j] =Veh[j]. // Assign one channel slot. } j++; } } While (end); Node ID Zone Direction speed Required bandwidth 2 orange right 13.56,2.92m/s 10MHz 3 orange right 14.56,2.92m/s 15MHz 4 green right 15.56,2.92m/s 9MHz 5 green right 12.56,2.92m/s 10MHz
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290 3159 Fig 5. Bandwidth allocation between vehicles V. SIMULATION ENVIRONMENT TABLE 2. Simulation parameters and range of values VI. RESULTS This section shows results of our proposed system verified on NS2 simulator. Simulation results shows clearly that proposed method improves performance in terms of throughput, packet delivery ratio,collision rate is reduced and channel usage is very fair because allocation of slots totally depends on position so that vehicles at starting position will get more slots dynamically compared to end position in cluster. Graphs shows QOS metrice performaces increased interms of Throughput and Channel utlization, End to End delay is reducd overall transmission probability is maximized. Graph1. Channel Utlization Metric Graph 2. Through Put Metric Graph 3. End to End Delay Metric. Graph 4. Transmission Probability Metric Factor Range of Values Simulation Area 1.2 * 1.2 km² Inter vehicle distance 20m No. of Vehicles 300 Communication range 100-300m No. of vehicles in one cluster Max 20 Vehicle speed 10-60 mph
  • 5. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3156-3160 (2017) ISSN: 0975-0290 3160 VII. CONCLUSION Efficent channel utlization is required in VANETs because node mobility is high also topology changes frequently. In order to improve QOS requirements in this paper we proposed position based slot assignment protocol for cluster based vehicular Adhoc network, which assigns bandwidth slots effectively based on vehicle position in cluster.The simulation results shows that the PB-MAC outperforms in aspects of channel utlization,Throughput,End to End delay is reduced and overall network performances is increased. REFERENCES [1] “Routing in vehicular Ad hoc networks”, IEEE vehicular Technology magazine, June ,2007. [2] Bhagirathi Patel, Kyushu shah “A survey vehicular adhoc networks”, IOSR journal of computer engineering, Dec,2013. [3] Hadded , Laouiti , Zagrouba and Saidane “ TDMA- Based MAC Protocols for VANETs: A survey ,Issues “, IEEE 2015. [4] F. Yu and S. Biswas “VESOMAC: A self- reorganizing MAC protocol for inter-vehicle data transfer applications in vehicular ad hoc networks” IEEE 2007. [5] J. Zhang, Q. Zhang, and W. Jia “VC-MAC: A Cooperative MAC Protocol in Vehicular Networks” IEEE 2009. [6] N. Lu, Y. Ji, F. Liu, and X.Wang “DMMAC: A dedicated multi-channel MAC protocol design for VANET with adaptive broadcasting “ ,IEEE 2010. [7] Hang Su and Xi Zhang “Clustering-Based Multichannel MAC Protocols for QoS Provisioning’s Over Vehicular Ad Hoc Networks , 2012. [8] WeijieGuo, Liusheng Huang, Long Chen, HongliXu, and JietaoXie “ACFMAC: An Adaptive Collision-Free MAC Protocol Based on TDMA for Inter-Vehicular Communication”,IEE 2012. [9] H. A. Omar, W. Zhuang, and L. Li “VEMAC: A TDMA-based MAC protocol for reliable broadcast in VANETs ” ,IEEE 2013. [10] S.Bharati and W.Zhuang“CAHMAC: Cooperative Ad hoc MAC for vehicular networks”,IEEE journals 2013. [11] Y. Weidong, L. Pan, L. Yan, and Z. Hong song,” ATSA: Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks” ,IEEE 2013. [12] H. Yu, Z. He, and K. Niu “STDMA for vehicle-to- vehicle communication in a highway scenario” ,IEEE 2013. [13] D. N. M. Dang, H. N. Dang, V. Nguyen, Z. Htike, and C. S. Hong " HERMAC: A hybrid efficient and reliable MAC for vanets “ , IEEE 2014. [14] Minhdang and Seon Hong “VERMAC: An efficient and reliable MAC Protocol “ ,IEEE journals 2014. [15] Mohamed Hadded, Anis Laouiti, Rachid Zagrouba “DTMAC: A Fully Distributed TDMA based MAC Protocol for Vehicular Ad Hoc Networks” , IEEE 2015.