SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
69
Secured Seamless Wi-Fi Enhancement in
Dynamic Vehicles
M Lavanya1, M Selvaraj2
1Student, ME-Communication Systems,lavan21192@gmail.com,Valliammai Engineering
College,Potheri,Chennai 603203.
2AssistantProfessor(OG),selvaraj2k7@gmail.com,Dept ofECE,Valliammai
Engineering College,Potheri, Chennai 603203.
Abstract—At present, cellular networks provide ubiquitous
Internet connection, but with relatively expensive cost.
Furthermore, the cellular networks have been proven to be
insufficient for the surging amount of data from Internet-
enabled mobile devices. Due to the explosive growth of the
subscriber number and the mobile data, cellular networks are
suffering overload, and the users are experiencing service
quality degradation. In this project implement seamless and
efficient Wi-Fi based Internet access from moving vehicles.
In our proposed implementation, a group of APs are
employed to communicate with a client (called AP diversity),
and the transmission succeeds if any AP in the group
accomplishes the delivery with the client (called
opportunistic transmission). Such AP diversity and
opportunistic transmission are exploited to overcome the
high packet loss rate, which is achieved by configuring all
the APs with the same MAC and IP addresses. With such a
configuration, a client gets a graceful illusion that only one
(virtual) AP exists, and will always be associated with this
virtual AP. Uplink communications, when the client
transmits a packet to the virtual AP, actually multiple APs
within its transmission range are able to receive it. The
transmission is successful as long as at least one AP receives
the packet correctly. Proposed implementation will show that
outperforms existing schemes remarkably.
Keywords—ACK Detection, Internet Access, Vehicle, WiFi.
I. INTRODUCTION
At present, cellular networks (e.g., GPRS, 3 G, or LTE)
provide ubiquitous Internet connection, but with relatively
expensive cost. Furthermore, the cellular networks have
been proven to be insufficient for the surging amount of data
from Internet-enabled mobile devices [1]. Due to the
explosive growth of the subscriber number and the mobile
data, cellular networks are suffering overload, and the users
are experiencing service quality degradation.WiFi, based on
IEEE 802.11, is another technology to pro- vide wireless
connectivity. It has undergone rapid develop- ment and has
entered a new period of prosperity. To date, WiFi hotspots
are deployed widely and densely in many cities, and the
trend continues [2]. Compared with cellular networks, WiFi
has obvious advantages: lower cost and higher peak
throughput. Thus, WiFi is considered as a suitable solution
for cellular traffic offloading [2], [3]. However, it is still
challenging to provide WiFi-based Internet access for users
in moving vehicles. The reasons are elaborated as
follows.First, channel condition in a vehicular environment
is usually harsh owing to severe multi-path fading,
interference, and noise, which results in high packet loss
rate. Second, since a client moves at a vehicular speed, it is
extremely difficult for it to be always associated with the
most appropriate AP. Third, due to the limited coverage
of each single AP, a client suffers from frequent connection
disruptions caused by handoffs and re-associations.In the
first stage, the packet is pushed to a group of APs through
multicast rather than being pushed to the client directly
through unicast. This AP multicast group is maintained
dynamically to follow the moving client. In the second stage,
the client then sends periodical requests to APs to fetch its
packet buffered in the AP group. This two- stage strategy
maintains stable end-to-end downlink communications for
the client in a moving vehicle.
The advantages are given below:
1) By exploiting the AP diversity and opportunistic
transmission, the link reliability is enhanced, and
packet loss is significantly reduced.
2) An ACK detection function is designed to
eliminate the adverse effect of multiple ACKs. This
function ensures that ACK-based rate control
mechanisms can be adopted is to improve the
efficiency of the channel utilization.
3) By configuring all APs with the same setting, both
layer-2 and layer-3 handoffs of the mobile client are
eliminated, and seamless roaming within the cover-
age of the entire network is achieved.
II. ARCHITECTURE OF THESYSTEM
In this work, we consider a scenario (as demonstrated in
Fig. 1 that a road is completely covered by open WiFi
access points (APs), and coverage of each AP may
overlap with others. Each AP in Fig1 is equipped with two
interfaces; one is for client access based on WiFi, while the
other uses wired or wireless medium to form a backhaul.
Hence, the back- haul can be either a local area network
(LAN) or a wireless mesh network. The backhaul connects
to the Internet through a gateway.It is assumed that both
bandwidth and reliability of backhaul links are higher than
that of access links, and packet loss in backhaul is
negligible. Moreover, only the traffic between clients and
the Internet is taken into account in this paper.When APs
have established routing paths to the gateway, the backhaul
is organized into a tree topology with the gateway as the
root and APs as leaves.
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
70
In [8], the researchers conduct a large number of
measurements in real vehicular environments, and
the following experimental observations are
revealed:
1) Gray-zone behavior (i.e., intermediate
packet loss rate) is a dominatingphenomenon;
2) Temporal correlation is weak;
3) Spatial correlation is weak;
Since packet loss is severe in vehicular environments, AP
diversity and opportunistic transmission are designed to
enhance transmission reliability. More specifically, the back-
haul network works as a conventional method does, while the
interface for client access of each AP is configured with the
same parameters as those of others, including the MAC
address, the IP address, the wireless channel, and the ESSID.
With such settings, a client gets a graceful illusion that there
exists only one AP (i.e., the “virtual” AP) in the
environment. When the client intends to join the network, it
is associated with this virtual AP, and requests an IP address
through DHCP. The DHCP server running at each AP uses
the same hash function to compute a unique IP address
for the client based on the its MAC address. The hash
function maps a MAC address to a class A private IP address
in the form of 10.A.B.C. The default gateway on the client is
set to the IP address of the virtual AP. When the client
transmits a packet to the virtual AP, actually multiple APs
within its transmission range are able to receive the packet.
Owing to weak temporal and spatial correlation, the
receptions of different APs can be viewed to be indepen-
dent. When an AP misses a packet, its neighbor AP may
receive it. As long as the packet is received by one AP, it can
be forwarded to the Internet, and thus the successful
transmission probability increases.
Fig.1. Two APs within the transmission range of the client.
It is assumed that S1 < S2. Hence, when both AP1 and
AP2 reply ACKs to the client, the two ACKs partially
overlaps as sketched in Fig 1.The duration from the
arrival of the first ACK to the arrival of the last ACK,
referred to as arrival time difference, where T1 and T2 are
the signal propagation time from the client to AP1 and
AP2, respectively.
III. WORK DESCRIPTION
A. INITIALIZE VIRTUAL AP
Configuring all the APs with the same MAC and IP
addresses with such a configuration, a client gets a
graceful illusion that only one (“virtual”) AP exists, and
will always be associated with this “virtual” AP. When APs
have established routing paths to the gateway, the backhaul
is organized into a tree topology with the gateway as the
root and APs as leaves. A group of APs are employed to
communicate with a client (called “AP diversity”). The
identical configuration of all the APs has advantage: both
IP-layer and MAC-layer handoff are eliminated. Hence,
connection disruptions caused by the handoffs and re-
associations are avoided, and the network connection will
not be disrupted even if an AP crashes. A potential
requirement of AP diversity is that all APs operate on the
same wireless channel.
B. CLIENT JOINING
When the client intends to join the network, it is associated
with this virtual AP, and requests an IP address through
DHCP (Dynamic Host Configuration Protocol). The DHCP
server running at each AP uses the same hash function to
compute a unique IP address for the client based on the its
MAC address. DHCP is a client/server protocol that
automatically provides an Internet Protocol (IP) host with
its IP address and other related configuration information
such as the subnet mask and default gateway. The DHCP is
a standardized network protocol used on Internet Protocol
(IP) networks for dynamically distributing network
configuration parameters, such as IP addresses for
interfaces and services. With DHCP, computers request IP
addresses and networking parameters automatically from a
DHCP server, reducing the need for a network administrator
or a user to configure these settings manually.
Fig.2 . Client Joining Process Flow Diagram
C.UPLINK COMMUNICATION
The uplink communications, when the client transmits a packet
to the virtual AP, actually multiple APs within its transmission
range are able to receive it. These problems overcome
following ways:
1) ACK Detection Scheme and
2) Transmission Redundancy.
D.ACK DETECTION SCHEME
If multiple APs receive a packet, each of them will transmit an
ACK after a period of short inter-frame space (SIFS). These
multiple copies of ACKs (Acknowledgements) may collide at
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
71
the client. Hence, a new scheme is designed to handle such
collisions. In the new scheme, the ACK decoding is enhanced
with ACK detection. In this scheme the strength of one signal
is considerably higher than the strength of the other one.
Under the condition, the weak signal is dropped by the filter of
the receiver, and only the strong signal is etained
tobedecoded.
Fig.3. Acknowledgement(ACK)Detection Scheme Flowchart
E. TRANSMISSION REDUNDANCY
A packet can be received by multiple APs. If all copies of the
same packet are forwarded to the gateway, extra overhead is
introduced to the backhaul. In order to minimize TRR, a
redundancy removal mechanism is used. If an intermediate
node in the backhaul network receives a packet that has been
forwarded, it simply drops the duplicated packet. To
determine whether a packet has been delivered before, a few
fields of the packet are checked to identify the packet. In a
LAN backhaul, the APs are interconnected by cables, hubs
and switches.When a node transmits a packet to its upper-
layer node, other nodes in the same subnet can overhear the
packet as well. Thus, these node are able to directly avoid
redundant transmissions. In a WMN backhaul, one AP may
not overhear the backhaul transmission of a packet from
another AP. In this case, two APs may forward the same
packet to an upper-layer node. Such redundancy has to be
eliminated at the upper-layer node.
Fig.4. Transmission Redundancy Flowchart
F.DOWNLINK COMMUNICATION
The downlink communication is divided into two stages. In the
first stage, packets destined for a client are delivered to a
group of APs through multicast. This AP multicast group is
maintained dynamically to follow the moving client. In the
second stage, the client periodically sends downlink packet
requests (DPRs) to fetch its packets buffered in the AP group.
The introduction of DPR brings two benefits. First, it helps
APs to locate the moving client, even if the client has no
uplink packets to transmit. Second, it probes the channel
quality. Due to the strong symmetric correlation of wireless
links, if an AP receives a DPR from a client and transmits a
packet to the client immediately, it is with high probability
that the packet can be received by the client. This two-stage
strategy significantly reduces unnecessary transmissions when
channel condition is poor, dramatically improves the downlink
transmission efficiency.
IV. PERFORMANCE CLASSIFICATION
The performance can be classified into three categories. The
differences between our solution and the representative
schemes in each category are explained below. Internet access
from moving vehicles. With a rapid growth of demand for
Internet access from moving vehicles, researchers come up
with a number of solutions based on the cellular networks or
the WiFi networks. MAR [4] is a cellular- based solution,
while MobTorrent [5] and Wiffler [3] jointly consider cellular
networks and WiFi networks by utilizing their complementary
functions.Measurement studies of WiFi connectivity in the
vehicular environments can be found in [6], [7] and [8]. Drive-
thru Internet [9] and Cabernet [10] are designed to maximize
the transmission opportunity and link utilization in a network
with sparse AP deployment and intermittent connectivity.
Several literatures propose particular methods for file
uploading [11] or downloading [12] of vehicular clients
respectively. IEEE 802.11p standard [13] has been released to
support wireless access in vehicular networks,and many
studies are based on this standard, e.g.,
[14].The major difference between the above references and
our work takes advantage of AP diversity to overcome the
issue of unreliable links and unstable connections. AP
diversity. The association scheme in the WiFi context is
inflexible, i.e., a client is associated with a certain AP at any
time. The consequence of this limitation is that, if the
associated AP of the client receives a packet with errors, the
transmission fails even if a neighboring AP overhears the
packet successfully. In order to benefit from the broadcast
nature of the wireless links, a number of works (such as [15],
[16], [17], [18]) exploit AP diversity to improve system
performance.MRD[15] recovers a frame from multiple
erroneous copies of the frame without retransmission in
enterprise WLAN deployment. Our previous work [16]
represents a network-leading association scheme for WiFi-
based wire- less mesh networks (WMNs). In [16], the access
interfaces of all the mesh APs are set to the identical MAC
address, IP address, ESSID and channel, thus multiple APs
can receive packets from a client. To reduce transmission
redundancy and avoid ACK collisions, the most appropriate
AP is selected adaptively to forward the packets to the
gateway, and return ACKs to the client. The ACK functions of
other APs are disabled for the client. Similar to [16], APs in
OmniVoice [17] also broadcast the same ESSID and MAC
address in their beacons, but the ACK collision issue is
notconsidered in this scheme. In [18], a protocol called WiFi
opportunistically exploits AP diversity to minimize
disruptions of mobile services. In this protocol, a vehicle
designates one of the nearby APs as the anchor, which is
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
72
responsible for the vehicle’s connection to the Internet. Other
nearby APs are selected as auxiliaries. The transmitter uses
MAC-layer broadcast so that packets can be received by
multiple APs. Hence, it has to send packets at the lowest bit-
rate in broadcast, which leads to longer channel holding time.
If an auxiliary overhears a packet, but has not heard a
customized ACK within a small window, it probabilistically
relays the packet to the anchor. The transmission from the
auxiliary to the anchor incurs extra delay and overhead.In our
proposed system, the AP diversity is achieved in the same way
as [16]. To avoid performance degradation caused by possible
collision of ACKs from different APs, the ACK decoding at
the client side is enhanced with an ACK detection function.
Therefore, ACKbased rate control mechanisms can be easily
applied to improve wireless channel utilization. The
transmission succeeds if at least one AP receives the packet
correctly, which also increases the efficiency.Fast handoff in
WiFi networks. The mobility of clients make fast handoff
become a critical issue in WiFi networks. A number of papers
aim at minimizing the handoff delay in WLANs [17], [19],
[20] and WMNs [16]. Several approaches (e.g., SyncScan [19]
and Proactive Scan [20]) reduce handoff delay by decoupling
the time-consuming channel scan from the actual handoff. As
previously men- tioned, client handoff delay is eliminated in
[16] and [17] in that APs have exactly the same configuration.
Fig.5. An example scenario
An interference map needs to be generated in [17], while an
appropriate AP needs to be selected to serve a client in [16].
Both of them are unfit for highly dynamic vehicular envi-
ronments. In SMesh [20], the mesh node, which believes it has
the best connectivity with the client, sends a gratuitous ARP
message to the client. The client then updates its ARP cache,
and the handoff is accomplished. Moreover, IEEE 802.11r
standard [20] has been promulgated to reduce hand- off delay
to support realtime applications, such as VoIP.
V. SIMULATION TOOL
NS (version 2) is an object-oriented, discrete event driven
network simulator developed at UC Berkely written in C++
and OTcl. NS is primarily useful for simulating local and wide
area networks. Although NS is fairly easy to use once you get
to know the simulator, it is quite difficult for a first time user,
because there are few user-friendly manuals. Even though
there is a lot of documentation written by the developers
which has in depth explanation of the simulator, it is written
with the depth of a skilled NS user.The purpose of this project
is to give a new user some basic idea of how the simultor
works, how to setup simulation networks, where to look for
further information about network components in simulator
codes, how to create new network components, etc., mainly by
giving simple examples and brief explanations based on our
experiences. Although all the usage of the simulator or
possible network simulation setups may not be covered in this
project, the project should help a new user to get started
quickly.NS is an event driven network simulator developed at
UC Berkeley that simulates variety of IP networks.
Itimplements network protocols such as TCP and UPD,
trafficsource behavior such as FTP, Telnet, Web, CBR and
VBR, router queue management mechanism such as DropTail,
RED and CBQ, routing algorithms such as Dijkstra, and more.
NS also implements multicasting and some of the MAC layer
protocols for LAN simulations.
Fig.6. Simplified View of NS
As shown in Figure in a simplified view, NS is Object-oriented
Tcl (OTcl) script interpreter that has a simulation event
scheduler and network component object libraries, and
network setup (plumbing) module libraries (actually,
plumbing modules are implemented as member functions of
the base simulator object). In other words, to use NS, you
program in OTcl script language. To setup and run a
simulation network, a user should write an OTcl script that
initiates an event scheduler, sets up the network topology
using the network objects and the plumbing functions in the
library, and tells traffic sources when to start and stop
transmitting packets through the event scheduler.
Fig.7. C++ and OTcl: The Duality
NS is written not only in OTcl but in C++ also. For efficiency
reason, NS separates the data path implementation from
control path implementations. In order to reduce packet and
event processing time (not simulation time), the event
scheduler and the basic network component objects in the data
path are written and compiled using C++. These compiled
objects are made available to the OTcl interpreter through an
OTcl linkage that creates a matching OTcl object for each of
the C++ objects and makes the control functions and the
configurable variables specified by the C++ object act as
member functions and member variables of the corresponding
OTcl object. In this way, the controls of the C++ objects are
given to OTcl. It is also possible to add member functions and
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
73
variables to a C++ linked OTcl object. The objects in C++ that
do not need to be controlled in a simulation or internally used
by another object do not need to be linked to OTcl. Likewise,
an object (not in the data path) can be entirely implemented in
Figure 8 shows the general architecture of NS. In this figure a
general user (not an NS developer) can be thought of standing
at the left bottom corner, designing and running simulations in
Tcl using the simulator objects in the OTcl library.
The event schedulers and most of the network components are
implemented in C++ and available to OTcl through an OTcl
linkage that is implemented using tclcl. The whole thing
together makes NS, which is a OO extended Tcl interpreter
with network simulator libraries.This section briefly examined
the general structure and architecture of NS. At this point, one
might be wondering about how to obtain NS simulation
results. As shown in Figure 7, when a simulation is finished,
NS produces one or more text-based output files that contain
detailed simulation data, if specified to do so in the input Tcl
(or more specifically, OTcl) script. The data can be used for
simulation analysis (two simulation result analysis examples
are presented in later sections) or as an input to a graphical
simulation display tool called Network Animator (NAM) .
NAM has a nice graphical user interface similar to that of a
CD player (play, fast forward, rewind, pause and so on), and
also has a display speed controller. Furthermore, it can
graphically present information such as throughput and
number of packet drops at each link, although the graphical
information cannot be used for accurate simulation analysis.
Network simulator (NS) is an object– oriented, discrete event
simulator for networking research. NS provides substantial
support for simulation of TCP, routing and multicast protocols
over wired and wireless networks. The simulator is a result of
an ongoing effort of research and developed. Even though
there is a considerable confidence in NS, it is not a polished
product yet and bugs are being discovered and corrected
continuously.
On the other hand, one disadvantage is that modifying and
extending the simulator requires programming and debugging
in both languages.
NS can simulate the following:
1) Topology: Wired, wireless
2) Sheduling Algorithms: RED, Drop Tail,
3) Transport Protocols: TCP, UDP
4) Routing: Static and dynamic routing
5) Application: FTP, HTTP, Telnet, Traffic generators
Trace analysis. Running the TCL script generates a NAM trace
file that is going to be used as an input to NAM and a trace file
called "out.tr"
Fig.8. Architectural View of NS
that will be used for our simulation analysis. Figure shows the
trace format and example trace DATA from "out.tr". Where
each line in trace file represents an event associated to a
packet.
VI. SIMULATION RESUTS
Now a day, WIFI hotspots are deployed widely and densely in
many cities and the trend continues. Compared with cellular
networks, WIFI has obvious advantages: lower cost and higher
peak throughput. Thus, WIFI is considered as a suitable
solution for cellular traffic offloading. However, it is still
challenging to provide WIFI -based Internet access for users in
moving vehicles. The above problems solve our proposed
system concept. To support seamless and efficient WIFI-based
Internet access for moving vehicles. It consists of innovative
protocols in both uplink and downlink.Seamless roaming of
clients was gracefully achieved, while channel utilization
efficiency was dramatically improved.Will prove high
performance of compared to existing system.This work
presents a coexistence study between DVB-T2 broadcasting
services and IEEE 802.11p transmissions in the UHF TV
channels in urban environments. A first measurement series
allowed assessing the maximum transmission power level of
an IEEE 802.11p signal while assuring the integrity of the
DTT services for the typical MFN and SFN operation modes
of a real DVB-T2 broadcasting network. To assure the
protection of the DTT systems the reception quality was
quantified assuming the absence of a picture failure during a
minimum observation time of 30 seconds.The results obtained
for the investigated DVB-T2 transmission modes suggest that
the effect of the 802.11p adjacent interference changes with its
configuration. For the tested DVB-T2 receiver the worst
operative case has been considered. The 802.11p interfering
signal was initially set to a power level of -20 dB below the
sensibility of the tested receiver and then adjusted at the
output of the SDR board to achieve the required degradation
(PF point) of the received and decoded TV signal.
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.69-74
ISSN: 2278-2400
74
VII. CONCLUSION
Hence the system proposed in this paper to support seam- less
and efficient WiFi-based Internet access for moving vehicles.
It consists of innovative protocols in both uplink and
downlink. Seamless roaming of clients was gracefully
achieved, while channel utilization efficiency was
dramatically improved. Experimental results from both real
testbed and simulations revealed feasibility and effectiveness
of the technique specified.
REFERENCES
[1] Ahmed. N, Keshav. S, and Papagiannaki. K (2011),“Omnivoice: A
mobile voice solution for small-scale enterprises,” in Proc. 12th ACM
Int. Symp. Mobile Ad Hoc Netw. Comput., pp. 1–11
[2] Aijaz. A, Aghvami. H, and Amani. M (April 2013), “Adaptive
Frequency Hopping Algorithm for Mulitcast Rendezvous in DSA
Network,” IEEE Wireless Commun., vol. 20, no. 2,pp. 104–112.
[3] Bai. F, Stancil. D, and Krishnan. H (2010),“Toward understanding
characteristics of Dedicated Short Range Communications (DSRC)
from a perspective of vehicular network engineers,” in Proc. 16th
Annu. Int. Conf. Mobile Comput. Netw.,pp. 329–340.
[4] Balasubramanian. A, Mahajan. R, and Venkataramani. R (2010),
“Channel Hopping based Communication Rendezvous in Cognitive
Radio System,” in Proc. ACM 8th Int. Conf. Mobile Syst, Appl.
Services, pp. 209–222.
[5] Balasubramanian. A, Mahajan. R, Venkataramani. R,Levine. B, and
Zahorjan. J (2008), “Interactive wifi connectivity for moving vehicles,”
in Proc. ACM SIGCOMM,pp. 427–438.
[6] Balasubramanian. A , Zhou. Y, Croft. W, Levine. B, and
Venkataramani. A (2007),“Web search from a bus,” in Proc. ACM 2nd
ACM Workshop Challenged Netw., pp. 59–66.
[7] Bychkovsky. V, Hull. B, Miu. A, Balakrishnan. H, and Madden. S
(2006), “A measurement study of vehicular internet access using in situ
wi-fi networks,” in Proc. ACM 12th Annu. Int. Conf. Mobile Comput.
Netw.,pp. 50–61.
[8] Cheung. M, Hou. F, Wong. V, and Huang. J (May 2012),“ Dynamic
optimal random access for vehicle-to-roadside communications,” IEEE
J. Sel. Areas Commun., vol. 30, no. 4, pp. 792–803.
[9] Chen. B and Chan. M (2009),“Mobtorrent: A framework for mobile
internet access from vehicles,” in Proc. IEEE INFOCOM, pp. 1404–
1412.
[10] Eriksson. J, Balakrishnan. H, and Madden. S (May 2012),“Cabernet:
Vehicular content delivery using wifi,” in Proc. ACM 14th ACM Int.
Conf. Mobile Comput. Netw., pp. 199–210.
[11] Gozalvez. J, Sepulcre. M, and Bauza. R (May 2012),“IEEE 802.11p
vehicle to infrastructure communications in urban environments,”
IEEE Commun. Mag., vol. 50, no. 5,pp. 176–183.
[12] Lv. P, Wang. X, Xu. M, and Chen. Y (2011), “Network-leading
association scheme in ieee 802.11 wireless mesh networks,” in Proc.
IEEE Int.Cnf. Commun.
[13] Mahajan. R, Zahorjan. J, and Zill. B (2007),“Understanding wifi-based
connectivity from moving vehicles,” in Proc. 7th ACM SIGCOMM
Conf. Internet Meas., pp. 321–326.
[14] Miu. A, Balakrishnan. H, and Koksal. C (2005), “Improving loss
resilience with multi-radio diversity in wireless networks,” in Proc.
ACM 11th Annu. Int. Conf. Mobile Comput. Netw.,pp. 16–30.
[15] Ott. J and Kutscher. D (2004),“Drive-thru internet: IEEE 802.11b for
‘automobile’ users,” in Proc. IEEE INFOCOM, pp. 362–373.
[16] Pin Lv, Xudong Wang, Xiuhui Xue and Ming Xu ( May
2015),“Seamless and Efficient Wi-Fi based Internet Access from
Moving Vehicles,”IEEE Transactions on Mobile Computing., vol.
14,no. 5.
[17] Ramani. I and Savage. S (2005),“Syncscan: Practical fast handoff for
802.11 infrastructure networks,” in Proc. IEEE INFOCOM, vol. 1, pp.
675–684.
[18] Rodriguez. P, Chakravorty. R, Chesterfield. J, Pratt. I, and Banerjee. S
(2004), “Interference Issues for VANETs Communication in the
TVWS in Urban Environments,”in Proc. ACM2nd Int. Conf.Mobile
Syst., Appl. Services, pp. 217–230.
[19] Wu. H, Tan. K, Zhang. Y, and Zhang. Q (2007), “Proactive scan: Fast
handoff with smart triggers for 802.11 wireless lan,” in Proc. IEEE
INFOCOM, pp. 749–757.

Weitere ähnliche Inhalte

Ähnlich wie Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles

Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo s
Pfedya
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
CSCJournals
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ijgca
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
IJRAT
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
IJRAT
 
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
IJTET Journal
 

Ähnlich wie Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles (20)

Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo s
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
General Model for Single and Multiple Channels WLANs with Quality of Service...
 General Model for Single and Multiple Channels WLANs with Quality of Service... General Model for Single and Multiple Channels WLANs with Quality of Service...
General Model for Single and Multiple Channels WLANs with Quality of Service...
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
 
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
 
Paper id 2720145
Paper id 2720145Paper id 2720145
Paper id 2720145
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
Performance evaluation for outdoor wireless scenarios based on IEEE 802.11b/g...
Performance evaluation for outdoor wireless scenarios based on IEEE 802.11b/g...Performance evaluation for outdoor wireless scenarios based on IEEE 802.11b/g...
Performance evaluation for outdoor wireless scenarios based on IEEE 802.11b/g...
 

Mehr von ijcnes

Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
ijcnes
 

Mehr von ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 

Kürzlich hochgeladen

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles

  • 1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 69 Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles M Lavanya1, M Selvaraj2 1Student, ME-Communication Systems,lavan21192@gmail.com,Valliammai Engineering College,Potheri,Chennai 603203. 2AssistantProfessor(OG),selvaraj2k7@gmail.com,Dept ofECE,Valliammai Engineering College,Potheri, Chennai 603203. Abstract—At present, cellular networks provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet- enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient Wi-Fi based Internet access from moving vehicles. In our proposed implementation, a group of APs are employed to communicate with a client (called AP diversity), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called opportunistic transmission). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the APs with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (virtual) AP exists, and will always be associated with this virtual AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. The transmission is successful as long as at least one AP receives the packet correctly. Proposed implementation will show that outperforms existing schemes remarkably. Keywords—ACK Detection, Internet Access, Vehicle, WiFi. I. INTRODUCTION At present, cellular networks (e.g., GPRS, 3 G, or LTE) provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet-enabled mobile devices [1]. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation.WiFi, based on IEEE 802.11, is another technology to pro- vide wireless connectivity. It has undergone rapid develop- ment and has entered a new period of prosperity. To date, WiFi hotspots are deployed widely and densely in many cities, and the trend continues [2]. Compared with cellular networks, WiFi has obvious advantages: lower cost and higher peak throughput. Thus, WiFi is considered as a suitable solution for cellular traffic offloading [2], [3]. However, it is still challenging to provide WiFi-based Internet access for users in moving vehicles. The reasons are elaborated as follows.First, channel condition in a vehicular environment is usually harsh owing to severe multi-path fading, interference, and noise, which results in high packet loss rate. Second, since a client moves at a vehicular speed, it is extremely difficult for it to be always associated with the most appropriate AP. Third, due to the limited coverage of each single AP, a client suffers from frequent connection disruptions caused by handoffs and re-associations.In the first stage, the packet is pushed to a group of APs through multicast rather than being pushed to the client directly through unicast. This AP multicast group is maintained dynamically to follow the moving client. In the second stage, the client then sends periodical requests to APs to fetch its packet buffered in the AP group. This two- stage strategy maintains stable end-to-end downlink communications for the client in a moving vehicle. The advantages are given below: 1) By exploiting the AP diversity and opportunistic transmission, the link reliability is enhanced, and packet loss is significantly reduced. 2) An ACK detection function is designed to eliminate the adverse effect of multiple ACKs. This function ensures that ACK-based rate control mechanisms can be adopted is to improve the efficiency of the channel utilization. 3) By configuring all APs with the same setting, both layer-2 and layer-3 handoffs of the mobile client are eliminated, and seamless roaming within the cover- age of the entire network is achieved. II. ARCHITECTURE OF THESYSTEM In this work, we consider a scenario (as demonstrated in Fig. 1 that a road is completely covered by open WiFi access points (APs), and coverage of each AP may overlap with others. Each AP in Fig1 is equipped with two interfaces; one is for client access based on WiFi, while the other uses wired or wireless medium to form a backhaul. Hence, the back- haul can be either a local area network (LAN) or a wireless mesh network. The backhaul connects to the Internet through a gateway.It is assumed that both bandwidth and reliability of backhaul links are higher than that of access links, and packet loss in backhaul is negligible. Moreover, only the traffic between clients and the Internet is taken into account in this paper.When APs have established routing paths to the gateway, the backhaul is organized into a tree topology with the gateway as the root and APs as leaves.
  • 2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 70 In [8], the researchers conduct a large number of measurements in real vehicular environments, and the following experimental observations are revealed: 1) Gray-zone behavior (i.e., intermediate packet loss rate) is a dominatingphenomenon; 2) Temporal correlation is weak; 3) Spatial correlation is weak; Since packet loss is severe in vehicular environments, AP diversity and opportunistic transmission are designed to enhance transmission reliability. More specifically, the back- haul network works as a conventional method does, while the interface for client access of each AP is configured with the same parameters as those of others, including the MAC address, the IP address, the wireless channel, and the ESSID. With such settings, a client gets a graceful illusion that there exists only one AP (i.e., the “virtual” AP) in the environment. When the client intends to join the network, it is associated with this virtual AP, and requests an IP address through DHCP. The DHCP server running at each AP uses the same hash function to compute a unique IP address for the client based on the its MAC address. The hash function maps a MAC address to a class A private IP address in the form of 10.A.B.C. The default gateway on the client is set to the IP address of the virtual AP. When the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive the packet. Owing to weak temporal and spatial correlation, the receptions of different APs can be viewed to be indepen- dent. When an AP misses a packet, its neighbor AP may receive it. As long as the packet is received by one AP, it can be forwarded to the Internet, and thus the successful transmission probability increases. Fig.1. Two APs within the transmission range of the client. It is assumed that S1 < S2. Hence, when both AP1 and AP2 reply ACKs to the client, the two ACKs partially overlaps as sketched in Fig 1.The duration from the arrival of the first ACK to the arrival of the last ACK, referred to as arrival time difference, where T1 and T2 are the signal propagation time from the client to AP1 and AP2, respectively. III. WORK DESCRIPTION A. INITIALIZE VIRTUAL AP Configuring all the APs with the same MAC and IP addresses with such a configuration, a client gets a graceful illusion that only one (“virtual”) AP exists, and will always be associated with this “virtual” AP. When APs have established routing paths to the gateway, the backhaul is organized into a tree topology with the gateway as the root and APs as leaves. A group of APs are employed to communicate with a client (called “AP diversity”). The identical configuration of all the APs has advantage: both IP-layer and MAC-layer handoff are eliminated. Hence, connection disruptions caused by the handoffs and re- associations are avoided, and the network connection will not be disrupted even if an AP crashes. A potential requirement of AP diversity is that all APs operate on the same wireless channel. B. CLIENT JOINING When the client intends to join the network, it is associated with this virtual AP, and requests an IP address through DHCP (Dynamic Host Configuration Protocol). The DHCP server running at each AP uses the same hash function to compute a unique IP address for the client based on the its MAC address. DHCP is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. The DHCP is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP, computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually. Fig.2 . Client Joining Process Flow Diagram C.UPLINK COMMUNICATION The uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. These problems overcome following ways: 1) ACK Detection Scheme and 2) Transmission Redundancy. D.ACK DETECTION SCHEME If multiple APs receive a packet, each of them will transmit an ACK after a period of short inter-frame space (SIFS). These multiple copies of ACKs (Acknowledgements) may collide at
  • 3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 71 the client. Hence, a new scheme is designed to handle such collisions. In the new scheme, the ACK decoding is enhanced with ACK detection. In this scheme the strength of one signal is considerably higher than the strength of the other one. Under the condition, the weak signal is dropped by the filter of the receiver, and only the strong signal is etained tobedecoded. Fig.3. Acknowledgement(ACK)Detection Scheme Flowchart E. TRANSMISSION REDUNDANCY A packet can be received by multiple APs. If all copies of the same packet are forwarded to the gateway, extra overhead is introduced to the backhaul. In order to minimize TRR, a redundancy removal mechanism is used. If an intermediate node in the backhaul network receives a packet that has been forwarded, it simply drops the duplicated packet. To determine whether a packet has been delivered before, a few fields of the packet are checked to identify the packet. In a LAN backhaul, the APs are interconnected by cables, hubs and switches.When a node transmits a packet to its upper- layer node, other nodes in the same subnet can overhear the packet as well. Thus, these node are able to directly avoid redundant transmissions. In a WMN backhaul, one AP may not overhear the backhaul transmission of a packet from another AP. In this case, two APs may forward the same packet to an upper-layer node. Such redundancy has to be eliminated at the upper-layer node. Fig.4. Transmission Redundancy Flowchart F.DOWNLINK COMMUNICATION The downlink communication is divided into two stages. In the first stage, packets destined for a client are delivered to a group of APs through multicast. This AP multicast group is maintained dynamically to follow the moving client. In the second stage, the client periodically sends downlink packet requests (DPRs) to fetch its packets buffered in the AP group. The introduction of DPR brings two benefits. First, it helps APs to locate the moving client, even if the client has no uplink packets to transmit. Second, it probes the channel quality. Due to the strong symmetric correlation of wireless links, if an AP receives a DPR from a client and transmits a packet to the client immediately, it is with high probability that the packet can be received by the client. This two-stage strategy significantly reduces unnecessary transmissions when channel condition is poor, dramatically improves the downlink transmission efficiency. IV. PERFORMANCE CLASSIFICATION The performance can be classified into three categories. The differences between our solution and the representative schemes in each category are explained below. Internet access from moving vehicles. With a rapid growth of demand for Internet access from moving vehicles, researchers come up with a number of solutions based on the cellular networks or the WiFi networks. MAR [4] is a cellular- based solution, while MobTorrent [5] and Wiffler [3] jointly consider cellular networks and WiFi networks by utilizing their complementary functions.Measurement studies of WiFi connectivity in the vehicular environments can be found in [6], [7] and [8]. Drive- thru Internet [9] and Cabernet [10] are designed to maximize the transmission opportunity and link utilization in a network with sparse AP deployment and intermittent connectivity. Several literatures propose particular methods for file uploading [11] or downloading [12] of vehicular clients respectively. IEEE 802.11p standard [13] has been released to support wireless access in vehicular networks,and many studies are based on this standard, e.g., [14].The major difference between the above references and our work takes advantage of AP diversity to overcome the issue of unreliable links and unstable connections. AP diversity. The association scheme in the WiFi context is inflexible, i.e., a client is associated with a certain AP at any time. The consequence of this limitation is that, if the associated AP of the client receives a packet with errors, the transmission fails even if a neighboring AP overhears the packet successfully. In order to benefit from the broadcast nature of the wireless links, a number of works (such as [15], [16], [17], [18]) exploit AP diversity to improve system performance.MRD[15] recovers a frame from multiple erroneous copies of the frame without retransmission in enterprise WLAN deployment. Our previous work [16] represents a network-leading association scheme for WiFi- based wire- less mesh networks (WMNs). In [16], the access interfaces of all the mesh APs are set to the identical MAC address, IP address, ESSID and channel, thus multiple APs can receive packets from a client. To reduce transmission redundancy and avoid ACK collisions, the most appropriate AP is selected adaptively to forward the packets to the gateway, and return ACKs to the client. The ACK functions of other APs are disabled for the client. Similar to [16], APs in OmniVoice [17] also broadcast the same ESSID and MAC address in their beacons, but the ACK collision issue is notconsidered in this scheme. In [18], a protocol called WiFi opportunistically exploits AP diversity to minimize disruptions of mobile services. In this protocol, a vehicle designates one of the nearby APs as the anchor, which is
  • 4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 72 responsible for the vehicle’s connection to the Internet. Other nearby APs are selected as auxiliaries. The transmitter uses MAC-layer broadcast so that packets can be received by multiple APs. Hence, it has to send packets at the lowest bit- rate in broadcast, which leads to longer channel holding time. If an auxiliary overhears a packet, but has not heard a customized ACK within a small window, it probabilistically relays the packet to the anchor. The transmission from the auxiliary to the anchor incurs extra delay and overhead.In our proposed system, the AP diversity is achieved in the same way as [16]. To avoid performance degradation caused by possible collision of ACKs from different APs, the ACK decoding at the client side is enhanced with an ACK detection function. Therefore, ACKbased rate control mechanisms can be easily applied to improve wireless channel utilization. The transmission succeeds if at least one AP receives the packet correctly, which also increases the efficiency.Fast handoff in WiFi networks. The mobility of clients make fast handoff become a critical issue in WiFi networks. A number of papers aim at minimizing the handoff delay in WLANs [17], [19], [20] and WMNs [16]. Several approaches (e.g., SyncScan [19] and Proactive Scan [20]) reduce handoff delay by decoupling the time-consuming channel scan from the actual handoff. As previously men- tioned, client handoff delay is eliminated in [16] and [17] in that APs have exactly the same configuration. Fig.5. An example scenario An interference map needs to be generated in [17], while an appropriate AP needs to be selected to serve a client in [16]. Both of them are unfit for highly dynamic vehicular envi- ronments. In SMesh [20], the mesh node, which believes it has the best connectivity with the client, sends a gratuitous ARP message to the client. The client then updates its ARP cache, and the handoff is accomplished. Moreover, IEEE 802.11r standard [20] has been promulgated to reduce hand- off delay to support realtime applications, such as VoIP. V. SIMULATION TOOL NS (version 2) is an object-oriented, discrete event driven network simulator developed at UC Berkely written in C++ and OTcl. NS is primarily useful for simulating local and wide area networks. Although NS is fairly easy to use once you get to know the simulator, it is quite difficult for a first time user, because there are few user-friendly manuals. Even though there is a lot of documentation written by the developers which has in depth explanation of the simulator, it is written with the depth of a skilled NS user.The purpose of this project is to give a new user some basic idea of how the simultor works, how to setup simulation networks, where to look for further information about network components in simulator codes, how to create new network components, etc., mainly by giving simple examples and brief explanations based on our experiences. Although all the usage of the simulator or possible network simulation setups may not be covered in this project, the project should help a new user to get started quickly.NS is an event driven network simulator developed at UC Berkeley that simulates variety of IP networks. Itimplements network protocols such as TCP and UPD, trafficsource behavior such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism such as DropTail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also implements multicasting and some of the MAC layer protocols for LAN simulations. Fig.6. Simplified View of NS As shown in Figure in a simplified view, NS is Object-oriented Tcl (OTcl) script interpreter that has a simulation event scheduler and network component object libraries, and network setup (plumbing) module libraries (actually, plumbing modules are implemented as member functions of the base simulator object). In other words, to use NS, you program in OTcl script language. To setup and run a simulation network, a user should write an OTcl script that initiates an event scheduler, sets up the network topology using the network objects and the plumbing functions in the library, and tells traffic sources when to start and stop transmitting packets through the event scheduler. Fig.7. C++ and OTcl: The Duality NS is written not only in OTcl but in C++ also. For efficiency reason, NS separates the data path implementation from control path implementations. In order to reduce packet and event processing time (not simulation time), the event scheduler and the basic network component objects in the data path are written and compiled using C++. These compiled objects are made available to the OTcl interpreter through an OTcl linkage that creates a matching OTcl object for each of the C++ objects and makes the control functions and the configurable variables specified by the C++ object act as member functions and member variables of the corresponding OTcl object. In this way, the controls of the C++ objects are given to OTcl. It is also possible to add member functions and
  • 5. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 73 variables to a C++ linked OTcl object. The objects in C++ that do not need to be controlled in a simulation or internally used by another object do not need to be linked to OTcl. Likewise, an object (not in the data path) can be entirely implemented in Figure 8 shows the general architecture of NS. In this figure a general user (not an NS developer) can be thought of standing at the left bottom corner, designing and running simulations in Tcl using the simulator objects in the OTcl library. The event schedulers and most of the network components are implemented in C++ and available to OTcl through an OTcl linkage that is implemented using tclcl. The whole thing together makes NS, which is a OO extended Tcl interpreter with network simulator libraries.This section briefly examined the general structure and architecture of NS. At this point, one might be wondering about how to obtain NS simulation results. As shown in Figure 7, when a simulation is finished, NS produces one or more text-based output files that contain detailed simulation data, if specified to do so in the input Tcl (or more specifically, OTcl) script. The data can be used for simulation analysis (two simulation result analysis examples are presented in later sections) or as an input to a graphical simulation display tool called Network Animator (NAM) . NAM has a nice graphical user interface similar to that of a CD player (play, fast forward, rewind, pause and so on), and also has a display speed controller. Furthermore, it can graphically present information such as throughput and number of packet drops at each link, although the graphical information cannot be used for accurate simulation analysis. Network simulator (NS) is an object– oriented, discrete event simulator for networking research. NS provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. The simulator is a result of an ongoing effort of research and developed. Even though there is a considerable confidence in NS, it is not a polished product yet and bugs are being discovered and corrected continuously. On the other hand, one disadvantage is that modifying and extending the simulator requires programming and debugging in both languages. NS can simulate the following: 1) Topology: Wired, wireless 2) Sheduling Algorithms: RED, Drop Tail, 3) Transport Protocols: TCP, UDP 4) Routing: Static and dynamic routing 5) Application: FTP, HTTP, Telnet, Traffic generators Trace analysis. Running the TCL script generates a NAM trace file that is going to be used as an input to NAM and a trace file called "out.tr" Fig.8. Architectural View of NS that will be used for our simulation analysis. Figure shows the trace format and example trace DATA from "out.tr". Where each line in trace file represents an event associated to a packet. VI. SIMULATION RESUTS Now a day, WIFI hotspots are deployed widely and densely in many cities and the trend continues. Compared with cellular networks, WIFI has obvious advantages: lower cost and higher peak throughput. Thus, WIFI is considered as a suitable solution for cellular traffic offloading. However, it is still challenging to provide WIFI -based Internet access for users in moving vehicles. The above problems solve our proposed system concept. To support seamless and efficient WIFI-based Internet access for moving vehicles. It consists of innovative protocols in both uplink and downlink.Seamless roaming of clients was gracefully achieved, while channel utilization efficiency was dramatically improved.Will prove high performance of compared to existing system.This work presents a coexistence study between DVB-T2 broadcasting services and IEEE 802.11p transmissions in the UHF TV channels in urban environments. A first measurement series allowed assessing the maximum transmission power level of an IEEE 802.11p signal while assuring the integrity of the DTT services for the typical MFN and SFN operation modes of a real DVB-T2 broadcasting network. To assure the protection of the DTT systems the reception quality was quantified assuming the absence of a picture failure during a minimum observation time of 30 seconds.The results obtained for the investigated DVB-T2 transmission modes suggest that the effect of the 802.11p adjacent interference changes with its configuration. For the tested DVB-T2 receiver the worst operative case has been considered. The 802.11p interfering signal was initially set to a power level of -20 dB below the sensibility of the tested receiver and then adjusted at the output of the SDR board to achieve the required degradation (PF point) of the received and decoded TV signal.
  • 6. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.69-74 ISSN: 2278-2400 74 VII. CONCLUSION Hence the system proposed in this paper to support seam- less and efficient WiFi-based Internet access for moving vehicles. It consists of innovative protocols in both uplink and downlink. Seamless roaming of clients was gracefully achieved, while channel utilization efficiency was dramatically improved. Experimental results from both real testbed and simulations revealed feasibility and effectiveness of the technique specified. REFERENCES [1] Ahmed. N, Keshav. S, and Papagiannaki. K (2011),“Omnivoice: A mobile voice solution for small-scale enterprises,” in Proc. 12th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., pp. 1–11 [2] Aijaz. A, Aghvami. H, and Amani. M (April 2013), “Adaptive Frequency Hopping Algorithm for Mulitcast Rendezvous in DSA Network,” IEEE Wireless Commun., vol. 20, no. 2,pp. 104–112. [3] Bai. F, Stancil. D, and Krishnan. H (2010),“Toward understanding characteristics of Dedicated Short Range Communications (DSRC) from a perspective of vehicular network engineers,” in Proc. 16th Annu. Int. Conf. Mobile Comput. Netw.,pp. 329–340. [4] Balasubramanian. A, Mahajan. R, and Venkataramani. R (2010), “Channel Hopping based Communication Rendezvous in Cognitive Radio System,” in Proc. ACM 8th Int. Conf. Mobile Syst, Appl. Services, pp. 209–222. [5] Balasubramanian. A, Mahajan. R, Venkataramani. R,Levine. B, and Zahorjan. J (2008), “Interactive wifi connectivity for moving vehicles,” in Proc. ACM SIGCOMM,pp. 427–438. [6] Balasubramanian. A , Zhou. Y, Croft. W, Levine. B, and Venkataramani. A (2007),“Web search from a bus,” in Proc. ACM 2nd ACM Workshop Challenged Netw., pp. 59–66. [7] Bychkovsky. V, Hull. B, Miu. A, Balakrishnan. H, and Madden. S (2006), “A measurement study of vehicular internet access using in situ wi-fi networks,” in Proc. ACM 12th Annu. Int. Conf. Mobile Comput. Netw.,pp. 50–61. [8] Cheung. M, Hou. F, Wong. V, and Huang. J (May 2012),“ Dynamic optimal random access for vehicle-to-roadside communications,” IEEE J. Sel. Areas Commun., vol. 30, no. 4, pp. 792–803. [9] Chen. B and Chan. M (2009),“Mobtorrent: A framework for mobile internet access from vehicles,” in Proc. IEEE INFOCOM, pp. 1404– 1412. [10] Eriksson. J, Balakrishnan. H, and Madden. S (May 2012),“Cabernet: Vehicular content delivery using wifi,” in Proc. ACM 14th ACM Int. Conf. Mobile Comput. Netw., pp. 199–210. [11] Gozalvez. J, Sepulcre. M, and Bauza. R (May 2012),“IEEE 802.11p vehicle to infrastructure communications in urban environments,” IEEE Commun. Mag., vol. 50, no. 5,pp. 176–183. [12] Lv. P, Wang. X, Xu. M, and Chen. Y (2011), “Network-leading association scheme in ieee 802.11 wireless mesh networks,” in Proc. IEEE Int.Cnf. Commun. [13] Mahajan. R, Zahorjan. J, and Zill. B (2007),“Understanding wifi-based connectivity from moving vehicles,” in Proc. 7th ACM SIGCOMM Conf. Internet Meas., pp. 321–326. [14] Miu. A, Balakrishnan. H, and Koksal. C (2005), “Improving loss resilience with multi-radio diversity in wireless networks,” in Proc. ACM 11th Annu. Int. Conf. Mobile Comput. Netw.,pp. 16–30. [15] Ott. J and Kutscher. D (2004),“Drive-thru internet: IEEE 802.11b for ‘automobile’ users,” in Proc. IEEE INFOCOM, pp. 362–373. [16] Pin Lv, Xudong Wang, Xiuhui Xue and Ming Xu ( May 2015),“Seamless and Efficient Wi-Fi based Internet Access from Moving Vehicles,”IEEE Transactions on Mobile Computing., vol. 14,no. 5. [17] Ramani. I and Savage. S (2005),“Syncscan: Practical fast handoff for 802.11 infrastructure networks,” in Proc. IEEE INFOCOM, vol. 1, pp. 675–684. [18] Rodriguez. P, Chakravorty. R, Chesterfield. J, Pratt. I, and Banerjee. S (2004), “Interference Issues for VANETs Communication in the TVWS in Urban Environments,”in Proc. ACM2nd Int. Conf.Mobile Syst., Appl. Services, pp. 217–230. [19] Wu. H, Tan. K, Zhang. Y, and Zhang. Q (2007), “Proactive scan: Fast handoff with smart triggers for 802.11 wireless lan,” in Proc. IEEE INFOCOM, pp. 749–757.