SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
DOI : 10.5121/ijans.2013.3203 25
PERFORMANCE EVALUATION OF VEHICULAR
AD HOC NETWORK (VANET) USING
CLUSTERING APPROACH
Ankita Anand
H. No- 246, Shastri nagar, Jammu (J&K), India
riet_ankita@yahoo.com
ABSTRACT
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
KEYWORDS:
VANET, Clustering, AODV, AODV+
1. INTRODUCTION
IEEE 802.11p is an approved amendment to the IEEE 802.11 standard to add wireless access in
vehicular environments [1].The IEEE 802.11 standard body is currently working on a new
amendment, IEEE 802.11p, to address these concerns. This document is named Wireless Access
in Vehicular Environment, also known as WAVE [2]. A Vehicular Ad-Hoc Network, or VANET,
is a technology that uses moving cars as nodes in a network to create a mobile network. VANET
turns every participating car into a wireless router or node, allowing cars approximately 100to
300 metres of each other to connect and, in turn, create a network with a wide range. As cars fall
out of the signal range and drop out of the network, other cars can join in, connecting vehicles to
one another so that a mobile Internet is created [3] Vehicular Ad hoc network (VANET) is a new
form of Mobile Ad hoc Network (MANET) [4]
2. PROBLEM FORMULATIONS
As earlier, research is done on Mobile ad hoc network (MANETS) [5].But with MANETs several
handoff problems were difficult to remove. So a new cluster based technique in VANETS is
introduced, to remove these handoff problems. And various unpredictable movements that may
occur in the network can also be reduced or lessen using this Cluster based technique in VANET.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
26
3. METHODOLOGY USED
Scenario is taken as under:
Work is done on Fedora and Windows. In Fedora [6], MOVE is used.
Following is the scenario representing clustered vehicles in VANET environment.
Scenario 1: At the very start, nodes i.e. vehicles are in random order. There is no source node and
no destination node.
Fig 3.1 Initiation of nodes
In this scenario, vehicles are taken as nodes and these vehicles are moving in a cluster. Every
vehicle is connected to another vehicle. Firstly a cluster head is decided, which can also be
considered as a source node, after that only another nodes can start working. Source node sends
data packets to next node and then to next one, resulting data packets to be passed on through
various nodes to reach its destination (i.e. the receiving node).
MANET [5]: A mobile ad-hoc network (MANET) is a self-configuring infrastructure less
network of mobile devices connected by wireless links. Ad hoc is Latin and means "for this
purpose". Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently.
Performance Evaluation of VANET using Clustering approach 3
This cluster based technique enables nodes or vehicles to remain connected to each other, as even
a small problem if any occurs, it may come to know to the whole network and the whole network,
having several nodes together tries to find out the root cause of the problem, by maintaining good
internet connectivity.
Scenario2: After the gathering or generation of all the nodes in the VANET environment, a
cluster head is formed, which actually controls the whole process. Cluster head is also considered
as a source node.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
27
Fig 3.2 Formation of a cluster head
Afterwards a simulation for VANET is done.
SIMULATION FOR VANET:
Rapid generation of realistic simulation for VANET.
Fig 3.3 Rapid generator for VANET
Here, two models are taken into consideration:
Mobility Model
Traffic Model
Mobility Model: It represents the generation of road map topology and vehicle movement.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
28
Fig 3.4 Mobility Model
In mobility model configuration can be set for roads or the whole scenario with the help of Map
configuration editor.
Map configuration Editor: It specifies the input and the output files and the road defaults if road
types are not defined and road parameters if they are not inputted.
Fig 3.5 Map configuration Editor
Performance Evaluation of VANET using Clustering approach 5
Random Map Generator: It specifies the total random layout which includes Grid layout and the
spider layout.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
29
Fig 3.6 Random Map Generator
Traffic Model: It basically represents the Generation of network traffic.
Fig 3.7 Traffic Model
Traffic model shows two mobility for Ns2 i.e.
Static Mobility
Dynamic Mobility
Static Mobility: It is a static traffic model generator for Ns2.It includes general options like
channel type, network interface type, interface queue type, antenna model, ad hoc routing
protocol, radio propagating model, Mac type, Max packet in, link layer type and mobile node
starting positions, agent options, and connections.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
30
Fig 3.8 Static model generator for VANET
Dynamic Mobility: It is a dynamic traffic model generator for Ns2. It also includes general
options like channel type, network interface type, interface queue type, antenna model, ad hoc
routing protocol, radio propagating model, Mac type, Max packet, link layer type and mobile
node starting positions, agent options, and connections for dynamic mobility of vehicles.
Fig 3.9 Dynamic model generator for VANET
Performance Evaluation of VANET using Clustering approach 7
Results and Discussion
Results come out in the form of Generated packets and dropping packets, for Clustered vehicles
in VANET environment.
(i)Generated packets: It tells us about how many packets are generated as well as their packet
identification. Here is a graph of generated packets is plotted on the XY axis. When a packet is
transmitted, some packet delay comes. Like if 1000 packets are to be transmitted, all the 1000
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
31
cannot be transmitted at once, but the packets can be transmitted in instalments, thereby resulting
in the packet delay.
Fig Generated Packets
(ii)Packet Status: Packet status tells the actual status of the packets i.e how many packets are
send,how many are received and how many of them are dropped during the process. Here is a
graph plotted on the XY axis. Time in seconds is on the X axis and traffic in bytes is on the Y
axis. Red colour signifies the message, blue is indicating the acknowledgement and green one is
showing TCP.TCP sink basically tells us about the source node i.e which node can be considered
as a source node and the path of the nodes.
Fig Packet Status
(iii)Throughput of sending packets: It tells the throughput of sending packets on XY axis,with
throughput of sending packets i.e the number of packets send per second on y axis and time on x
axis.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
32
Fig Throughput of sending packets
(iv)Throughput of receiving packets: It tells the throughput of receiving packets on XY axis,with
throughput of receiving packets i.e no.of packets packets received per second on y axis and time
on y axis.
Fig Throughput of receiving packets
(v)Throughput of dropping packets: It tells the throughput of the dropped packets on XY axis,
with throughput of dropping packets on X axis and throughput of dropping packets(No. Of
packets) on Y axis.
Fig Throughput of dropping packets
Performance Evaluation of VANET using Clustering approach 9
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
33
CONCLUSION
In this paper, analysis has been done on VANET, using the Cluster based technique in terms of
Generated packets in the network and the throughput of the dropping packets that have been
dropped out of the network. And it is concluded that VANET with this Cluster based technique
proves to be helpful in removing the handoff problems that usually occurred in MANETS and
were not possible to remove. This clustered based technique in VANETs also helps a great deal in
removing or lessen the unpredictable movements in the network, which sometimes may cause
dangerous problems like dropping down the whole network for any small mistake. Each vehicle
in the VANET with cluster based technique is connected to one another, resulting in a good
internet connectivity.
ACKNOWLEDGEMENTS
Foremost of all, I express my sincere indebtedness to the “Almighty”, for bestowing me with all
the favourable circumstances and kept me in high spirits. I am very grateful to my advisor, Er
Parminder Singh, Asst Prof. at Chandigarh Engineering College, Landran for his patience,
encouragement, and many fruitful discussions from the very early stage of this research.. Finally,
I wish to express my appreciation to my family for their continuous love and encouragement, for
always believing in me, for never failing to provide all the support, and for coping with the
pressure that naturally comes with such endeavour.
REFERENCES
[1] “IEEE802.11p”, http://en.wikipedia.org/wiki/IEEE_802.11p
[2] Daniel Jiang, Luca Delgrossi Mercedes-Benz Research & Development North America, Inc, “IEEE
802.11p: Towards an International Standard for Wireless Access in Vehicular Environments”.
[3] “VANET”, http://en.wikipedia.org/wiki/Vehicular_ad-hoc_network.
[4] Nai-Wei Lo, Hsiao-Chien Tsai “Illusion Attack on VANET Applications – A Message Plausibility
Problem”.
[5] “Manet”, http://en.wikipedia.org/wiki/Mobile_ad_hoc_network.
[6] “Fedora”, http://fedora-commons.org/.

More Related Content

What's hot

VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal ToutouhJamal Toutouh, PhD
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...Joarder Kamal
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 

What's hot (20)

VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANET
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
14251D6514
14251D651414251D6514
14251D6514
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
VANET
VANETVANET
VANET
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 

Viewers also liked

A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBill Dimtsas
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRITSyadur Rahaman
 
Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13Uzak Jarkimbayev
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας2lykeio
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHpijans
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.Syadur Rahaman
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση 2lykeio
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα2lykeio
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetSyadur Rahaman
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα2lykeio
 

Viewers also liked (20)

A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global Presentation
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
 
Task 6
Task 6Task 6
Task 6
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRIT
 
Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα
 

Similar to PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING APPROACH

Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETpaperpublications3
 
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) ijceronline
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 

Similar to PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING APPROACH (20)

Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
 
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET MALICIOUS NODE DETECTION THROUGH AODV IN VANET
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
 
Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
Ijetcas14 330
Ijetcas14 330Ijetcas14 330
Ijetcas14 330
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 

More from pijans

Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...pijans
 
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...pijans
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
Congestion Control and QOS Improvement for AEERG protocol in MANET
Congestion Control and QOS Improvement for AEERG protocol in MANET   Congestion Control and QOS Improvement for AEERG protocol in MANET
Congestion Control and QOS Improvement for AEERG protocol in MANET pijans
 

More from pijans (20)

Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
 
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Tran...
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
Congestion Control and QOS Improvement for AEERG protocol in MANET
Congestion Control and QOS Improvement for AEERG protocol in MANET   Congestion Control and QOS Improvement for AEERG protocol in MANET
Congestion Control and QOS Improvement for AEERG protocol in MANET
 

Recently uploaded

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING APPROACH

  • 1. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 DOI : 10.5121/ijans.2013.3203 25 PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING APPROACH Ankita Anand H. No- 246, Shastri nagar, Jammu (J&K), India riet_ankita@yahoo.com ABSTRACT Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as being used to improve road safety. In this paper, cluster based technique has been introduced in VANET. As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff problems have been removed, which were actually difficult to remove in MANET. For this traffic infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The network simulator NS2 has been used for removing unpredictable movements that may arise in the network. KEYWORDS: VANET, Clustering, AODV, AODV+ 1. INTRODUCTION IEEE 802.11p is an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments [1].The IEEE 802.11 standard body is currently working on a new amendment, IEEE 802.11p, to address these concerns. This document is named Wireless Access in Vehicular Environment, also known as WAVE [2]. A Vehicular Ad-Hoc Network, or VANET, is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every participating car into a wireless router or node, allowing cars approximately 100to 300 metres of each other to connect and, in turn, create a network with a wide range. As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicles to one another so that a mobile Internet is created [3] Vehicular Ad hoc network (VANET) is a new form of Mobile Ad hoc Network (MANET) [4] 2. PROBLEM FORMULATIONS As earlier, research is done on Mobile ad hoc network (MANETS) [5].But with MANETs several handoff problems were difficult to remove. So a new cluster based technique in VANETS is introduced, to remove these handoff problems. And various unpredictable movements that may occur in the network can also be reduced or lessen using this Cluster based technique in VANET.
  • 2. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 26 3. METHODOLOGY USED Scenario is taken as under: Work is done on Fedora and Windows. In Fedora [6], MOVE is used. Following is the scenario representing clustered vehicles in VANET environment. Scenario 1: At the very start, nodes i.e. vehicles are in random order. There is no source node and no destination node. Fig 3.1 Initiation of nodes In this scenario, vehicles are taken as nodes and these vehicles are moving in a cluster. Every vehicle is connected to another vehicle. Firstly a cluster head is decided, which can also be considered as a source node, after that only another nodes can start working. Source node sends data packets to next node and then to next one, resulting data packets to be passed on through various nodes to reach its destination (i.e. the receiving node). MANET [5]: A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. Ad hoc is Latin and means "for this purpose". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Performance Evaluation of VANET using Clustering approach 3 This cluster based technique enables nodes or vehicles to remain connected to each other, as even a small problem if any occurs, it may come to know to the whole network and the whole network, having several nodes together tries to find out the root cause of the problem, by maintaining good internet connectivity. Scenario2: After the gathering or generation of all the nodes in the VANET environment, a cluster head is formed, which actually controls the whole process. Cluster head is also considered as a source node.
  • 3. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 27 Fig 3.2 Formation of a cluster head Afterwards a simulation for VANET is done. SIMULATION FOR VANET: Rapid generation of realistic simulation for VANET. Fig 3.3 Rapid generator for VANET Here, two models are taken into consideration: Mobility Model Traffic Model Mobility Model: It represents the generation of road map topology and vehicle movement.
  • 4. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 28 Fig 3.4 Mobility Model In mobility model configuration can be set for roads or the whole scenario with the help of Map configuration editor. Map configuration Editor: It specifies the input and the output files and the road defaults if road types are not defined and road parameters if they are not inputted. Fig 3.5 Map configuration Editor Performance Evaluation of VANET using Clustering approach 5 Random Map Generator: It specifies the total random layout which includes Grid layout and the spider layout.
  • 5. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 29 Fig 3.6 Random Map Generator Traffic Model: It basically represents the Generation of network traffic. Fig 3.7 Traffic Model Traffic model shows two mobility for Ns2 i.e. Static Mobility Dynamic Mobility Static Mobility: It is a static traffic model generator for Ns2.It includes general options like channel type, network interface type, interface queue type, antenna model, ad hoc routing protocol, radio propagating model, Mac type, Max packet in, link layer type and mobile node starting positions, agent options, and connections.
  • 6. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 30 Fig 3.8 Static model generator for VANET Dynamic Mobility: It is a dynamic traffic model generator for Ns2. It also includes general options like channel type, network interface type, interface queue type, antenna model, ad hoc routing protocol, radio propagating model, Mac type, Max packet, link layer type and mobile node starting positions, agent options, and connections for dynamic mobility of vehicles. Fig 3.9 Dynamic model generator for VANET Performance Evaluation of VANET using Clustering approach 7 Results and Discussion Results come out in the form of Generated packets and dropping packets, for Clustered vehicles in VANET environment. (i)Generated packets: It tells us about how many packets are generated as well as their packet identification. Here is a graph of generated packets is plotted on the XY axis. When a packet is transmitted, some packet delay comes. Like if 1000 packets are to be transmitted, all the 1000
  • 7. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 31 cannot be transmitted at once, but the packets can be transmitted in instalments, thereby resulting in the packet delay. Fig Generated Packets (ii)Packet Status: Packet status tells the actual status of the packets i.e how many packets are send,how many are received and how many of them are dropped during the process. Here is a graph plotted on the XY axis. Time in seconds is on the X axis and traffic in bytes is on the Y axis. Red colour signifies the message, blue is indicating the acknowledgement and green one is showing TCP.TCP sink basically tells us about the source node i.e which node can be considered as a source node and the path of the nodes. Fig Packet Status (iii)Throughput of sending packets: It tells the throughput of sending packets on XY axis,with throughput of sending packets i.e the number of packets send per second on y axis and time on x axis.
  • 8. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 32 Fig Throughput of sending packets (iv)Throughput of receiving packets: It tells the throughput of receiving packets on XY axis,with throughput of receiving packets i.e no.of packets packets received per second on y axis and time on y axis. Fig Throughput of receiving packets (v)Throughput of dropping packets: It tells the throughput of the dropped packets on XY axis, with throughput of dropping packets on X axis and throughput of dropping packets(No. Of packets) on Y axis. Fig Throughput of dropping packets Performance Evaluation of VANET using Clustering approach 9
  • 9. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 33 CONCLUSION In this paper, analysis has been done on VANET, using the Cluster based technique in terms of Generated packets in the network and the throughput of the dropping packets that have been dropped out of the network. And it is concluded that VANET with this Cluster based technique proves to be helpful in removing the handoff problems that usually occurred in MANETS and were not possible to remove. This clustered based technique in VANETs also helps a great deal in removing or lessen the unpredictable movements in the network, which sometimes may cause dangerous problems like dropping down the whole network for any small mistake. Each vehicle in the VANET with cluster based technique is connected to one another, resulting in a good internet connectivity. ACKNOWLEDGEMENTS Foremost of all, I express my sincere indebtedness to the “Almighty”, for bestowing me with all the favourable circumstances and kept me in high spirits. I am very grateful to my advisor, Er Parminder Singh, Asst Prof. at Chandigarh Engineering College, Landran for his patience, encouragement, and many fruitful discussions from the very early stage of this research.. Finally, I wish to express my appreciation to my family for their continuous love and encouragement, for always believing in me, for never failing to provide all the support, and for coping with the pressure that naturally comes with such endeavour. REFERENCES [1] “IEEE802.11p”, http://en.wikipedia.org/wiki/IEEE_802.11p [2] Daniel Jiang, Luca Delgrossi Mercedes-Benz Research & Development North America, Inc, “IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments”. [3] “VANET”, http://en.wikipedia.org/wiki/Vehicular_ad-hoc_network. [4] Nai-Wei Lo, Hsiao-Chien Tsai “Illusion Attack on VANET Applications – A Message Plausibility Problem”. [5] “Manet”, http://en.wikipedia.org/wiki/Mobile_ad_hoc_network. [6] “Fedora”, http://fedora-commons.org/.