SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 139
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Distributed Priority based channel access for VANET (DPBCA)
Tripti C1
, Manoj R.2
1,2
Department of Computer Science & Engineering, Rajagiri School of Engineering and Technology
Abstract— IEEE 802.11p vehicular network supports various applications with different
transmission priorities and QoS requirements. It classifies the access categories into four priority
levels to ensure the successful transmission of higher priority traffic compared to lower priority
traffic in a vehicle. But the external collision between traffic of same priority from different vehicles
is not considered. Based on such consideration, this paper proposes a distributed priority based
channel access scheme. In this proposed work, the priority of each vehicle is calculated based on its
stature on the road and access category. The proposed approach can ensure successful transmission
reducing collision leading to overall throughput improvement.
Keywords- VANET; MAC; IEEE802.11p; Challenges in VANET;
I. INTRODUCTION
Vehicular ad hoc network (VANET), a network created by vehicles on the road serves as the
foundation of Intelligent Transportation System (ITS). ITS enables vehicles to communicate with
each other (V2V) as well as with the road side unit (V2R). The idea of intelligent transportation
system (ITS) built on VANET is to reduce road accidents and causalities. It has a range of
applications from cooperative collision warning to providing internet on road. The high degree of
node mobility leading to frequent topology shifts makes it different from the traditional networks.
This unique feature of VANET makes the design of an efficient VANET system challenging.
Different applications in VANET have different QoS requirements which in turn shifts the interest of
researchers to develop efficient channel access mechanisms.
In 2006, IEEE 802.11p [1] is amended with Wireless Access in vehicular environments (WAVE)
operational mode which suits for vehicular environments [2]. WAVE enables communication among
high speed vehicles or between a vehicle and a roadside unit. WAVE mode also includes IEEE 1609
standard suite for resource management, security services, network services and multi channel
operations [3][4][5][6].
The multi channel operation in WAVE mode operates in the licensed ITS band of 5.9 GHz which
includes one control channel (CCH), the two channels at the end are reserved for safety applications,
a high data rate channel for critical safety and three other service channels (SCH) for non safety
applications. For every channel interval, a station remains in control channel for 50ms, switches to
service channel and remains for 50ms. The channel switching occurs in 4ms.
Figure 1: Channel Interval
The standard MAC layer of VANET, the IEEE 802.11p is found to perform poorly in
broadcasting [7][8]. It lacks in providing an acknowledgement for broadcast messages. In a
congested network, there is a chance for the broadcast packets to get collided and due to the lack of
CCH Guard
Band
SCH
100ms
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 140
acknowledgement sent to the transmitter, no retransmission happens. Thus IEEE 802.11p fails in
providing reliable broadcast support in a congested highway [9][10]. MAC layer of IEEE 802.11p
uses Enhanced Distributed Channel Access (EDCA) based on IEEE 802.11e and supports four
different access categories with different priority levels. It tries to avoid internal collision inside a
vehicle but fails to prevent external collision among vehicles. As the network becomes denser the
probability of external collision will be increased and thereby decreases the system throughput.
Therefore, a congestion control approach is desirable to decrease the number of collisions between
stations. In this paper, prioritization of vehicle considering its stature on the road, its average velocity
and the access category is proposed. The remainder of this paper is organized as follows. Large
number of writings is available based on the performance improvement of IEEE 802.11p. Section II
provides a brief overview of these works. Section III deals with the proposed distributed priority
based channel access scheme. Simulation results and the analysis results are briefed in Section IV
followed by conclusion remarks in Section V.
II. RELATED WORK
In IEEE 802.11p network, MAC protocol coordinates operations on CCH and SCH. RTS/CTS
is employed to reduce packet collisions due to hidden terminals. A back off algorithm called 802.11+
based on adaptive contention window is proposed in [11]. It shows that the 802.11+ algorithm is able
to reach the theoretical throughput limit. Bianchi[12] used probability and statistics to analyze the
throughput and utilization. This method also solves the hidden node problem. Gannoune[13][14]
used the network performance details to adjust the minimum and maximum contention window sizes
to adapt IEEE 802.11 EDCF to network changes.
Vehicular channel access scheme [15] is used to optimize channel throughput. In VCAS, all on
board units listen to control channel for WAVE Service Announcement information embedded in
WAVE announcement frames broadcast by road side unit during control channel interval. Thereafter,
on board units with similar data rates are grouped into one SCH by screening them based on their
transmission distance available in WSA frame. The simulation results show that VCAS provides a
flexible method to handle versatile vehicular scenarios. However, VCAS requires a road side unit
which will not suit for a distributed system. An improved channel access scheme [16] allows a
station to stay on the service channel for as long as it requires before returning to the control channel.
This is done in order to improve the service channel utilization by cutting CCH to avoid the frequent
channel switching between SCH and CCH. However, in vehicular networks the safety messages
transmitted during CCH enjoy high priority and therefore CCH interval must be guaranteed.
Moreover, only one user is considered in the paper and the effects on neighbors incurred by changing
the channel intervals are not analyzed.
Detection based MAC protocol discussed in[17] used an RTS/CTS to detect network congestion
through message exchange to predict the number of competing nodes. Once the number of
competing nodes is available, the nodes dynamically adapt to the contention window based on the
network status. Even though the system outperforms IEEE 802.11 base access and RTS/CTS in total
throughput and delay, how the nodes guarantee the predicted number of competing nodes is accurate
is not clearly discussed. In this paper, priority of each vehicle based on its location on road and
access category is calculated to regulate the congestion in the network.
In [18] distributed multi-priority congestion control approach for IEEE 802.11p vehicular
networks, congestion control is done by studying the queue of different access category. From the
observations a congestion threshold is calculated and based on this threshold the contention window
size is adjusted. However, the external collision of packets of similar access categories from different
vehicles is still unattended. To overcome these collisions and thereby to improve the throughput, a
distributed priority based channel access is proposed.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 141
III. DISTRIBUTED PRIORITY BASED CHANNEL ACCESS
The media access of IEEE 802.11p service channel is based on Carrier Sense Multiple
Access/Collision Avoidance (CSMA/CA). Different service channels have different contention
window sizes. Suppose the contention window size is small, interference may happen. Also the
factors like the high degree of mobility, hidden terminal problem, and change of moving direction
may create more packet collisions or transmission failures. In IEEE 802.11p each node depending on
its access category calculates an arbitration inter frame space (AIFS). The node listens to the channel
for AIFS time and if the channel is found free, the transmission happens else it waits for a random
back off period.
Inside each vehicle, different access categories exist and there exist an internal contention for
the similar access categories. IEEE 802.11p employs a per packet priority scheme for channel access.
But the level of internal contention of packets of different access category and the external
contention with similar access category packets can lead to an increase in collision of packets in a
dense network. To improve the performance of IEEE 802.11p MAC, a distributed priority based
channel access approach is proposed in this section.
IV. SIMULATION RESULTS AND DISCUSSIONS
V.
The proposed priority based channel access scheme exploiting the structure of VANET is
evaluated by simulation. The environment is simulated in MATLAB. The number of vehicles on the
zone depends on the vehicle arrival rate, vehicle density and vehicle speed. Traffic arrival interval
follows the Poisson distribution. The total arrival rate λ can be determined as
λ =k.µ (1)
where k is the vehicle density and µ is the mean vehicle speed. The probability of collision increases
with the number of nodes on the road. In this scenario, let us assume that each vehicle has at least
one packet to transmit and there are no transmission errors in the channel. The successful
transmission time is calculated by
E[ts]=Tp+Trts+Tsifs+Tcts+Tsifs+Tdata+Tsifs+Tack+4*propagationdelay (2)
The average collision time can be calculated as:
DISTIBUTED PRIORITY BASED CHANNEL ACCESS ALGORITHM
1:The node enters a zone of relevance it calculates:
2:The expected time of a vehicle to reach a point of exit on
The road is calculated based on its distance from the point
and average velocity at which the vehicle is moving in.
3:Different priority levels are given for different types of
messages. The size of data message and beacon also varies.
4:Each vehicle determines its priority with respect to other
vehicles on the road.
P=(d/vavg)+(type)+ X%SIFS
Where d is the distance of the vehicle from the point of
exit, vavg is the average velocity of the vehicle, type is
the category of message, ie. Beacon, Service, Event. Size is
to differentiate between a beacon signal and a data
request. Event type can be traffic or road. Traffic messages
can be traffic jam and accidents. Road messages can be
slippery road, sharp turning etc. X is a unique ID based on
MAC.
5:Each vehicle waits for the estimated period of time and
starts transmission.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 142
E[tc]=Tp+2*propagationdelay (3)
Where Tp is the calculated priority value of each vehicle. The throughput of the system is calculated
based on the number of successful packets transmitted in unit time. It is found to increase with the
number of nodes on the road. The percentage of collision is found to decrease with the number of
vehicles on the road.
Figure 4 show that the percentage of collision increases and then gets reduced with the number of
nodes in the region. Apart from the initial decrease, figure 5 indicates that the throughput remains
almost stable with increase in number of node.
Figure 4: The percentage of collision versus the number of nodes in the region.
Figure 5: The throughput of the network versus the number of nodes in the region
The simulation results show that the proposed scheme improves the throughput of the system
reducing the degree of collision.
VI.CONCLUSION
In a dense network, the CSMA/CA scheme creates high degree of collisions. This is mainly due
to the fact that the IEEE 802.11p system considers the access categories in each vehicle and
prioritizes them where as the priority between vehicles are never analyzed. The proposed scheme
enables the calculation of priority of each vehicle and the different types of traffic in it making it
possible to reduce the number of collisions so as to improve the throughput of the system.
REFERENCES
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 143
[1]. IEEE 802.11p/D3.0: Draft Standard for Information Technology -Telecommunications
and information exchange between systems – Local and metropolitan area networks –
Specific requirements - Part 11, Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) specifications, IEEE Standards Activities Department, July 2007.
[2]. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), June 12, 2007.
[3].IEEE Std 1609.1-2006, Trial-Use Standard for WAVE - Resource Manager, IEEE
Vehicular Technology Society, October 2006.K. Elissa, “Title of paper if known,”
unpublished.
[4].IEEE Std 1609.2-2006, Trial-Use Standard for WAVE - Security Services for Applications
and Management Messages, IEEE Vehicular Technology Society, July 2006.
[5].IEEE Std 1609.3-2007, Trial-Use Standard for WAVE – Networking Services, IEEE
Vehicular Technology Society, April 2007.
[6]. IEEE Std 1609.4-2006, Trial-Use Standard for WAVE - Multi-channel Operation, IEEE
Vehicular Technology Society, November 2006.
[7]. X.Ma and X.Chen, “ Performance analysis of IEEE 802.11 broadcast scheme in ad hoc
wireless LANs,” IEEE Trans. Veh. Technol., vol.57, no.6,pp.3757-3768,Nov.2008.
[8].M. Torrent-Moreno, D.Jiang, and H. Hartenstein, “ Broadcast reception rates and effects of
priority Access in 802.11-based vehicular ad-hoc networks,” in Proc.
ACMVANET’04,Philadelphia,Pennsylvania, USA, Oct. 2004.
[9]. Y. Saleh, F. Mahmood and B. Abderrahim, “Performance of beacon safety message
dissemination in vehicular ad hoc networks (VANETs),” Journal of Zhejiang University-
Science A, vol.8, no.12,pp.1990-2004, Nov.2007.
[10]. R.K. Lam, P.R. Kumar, “ Dynamic Channel Reservation to enhance channel access by
exploiting structure of vehicular networks”, Vehicular Technology Conference (VTC
2010-Spring), 2010 IEEE 71st
, Pp. 1 – 5.
[11] F.Cali, M. Conti and E. Gregori, “ Dynamic tuning of the IEEE 802.11protocol to
achieve a theoretical throughput limit,” IEEE/ACM Transactions on Networking, vol.8, No.6,
December 2000.
[12] G. Bianchi, “ Performance analysis of the IEEE 802.11 distributed coordination
function,” in IEEE Journal on Selected Areas in Communications, Vol.18, No.3, pp.535-547,
March 2000.
[13] L. Gannoune and S. Robert, “ Dynamic tuning of the maximum contention window
(CWmax) for enhanced service differentiation in IEEE 802.11 wireless ad hoc networks,” in
Proc. IEEE VTC ’04, September 2004,pp.2956-2961.
[14] L. Gannoune and S. Robert, “ Dynamic tuning of the minimum contention window
(CWmin) for enhanced service differentiation in IEEE 802.11 wireless ad hoc networks,” in
Proc. IEEE PIMRC ’04, September 2004,pp.311-317.
[15] S-T. Sheu, Y-C.Cheng and J-S.Wu, “ A channel access scheme to compromise
throughput and fairness in IEEE 802.11p multi-rate/multi-channel wireless vehicular
networks”, Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st
, p. 1 – 5.
[16] S.Y.Wang,C.L.Chou,K.C.Liu,T.W.Ho,W.J.Hung,C.F.Huang,M.S.Hsu,H.Y.Chen and
C.C.Lin, “ Improving the channel utilization of IEEE 802.11p/1609 Networks”Wireless
Communications and Networking Conference, 2009. WCNC 2009. IEEE Pp. 1 – 6.
[17] H- C Jang,W-C Feng, “ Network Status Detection-based dynamic adaptation of
contention window in IEEE 802.11p”, Vehicular Technology Conference (VTC 2010-
Spring), 2010 IEEE 71st
, Pp. 1 – 5.
[18] X.Shen, X.Cheng, R.Zhang and B.Jiao, “ Distributed Congestion Control approaches for the
IEEE 802.11p vehicular networks”, IEEE intelligent transportation systems magazine, Winter
2013, Pp. 50-61.
Distributed Priority based channel access for VANET (DPBCA)
Distributed Priority based channel access for VANET (DPBCA)

Contenu connexe

Tendances

An Optimal Route Discovery using Biogeography based Optimization for Vehicula...
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...An Optimal Route Discovery using Biogeography based Optimization for Vehicula...
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...StevePrice20
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET Journal
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETMohammadAlmalag
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksPBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksEswar Publications
 
Traffic offloading impact on the performance
Traffic offloading impact on the performanceTraffic offloading impact on the performance
Traffic offloading impact on the performanceIJCNCJournal
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...IJCSIS Research Publications
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVTELKOMNIKA JOURNAL
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wiMd.Akm Sahansha
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...ijwmn
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...IJECEIAES
 

Tendances (18)

An Optimal Route Discovery using Biogeography based Optimization for Vehicula...
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...An Optimal Route Discovery using Biogeography based Optimization for Vehicula...
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANET
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 
50120130404054
5012013040405450120130404054
50120130404054
 
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksPBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
 
Traffic offloading impact on the performance
Traffic offloading impact on the performanceTraffic offloading impact on the performance
Traffic offloading impact on the performance
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
 

Similaire à Distributed Priority based channel access for VANET (DPBCA)

CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...IJCNCJournal
 
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...IJCNCJournal
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksAmir Jafari
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkIRJET Journal
 
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...IJECEIAES
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
An Improved CF-MAC Protocol for VANET
An Improved CF-MAC Protocol for VANETAn Improved CF-MAC Protocol for VANET
An Improved CF-MAC Protocol for VANETIJECEIAES
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
 
Distance Cautious IP - A Systematic Approach in VANETS
Distance Cautious IP - A Systematic Approach in VANETSDistance Cautious IP - A Systematic Approach in VANETS
Distance Cautious IP - A Systematic Approach in VANETSINFOGAIN PUBLICATION
 
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...IJCNCJournal
 
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...IJCNCJournal
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...IRJET Journal
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 

Similaire à Distributed Priority based channel access for VANET (DPBCA) (20)

CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...
 
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
 
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
An Improved CF-MAC Protocol for VANET
An Improved CF-MAC Protocol for VANETAn Improved CF-MAC Protocol for VANET
An Improved CF-MAC Protocol for VANET
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
Distance Cautious IP - A Systematic Approach in VANETS
Distance Cautious IP - A Systematic Approach in VANETSDistance Cautious IP - A Systematic Approach in VANETS
Distance Cautious IP - A Systematic Approach in VANETS
 
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...
 
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 

Plus de Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

Plus de Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Dernier

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 

Dernier (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 

Distributed Priority based channel access for VANET (DPBCA)

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 139 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Distributed Priority based channel access for VANET (DPBCA) Tripti C1 , Manoj R.2 1,2 Department of Computer Science & Engineering, Rajagiri School of Engineering and Technology Abstract— IEEE 802.11p vehicular network supports various applications with different transmission priorities and QoS requirements. It classifies the access categories into four priority levels to ensure the successful transmission of higher priority traffic compared to lower priority traffic in a vehicle. But the external collision between traffic of same priority from different vehicles is not considered. Based on such consideration, this paper proposes a distributed priority based channel access scheme. In this proposed work, the priority of each vehicle is calculated based on its stature on the road and access category. The proposed approach can ensure successful transmission reducing collision leading to overall throughput improvement. Keywords- VANET; MAC; IEEE802.11p; Challenges in VANET; I. INTRODUCTION Vehicular ad hoc network (VANET), a network created by vehicles on the road serves as the foundation of Intelligent Transportation System (ITS). ITS enables vehicles to communicate with each other (V2V) as well as with the road side unit (V2R). The idea of intelligent transportation system (ITS) built on VANET is to reduce road accidents and causalities. It has a range of applications from cooperative collision warning to providing internet on road. The high degree of node mobility leading to frequent topology shifts makes it different from the traditional networks. This unique feature of VANET makes the design of an efficient VANET system challenging. Different applications in VANET have different QoS requirements which in turn shifts the interest of researchers to develop efficient channel access mechanisms. In 2006, IEEE 802.11p [1] is amended with Wireless Access in vehicular environments (WAVE) operational mode which suits for vehicular environments [2]. WAVE enables communication among high speed vehicles or between a vehicle and a roadside unit. WAVE mode also includes IEEE 1609 standard suite for resource management, security services, network services and multi channel operations [3][4][5][6]. The multi channel operation in WAVE mode operates in the licensed ITS band of 5.9 GHz which includes one control channel (CCH), the two channels at the end are reserved for safety applications, a high data rate channel for critical safety and three other service channels (SCH) for non safety applications. For every channel interval, a station remains in control channel for 50ms, switches to service channel and remains for 50ms. The channel switching occurs in 4ms. Figure 1: Channel Interval The standard MAC layer of VANET, the IEEE 802.11p is found to perform poorly in broadcasting [7][8]. It lacks in providing an acknowledgement for broadcast messages. In a congested network, there is a chance for the broadcast packets to get collided and due to the lack of CCH Guard Band SCH 100ms
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 140 acknowledgement sent to the transmitter, no retransmission happens. Thus IEEE 802.11p fails in providing reliable broadcast support in a congested highway [9][10]. MAC layer of IEEE 802.11p uses Enhanced Distributed Channel Access (EDCA) based on IEEE 802.11e and supports four different access categories with different priority levels. It tries to avoid internal collision inside a vehicle but fails to prevent external collision among vehicles. As the network becomes denser the probability of external collision will be increased and thereby decreases the system throughput. Therefore, a congestion control approach is desirable to decrease the number of collisions between stations. In this paper, prioritization of vehicle considering its stature on the road, its average velocity and the access category is proposed. The remainder of this paper is organized as follows. Large number of writings is available based on the performance improvement of IEEE 802.11p. Section II provides a brief overview of these works. Section III deals with the proposed distributed priority based channel access scheme. Simulation results and the analysis results are briefed in Section IV followed by conclusion remarks in Section V. II. RELATED WORK In IEEE 802.11p network, MAC protocol coordinates operations on CCH and SCH. RTS/CTS is employed to reduce packet collisions due to hidden terminals. A back off algorithm called 802.11+ based on adaptive contention window is proposed in [11]. It shows that the 802.11+ algorithm is able to reach the theoretical throughput limit. Bianchi[12] used probability and statistics to analyze the throughput and utilization. This method also solves the hidden node problem. Gannoune[13][14] used the network performance details to adjust the minimum and maximum contention window sizes to adapt IEEE 802.11 EDCF to network changes. Vehicular channel access scheme [15] is used to optimize channel throughput. In VCAS, all on board units listen to control channel for WAVE Service Announcement information embedded in WAVE announcement frames broadcast by road side unit during control channel interval. Thereafter, on board units with similar data rates are grouped into one SCH by screening them based on their transmission distance available in WSA frame. The simulation results show that VCAS provides a flexible method to handle versatile vehicular scenarios. However, VCAS requires a road side unit which will not suit for a distributed system. An improved channel access scheme [16] allows a station to stay on the service channel for as long as it requires before returning to the control channel. This is done in order to improve the service channel utilization by cutting CCH to avoid the frequent channel switching between SCH and CCH. However, in vehicular networks the safety messages transmitted during CCH enjoy high priority and therefore CCH interval must be guaranteed. Moreover, only one user is considered in the paper and the effects on neighbors incurred by changing the channel intervals are not analyzed. Detection based MAC protocol discussed in[17] used an RTS/CTS to detect network congestion through message exchange to predict the number of competing nodes. Once the number of competing nodes is available, the nodes dynamically adapt to the contention window based on the network status. Even though the system outperforms IEEE 802.11 base access and RTS/CTS in total throughput and delay, how the nodes guarantee the predicted number of competing nodes is accurate is not clearly discussed. In this paper, priority of each vehicle based on its location on road and access category is calculated to regulate the congestion in the network. In [18] distributed multi-priority congestion control approach for IEEE 802.11p vehicular networks, congestion control is done by studying the queue of different access category. From the observations a congestion threshold is calculated and based on this threshold the contention window size is adjusted. However, the external collision of packets of similar access categories from different vehicles is still unattended. To overcome these collisions and thereby to improve the throughput, a distributed priority based channel access is proposed.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 141 III. DISTRIBUTED PRIORITY BASED CHANNEL ACCESS The media access of IEEE 802.11p service channel is based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). Different service channels have different contention window sizes. Suppose the contention window size is small, interference may happen. Also the factors like the high degree of mobility, hidden terminal problem, and change of moving direction may create more packet collisions or transmission failures. In IEEE 802.11p each node depending on its access category calculates an arbitration inter frame space (AIFS). The node listens to the channel for AIFS time and if the channel is found free, the transmission happens else it waits for a random back off period. Inside each vehicle, different access categories exist and there exist an internal contention for the similar access categories. IEEE 802.11p employs a per packet priority scheme for channel access. But the level of internal contention of packets of different access category and the external contention with similar access category packets can lead to an increase in collision of packets in a dense network. To improve the performance of IEEE 802.11p MAC, a distributed priority based channel access approach is proposed in this section. IV. SIMULATION RESULTS AND DISCUSSIONS V. The proposed priority based channel access scheme exploiting the structure of VANET is evaluated by simulation. The environment is simulated in MATLAB. The number of vehicles on the zone depends on the vehicle arrival rate, vehicle density and vehicle speed. Traffic arrival interval follows the Poisson distribution. The total arrival rate λ can be determined as λ =k.µ (1) where k is the vehicle density and µ is the mean vehicle speed. The probability of collision increases with the number of nodes on the road. In this scenario, let us assume that each vehicle has at least one packet to transmit and there are no transmission errors in the channel. The successful transmission time is calculated by E[ts]=Tp+Trts+Tsifs+Tcts+Tsifs+Tdata+Tsifs+Tack+4*propagationdelay (2) The average collision time can be calculated as: DISTIBUTED PRIORITY BASED CHANNEL ACCESS ALGORITHM 1:The node enters a zone of relevance it calculates: 2:The expected time of a vehicle to reach a point of exit on The road is calculated based on its distance from the point and average velocity at which the vehicle is moving in. 3:Different priority levels are given for different types of messages. The size of data message and beacon also varies. 4:Each vehicle determines its priority with respect to other vehicles on the road. P=(d/vavg)+(type)+ X%SIFS Where d is the distance of the vehicle from the point of exit, vavg is the average velocity of the vehicle, type is the category of message, ie. Beacon, Service, Event. Size is to differentiate between a beacon signal and a data request. Event type can be traffic or road. Traffic messages can be traffic jam and accidents. Road messages can be slippery road, sharp turning etc. X is a unique ID based on MAC. 5:Each vehicle waits for the estimated period of time and starts transmission.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 142 E[tc]=Tp+2*propagationdelay (3) Where Tp is the calculated priority value of each vehicle. The throughput of the system is calculated based on the number of successful packets transmitted in unit time. It is found to increase with the number of nodes on the road. The percentage of collision is found to decrease with the number of vehicles on the road. Figure 4 show that the percentage of collision increases and then gets reduced with the number of nodes in the region. Apart from the initial decrease, figure 5 indicates that the throughput remains almost stable with increase in number of node. Figure 4: The percentage of collision versus the number of nodes in the region. Figure 5: The throughput of the network versus the number of nodes in the region The simulation results show that the proposed scheme improves the throughput of the system reducing the degree of collision. VI.CONCLUSION In a dense network, the CSMA/CA scheme creates high degree of collisions. This is mainly due to the fact that the IEEE 802.11p system considers the access categories in each vehicle and prioritizes them where as the priority between vehicles are never analyzed. The proposed scheme enables the calculation of priority of each vehicle and the different types of traffic in it making it possible to reduce the number of collisions so as to improve the throughput of the system. REFERENCES
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 143 [1]. IEEE 802.11p/D3.0: Draft Standard for Information Technology -Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements - Part 11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE Standards Activities Department, July 2007. [2]. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), June 12, 2007. [3].IEEE Std 1609.1-2006, Trial-Use Standard for WAVE - Resource Manager, IEEE Vehicular Technology Society, October 2006.K. Elissa, “Title of paper if known,” unpublished. [4].IEEE Std 1609.2-2006, Trial-Use Standard for WAVE - Security Services for Applications and Management Messages, IEEE Vehicular Technology Society, July 2006. [5].IEEE Std 1609.3-2007, Trial-Use Standard for WAVE – Networking Services, IEEE Vehicular Technology Society, April 2007. [6]. IEEE Std 1609.4-2006, Trial-Use Standard for WAVE - Multi-channel Operation, IEEE Vehicular Technology Society, November 2006. [7]. X.Ma and X.Chen, “ Performance analysis of IEEE 802.11 broadcast scheme in ad hoc wireless LANs,” IEEE Trans. Veh. Technol., vol.57, no.6,pp.3757-3768,Nov.2008. [8].M. Torrent-Moreno, D.Jiang, and H. Hartenstein, “ Broadcast reception rates and effects of priority Access in 802.11-based vehicular ad-hoc networks,” in Proc. ACMVANET’04,Philadelphia,Pennsylvania, USA, Oct. 2004. [9]. Y. Saleh, F. Mahmood and B. Abderrahim, “Performance of beacon safety message dissemination in vehicular ad hoc networks (VANETs),” Journal of Zhejiang University- Science A, vol.8, no.12,pp.1990-2004, Nov.2007. [10]. R.K. Lam, P.R. Kumar, “ Dynamic Channel Reservation to enhance channel access by exploiting structure of vehicular networks”, Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st , Pp. 1 – 5. [11] F.Cali, M. Conti and E. Gregori, “ Dynamic tuning of the IEEE 802.11protocol to achieve a theoretical throughput limit,” IEEE/ACM Transactions on Networking, vol.8, No.6, December 2000. [12] G. Bianchi, “ Performance analysis of the IEEE 802.11 distributed coordination function,” in IEEE Journal on Selected Areas in Communications, Vol.18, No.3, pp.535-547, March 2000. [13] L. Gannoune and S. Robert, “ Dynamic tuning of the maximum contention window (CWmax) for enhanced service differentiation in IEEE 802.11 wireless ad hoc networks,” in Proc. IEEE VTC ’04, September 2004,pp.2956-2961. [14] L. Gannoune and S. Robert, “ Dynamic tuning of the minimum contention window (CWmin) for enhanced service differentiation in IEEE 802.11 wireless ad hoc networks,” in Proc. IEEE PIMRC ’04, September 2004,pp.311-317. [15] S-T. Sheu, Y-C.Cheng and J-S.Wu, “ A channel access scheme to compromise throughput and fairness in IEEE 802.11p multi-rate/multi-channel wireless vehicular networks”, Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st , p. 1 – 5. [16] S.Y.Wang,C.L.Chou,K.C.Liu,T.W.Ho,W.J.Hung,C.F.Huang,M.S.Hsu,H.Y.Chen and C.C.Lin, “ Improving the channel utilization of IEEE 802.11p/1609 Networks”Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE Pp. 1 – 6. [17] H- C Jang,W-C Feng, “ Network Status Detection-based dynamic adaptation of contention window in IEEE 802.11p”, Vehicular Technology Conference (VTC 2010- Spring), 2010 IEEE 71st , Pp. 1 – 5. [18] X.Shen, X.Cheng, R.Zhang and B.Jiao, “ Distributed Congestion Control approaches for the IEEE 802.11p vehicular networks”, IEEE intelligent transportation systems magazine, Winter 2013, Pp. 50-61.