SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
TDMA Slot Reservation in
Cluster-Based VANETS
Mohammad S. Almalag
Dissertation Defense
April 3, 2013
Advisor: Michele C. Weigle
Research Question
Can VANETs accommodate non-safety
applications’ use of the spectrum while
still meeting the requirements of safety
applications?
04/03/2013
2
Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
3
04/03/2013
Background
VANET
Vehicular Ad-Hoc Network (VANET):
▫ Increase traveler safety
▫ Decrease traveling time and fuel consumption
▫ Increase on board luxury
04/03/2013
4
Background
Applications
04/03/2013
5
Application categories:
• Safety

Emergency Electronic Brake Light

Co-operative Collision warning

Intersection Collision Warning

Approaching Emergency Vehicle
• Non-safety

File sharing

Traffic Information

Parking Lot Payment

Electronic Toll Collection
Background
Messages
• Update messages (periodic)
▫ Broadcast every 100 msec
▫ Speed, position, direction, etc.
• Safety messages
▫ Event-driven
▫ Very high priority
▫ High reliability
• Non-safety message
▫ High transmission rate
▫ Low priority
04/03/2013
6
Background
DSRC/WAVE
Dedicated Short Range Communication (DSRC) channels
Wireless Access in Vehicular Environments (WAVE)
04/03/2013
7
The problem
• Scalability:
 Poor channel reliability
• Hidden terminal
04/03/2013
8
The problem
• Safety message requirements
▫ High reliability
▫ Lifetime 100 msec
[Wang, ACM VANET 2008]
04/03/2013
9
Non-Safety messages
almost shut down
Low Medium High
Traffic Density
Related Work
MAC PROTOCOLS FOR VANET
Classified into three different categories
1.Channel partitioning:
▫ Time Division Multiple Access (TDMA), Frequency-Division
Multiple Access (FDMA) and Code-Division Multiple Access
(CDMA)
1.Random access:
▫ Contention based protocols, CSMA
1.Taking turns:
▫ Polling (master-slave) or token ring
04/03/2013
10
Related Work
MAC PROTOCOLS FOR VANET
Examples:
1.VeSOMAC (Yu and Biswas, 2007)
▫ TDMA + location based
▫ Does not considerV2I communication
1.VeMAC (Omar et al., 2011)
▫ TDMA + 2 transceivers
▫ Includes vehicles in both directions + RSU in one TDAM frame
▫ 2 transceivers + Overhead
1.PP-CSMA (Yang et al., 2005)
1. CSMA + priority scheme + polling scheme
2. Does not consider Broadcasting!
2.MCTRP (Bi et al., 2009)
▫ Token ring + 2 transceivers + road conditions
▫ Uses CSMA CA mechanism for inter-ring communication
04/03/2013
11
Thesis Statement
TDMA slot reservation in cluster-based
VANETs will improve the performance of
delivering non-safety messages with little
impact on the delivery of safety messages.
04/03/2013
12
Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
13
04/03/2013
My Approach
1. Solves network scalability and hidden terminal
problems
2. Fair transmission for safety and non-safety
messages
3. Lightweight TDMA assignment scheme
4. Efficiently manages cluster with changes of
topology
5. Develop TC-MAC cluster-based MAC protocol
6. Evaluate TC-MAC vs. WAVE
04/03/2013
14
TC-MAC
Structure
• Based on multi-channel DSRC layout
▫ 1 CCH and 6 SCHs
• TDMA technique using local IDs for accessing
the channels
• Cluster-based protocol
▫ Clusterhead (CH) scheme
04/03/2013
15
TC-MAC
TDMA
• Time Division Multiple Access (TDMA) is a method used
to enable multiple nodes to transmit on the same
frequency channel
04/03/2013
16
TC-MAC
TDMA Frame
04/03/2013
17
TC-MAC
TDMA Frame
04/03/2013
18
TC-MAC
Local IDs
04/03/2013
19
• Each vehicle in the cluster will receive a local ID (0 to
Nmax -1):
▫ CH will always have ID 1
▫ ID 0 is reserved for a virtual vehicle
TC-MAC
TDMA Slot Assignment
04/03/2013
20
TC-MAC
Intra-cluster Communication
• Lightweight communication protocol
• Each vehicle uses its own mini-slot to disseminate
safety/update messages
• First byte, 28
= 128 different situations. Examples:
▫ 0: vehicle is not communicating at the moment
▫ 1: vehicle is involved in communicating with some other vehicle
in the cluster. (Unicast)
▫ 2: vehicle is involved in communicating with some other vehicles
in the cluster. (multicast group)
▫ 3: vehicle is involved in communicating with a vehicle or RSU
outside the cluster
▫ 4: the CH is leaving the cluster
04/03/2013
21
TC-MAC
Intra-cluster Communication
• Disseminating intra-cluster non-safety messages:
▫ Unicast:
 Set up without CH intervention.
 Using the local ID for channel and slot time.
▫ Multicast:
 Small group of vehicles (<5):
 Set up without CH intervention.
 Large group of vehicles (>=5):
 Set up with CH intervention.
04/03/2013
22
TC-MAC
Intra-cluster Communication
04/03/2013
23
Clustering
Clusterhead Election
• Based on the traffic flow:
▫ Lane Weight
▫ Little overhead
▫ Network Connectivity Level (NCL)
▫ Average Distance Level (ADL)
▫ Average Velocity Level (AVL)
▫ Clusterhead Level (CHL):
04/03/2013
24
iiii AVLADLtNCLCHL ++= )(
Clustering
Cluster Maintenance
• The behavior of many vehicles may change the
topology of the cluster:
1. A Clusterhead leaving the cluster
2. A new vehicle joining the cluster
3. A cluster member leaving the cluster
4. Two clusters come in range of each other
5. A multi-hop cluster shrinks to a one-hop cluster
04/03/2013
25
Clustering
Cluster Maintenance
A Clusterhead leaving the cluster :
04/03/2013
26
Clustering
Cluster Maintenance
A new vehicle joining the cluster :
04/03/2013
27
Clustering
Cluster Maintenance
Two clusters come in range of each other:
04/03/2013
28
CDMA/TC-MAC
Inter-cluster communication
• CDMA/TC-MAC hybrid protocol for inter-cluster
communication.
• CDMA code for each cluster
▫ Intra-cluster communication
• Two protocols:
1.Code assignment protocol
1.Recovery protocol
04/03/2013
29
CDMA/TC-MAC
Code assignment protocol
• Select a CDMA code to the cluster
 Done by the CH
• 18 different CDMA codes:
▫ Based on the highway and the cluster’s directions
▫ 2 codes are global for each highway direction
▫ 4 codes for each traffic direction
 1 code is temp
▫ Two clusters with two different codes between clusters sharing the same
code
04/03/2013
30
CDMA/TC-MAC
Recovery protocol
• Solve the issue of having two clusters in range of
each other and sharing the same code
04/03/2013
31
CDMA/TC-MAC
DISSEMINATING INTER-CLUSTER MESSAGES
• Setup:
04/03/2013
32
Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
33
04/03/2013
Evaluation
Experiment Plan
04/03/2013
34
• NS-3 network simulator
▫ For VANET, (Arbabi and Weigle, 2010):
 Intelligent Driver Model (IDM)
 MOBIL lane change model
• Network settings:
▫ Transmission range = 300 m
▫ Max. safety message size = 200 bytes
▫ Max. non-safety message size = 1200 bytes
▫ Date rate = 6 Mbits/sec
▫ CCHI = SCHI = 0.050 sec
Evaluation
Experiment Plan
04/03/2013
35
• Clusterhead Election:
▫ Scenarios:
 Implemented for a highway
 Different number of lanes, 2, 3, and 4 lanes
 2 exits, on the right
 25% of vehicles on the rightmost lane take the exit
▫ Evaluation metrics:
 The number of CH changes
▫ Comparison:
 Lowest-ID, Highest-degree, and Utility Function
algorithms
Evaluation
Clusterhead Election (Results)
04/03/2013
36
Exit 1
Traffic Flow
Evaluation
Clusterhead Election (Results)
04/03/2013
37
Exit 2
Traffic Flow
Evaluation
Experiment Plan
04/03/2013
38
• TC-MAC:
▫ Scenarios:
 Implemented for a highway
 Different number of lanes, 2, 3, and 4 lanes
 Different vehicles densities
 Single-hop and two-hop clusters
▫ Evaluation metrics:
 Reliability of safety messages
 Direct safety/update messages
 Indirect safety messages
 Throughput of non-safety messages
Evaluation
TC-MAC (Frame)
04/03/2013
39
Evaluation
TC-MAC (Frame)
04/03/2013
40
Evaluation
TC-MAC (Results)
04/03/2013
41
• Single-hop cluster, all vehicles in the cluster are engaged in
communications during their own slot time on the SCHs
Evaluation
TC-MAC (Results)
04/03/2013
42
• Single-hop cluster, half vehicles in the cluster are engaged
in communications during their own slot time on the SCHs
Evaluation
WAVE (Results)
04/03/2013
43
• Percentage of collisions during the CCHI for WAVE
using a single-hop cluster
Evaluation
WAVE (Results)
04/03/2013
44
• Reliability of Safety messages in WAVE using a single-
hop cluster
Evaluation
TC-MAC (Results)
04/03/2013
45
• The Throughput of non-safety messages using TC-MAC in a
single-hop cluster
Evaluation
WAVE (Results)
04/03/2013
46
• The Throughput of non-safety messages using WAVE in
a single-hop cluster
Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
47
04/03/2013
Application
P2P File Sharing Using TC-MAC
04/03/2013
48
• Large-scale file sharing between two vehicles
• Using their slots on the SCHs
• Using un-used slots on the SCHs
▫ Needs CH permission
• Single-hop cluster
Application
Example
04/03/2013
49
• Assume vehicle A with local ID=4 wants to share a 4
MB MP3 file with vehicle B with local ID=15
▫ A will make the handshake with B
▫ A will request time slots on the SCHs from the CH
Application
Example
04/03/2013
50
• To ensure that vehicles A and B are still receiving
update messages from other vehicles nearby during
the transmission of the shared file
▫ Switching on the SCH is required
Application
Results
04/03/2013
51
0 12 32 58
# of Slots Borrowed
Application
Results
04/03/2013
52
0 12 32 58
# of Slots Borrowed
Application
Results
04/03/2013
53
0 12 32 58
# of Slots Borrowed
Conclusion
• TC-MAC performs better than WAVE
▫ Collision free
▫ Higher reliability of safety messages
▫ High throughput of non—safety messages
▫ Support high densities
▫ Support topology changes, through the local IDs
• CH election algorithm:
▫ Fewer CH head changes compared to other
algorithms
04/03/2013
54
My Contributions
• Summary of existing MAC protocols for VANETs
▫ "MAC Protocols for VANETs", in Mobile Ad Hoc Networking, Cutting Edge
Directions, 2nd ed., 2013.
• A multi-channel cluster-based TDMA MAC protocol to
coordinate intra-cluster communications (TC-MAC)
▫ [IEEE VTP, 2012], [MP2P, 2013]
• A CH election and cluster formation algorithm based on the
traffic flow and a cluster maintenance algorithm.
▫ [ON-MOVE, 2010]
• A multi-channel cluster-based CDMA/TDMA hybrid MAC
protocol to coordinate inter-cluster communications
▫ [IEEE Transactions on Intelligent Transportation Systems, in preparation]
04/03/2013
55
Future Work
• Further Analysis:
▫ The effect of guard intervals
▫ Three-hop clusters
▫ Different data rates
• Design a numbering scheme for cluster members
▫ Missed update messages
• Enhance the utilization on the SCHs
▫ By using the un-used slots on the SCHs.
• Speed-based clustering
▫ Highways with different speed for each lane
• CDMA/TDMA evaluation using simulation
04/03/2013
56
Publications
• Mohammad Almalag, Michele C. Weigle, Stephan Olariu, and Samy El-Tawab, Peer-
to-Peer File Sharing in VANETs Using TC-MAC, Proceedings of the
International Workshop on Mobile Peer-to-Peer Computing (MP2P) San Diego, CA,
March 2013.
• Mohammad Almalag, Stephan Olariu, and Michele C. Weigle, TDMA Cluster-
based MAC for VANETs (TC-MAC), Proceedings of the IEEE Workshop on
VANETs From Theory to Practice (VTP). San Francisco, CA, June 2012.
• Mohammad S. Almalag and Michele C. Weigle. Using Traffic Flow for Cluster
Formation in Vehicular Ad-hoc Networks. Proceedings of the Workshop On
User Mobility and Vehicular Networks (ON-MOVE), Denver, CO, October 2010, pp.
631-636.
• Book Chapter: Mohammad Almalag, Stephan Olariu, and Michele C. Weigle. MAC
Protocols for VANETs. In S. Basagni, M. Conti. S. Giordano, I. Stojmenovic, eds.,
editors, Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd Edition. Wiley-
IEEE Press, March 2013.
• Book Chapter: Mohammad S. Almalag. Safety-related vehicular applications.
In Stephan Olariu and Michele C. Weigle, editors, Vehicular Networks From Theory
to Practice. Chap- man & Hall/CRC, 2009.ACM (Association for Computing
Machinery).
04/03/2013
57
Thank you
Questions
Mohammad Salem Almalag
Department of Computer Science
Old Dominion University
04/03/2013
58

Contenu connexe

Tendances

Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareChih-Yu Lin
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-machinalala
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methodsnizam143
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 

Tendances (18)

Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Topic5
Topic5Topic5
Topic5
 
Mac
MacMac
Mac
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 

Similaire à TDMA Slot Reservation in Cluster-Based VANETs

2014 1029 adaptive dissmination of safety data among vehicles
2014 1029 adaptive dissmination of safety data among vehicles2014 1029 adaptive dissmination of safety data among vehicles
2014 1029 adaptive dissmination of safety data among vehicles冠宇 陳
 
Energy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M CommunicationsEnergy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M Communicationsamin azari
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfOscarKelvinNsitu
 
Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11Andrew Nix
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...amin azari
 
NWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfNWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfssuserf127b8
 
Sustainable Transportation System
Sustainable Transportation System Sustainable Transportation System
Sustainable Transportation System Raviraj Khatu
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3G4G
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxNoraNjepuome3
 
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...Eswar Publications
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSDeepak Shankar
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkRohit Das
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET Journal
 
Reducing Scanning Latency in WiMAX Enabled VANETs
 Reducing Scanning Latency in WiMAX Enabled VANETs Reducing Scanning Latency in WiMAX Enabled VANETs
Reducing Scanning Latency in WiMAX Enabled VANETsSyed Hassan Ahmed
 
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...Syed Hassan Ahmed
 

Similaire à TDMA Slot Reservation in Cluster-Based VANETs (20)

2014 1029 adaptive dissmination of safety data among vehicles
2014 1029 adaptive dissmination of safety data among vehicles2014 1029 adaptive dissmination of safety data among vehicles
2014 1029 adaptive dissmination of safety data among vehicles
 
Energy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M CommunicationsEnergy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M Communications
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
 
Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11Globecom 2015: Adaptive Raptor Carousel for 802.11
Globecom 2015: Adaptive Raptor Carousel for 802.11
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
NWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdfNWCRG-IAB-Review-IETF91.pdf
NWCRG-IAB-Review-IETF91.pdf
 
21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf21 Scheme_MODULE-2_CCN.pdf
21 Scheme_MODULE-2_CCN.pdf
 
Sustainable Transportation System
Sustainable Transportation System Sustainable Transportation System
Sustainable Transportation System
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptx
 
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Optimisation project overview
Optimisation project overviewOptimisation project overview
Optimisation project overview
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh Network
 
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
 
Reducing Scanning Latency in WiMAX Enabled VANETs
 Reducing Scanning Latency in WiMAX Enabled VANETs Reducing Scanning Latency in WiMAX Enabled VANETs
Reducing Scanning Latency in WiMAX Enabled VANETs
 
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
 

Plus de Michele Weigle

Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Michele Weigle
 
WS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesWS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesMichele Weigle
 
Intro to Web Archiving
Intro to Web ArchivingIntro to Web Archiving
Intro to Web ArchivingMichele Weigle
 
Enabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesEnabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesMichele Weigle
 
Visualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeVisualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeMichele Weigle
 
How to Write an Academic Paper
How to Write an Academic PaperHow to Write an Academic Paper
How to Write an Academic PaperMichele Weigle
 
How to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationHow to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationMichele Weigle
 
My Academic Story via Internet Archive
My Academic Story via Internet ArchiveMy Academic Story via Internet Archive
My Academic Story via Internet ArchiveMichele Weigle
 
A Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksA Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksMichele Weigle
 
Strategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseStrategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseMichele Weigle
 
Detecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCDetecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCMichele Weigle
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksMichele Weigle
 
2015-capwic-gradschool
2015-capwic-gradschool2015-capwic-gradschool
2015-capwic-gradschoolMichele Weigle
 
2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-webMichele Weigle
 
Tools for Managing the Past Web
Tools for Managing the Past WebTools for Managing the Past Web
Tools for Managing the Past WebMichele Weigle
 
Archive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewArchive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewMichele Weigle
 
Telling Stories with Web Archives
Telling Stories with Web ArchivesTelling Stories with Web Archives
Telling Stories with Web ArchivesMichele Weigle
 
"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overviewMichele Weigle
 
Visualizing Digital Collections at Archive-It
Visualizing Digital Collections at Archive-ItVisualizing Digital Collections at Archive-It
Visualizing Digital Collections at Archive-ItMichele Weigle
 

Plus de Michele Weigle (20)

Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
Comparing the Archival Rate of Arabic, English, Danish, and Korean Language W...
 
WS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web ArchivesWS-DL’s Work towards Enabling Personal Use of Web Archives
WS-DL’s Work towards Enabling Personal Use of Web Archives
 
Intro to Web Archiving
Intro to Web ArchivingIntro to Web Archiving
Intro to Web Archiving
 
Enabling Personal Use of Web Archives
Enabling Personal Use of Web ArchivesEnabling Personal Use of Web Archives
Enabling Personal Use of Web Archives
 
Visualizing Webpage Changes Over Time
Visualizing Webpage Changes Over TimeVisualizing Webpage Changes Over Time
Visualizing Webpage Changes Over Time
 
How to Write an Academic Paper
How to Write an Academic PaperHow to Write an Academic Paper
How to Write an Academic Paper
 
How to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic PresentationHow to Prepare and Give and Academic Presentation
How to Prepare and Give and Academic Presentation
 
My Academic Story via Internet Archive
My Academic Story via Internet ArchiveMy Academic Story via Internet Archive
My Academic Story via Internet Archive
 
A Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor NetworksA Retasking Framework For Wireless Sensor Networks
A Retasking Framework For Wireless Sensor Networks
 
Strategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency ResponseStrategies for Sensor Data Aggregation in Support of Emergency Response
Strategies for Sensor Data Aggregation in Support of Emergency Response
 
Detecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARCDetecting Off-Topic Web Pages at #CUWARC
Detecting Off-Topic Web Pages at #CUWARC
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless Nanonetworks
 
2015-capwic-gradschool
2015-capwic-gradschool2015-capwic-gradschool
2015-capwic-gradschool
 
2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web2015-odu-ece-tools-for-past-web
2015-odu-ece-tools-for-past-web
 
Tools for Managing the Past Web
Tools for Managing the Past WebTools for Managing the Past Web
Tools for Managing the Past Web
 
Archive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH OverviewArchive What I See Now - 2014 NEH ODH Overview
Archive What I See Now - 2014 NEH ODH Overview
 
Bits of Research
Bits of ResearchBits of Research
Bits of Research
 
Telling Stories with Web Archives
Telling Stories with Web ArchivesTelling Stories with Web Archives
Telling Stories with Web Archives
 
"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview"Archive What I See Now" - NEH ODH overview
"Archive What I See Now" - NEH ODH overview
 
Visualizing Digital Collections at Archive-It
Visualizing Digital Collections at Archive-ItVisualizing Digital Collections at Archive-It
Visualizing Digital Collections at Archive-It
 

Dernier

IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 

Dernier (20)

IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 

TDMA Slot Reservation in Cluster-Based VANETs

  • 1. TDMA Slot Reservation in Cluster-Based VANETS Mohammad S. Almalag Dissertation Defense April 3, 2013 Advisor: Michele C. Weigle
  • 2. Research Question Can VANETs accommodate non-safety applications’ use of the spectrum while still meeting the requirements of safety applications? 04/03/2013 2
  • 3. Outline • Background • Related Work • Thesis Statement • TC-MAC • Evaluation • P2P File Sharing using TC-MAC • Conclusion • Future Work 3 04/03/2013
  • 4. Background VANET Vehicular Ad-Hoc Network (VANET): ▫ Increase traveler safety ▫ Decrease traveling time and fuel consumption ▫ Increase on board luxury 04/03/2013 4
  • 5. Background Applications 04/03/2013 5 Application categories: • Safety  Emergency Electronic Brake Light  Co-operative Collision warning  Intersection Collision Warning  Approaching Emergency Vehicle • Non-safety  File sharing  Traffic Information  Parking Lot Payment  Electronic Toll Collection
  • 6. Background Messages • Update messages (periodic) ▫ Broadcast every 100 msec ▫ Speed, position, direction, etc. • Safety messages ▫ Event-driven ▫ Very high priority ▫ High reliability • Non-safety message ▫ High transmission rate ▫ Low priority 04/03/2013 6
  • 7. Background DSRC/WAVE Dedicated Short Range Communication (DSRC) channels Wireless Access in Vehicular Environments (WAVE) 04/03/2013 7
  • 8. The problem • Scalability:  Poor channel reliability • Hidden terminal 04/03/2013 8
  • 9. The problem • Safety message requirements ▫ High reliability ▫ Lifetime 100 msec [Wang, ACM VANET 2008] 04/03/2013 9 Non-Safety messages almost shut down Low Medium High Traffic Density
  • 10. Related Work MAC PROTOCOLS FOR VANET Classified into three different categories 1.Channel partitioning: ▫ Time Division Multiple Access (TDMA), Frequency-Division Multiple Access (FDMA) and Code-Division Multiple Access (CDMA) 1.Random access: ▫ Contention based protocols, CSMA 1.Taking turns: ▫ Polling (master-slave) or token ring 04/03/2013 10
  • 11. Related Work MAC PROTOCOLS FOR VANET Examples: 1.VeSOMAC (Yu and Biswas, 2007) ▫ TDMA + location based ▫ Does not considerV2I communication 1.VeMAC (Omar et al., 2011) ▫ TDMA + 2 transceivers ▫ Includes vehicles in both directions + RSU in one TDAM frame ▫ 2 transceivers + Overhead 1.PP-CSMA (Yang et al., 2005) 1. CSMA + priority scheme + polling scheme 2. Does not consider Broadcasting! 2.MCTRP (Bi et al., 2009) ▫ Token ring + 2 transceivers + road conditions ▫ Uses CSMA CA mechanism for inter-ring communication 04/03/2013 11
  • 12. Thesis Statement TDMA slot reservation in cluster-based VANETs will improve the performance of delivering non-safety messages with little impact on the delivery of safety messages. 04/03/2013 12
  • 13. Outline • Background • Related Work • Thesis Statement • TC-MAC • Evaluation • P2P File Sharing using TC-MAC • Conclusion • Future Work 13 04/03/2013
  • 14. My Approach 1. Solves network scalability and hidden terminal problems 2. Fair transmission for safety and non-safety messages 3. Lightweight TDMA assignment scheme 4. Efficiently manages cluster with changes of topology 5. Develop TC-MAC cluster-based MAC protocol 6. Evaluate TC-MAC vs. WAVE 04/03/2013 14
  • 15. TC-MAC Structure • Based on multi-channel DSRC layout ▫ 1 CCH and 6 SCHs • TDMA technique using local IDs for accessing the channels • Cluster-based protocol ▫ Clusterhead (CH) scheme 04/03/2013 15
  • 16. TC-MAC TDMA • Time Division Multiple Access (TDMA) is a method used to enable multiple nodes to transmit on the same frequency channel 04/03/2013 16
  • 19. TC-MAC Local IDs 04/03/2013 19 • Each vehicle in the cluster will receive a local ID (0 to Nmax -1): ▫ CH will always have ID 1 ▫ ID 0 is reserved for a virtual vehicle
  • 21. TC-MAC Intra-cluster Communication • Lightweight communication protocol • Each vehicle uses its own mini-slot to disseminate safety/update messages • First byte, 28 = 128 different situations. Examples: ▫ 0: vehicle is not communicating at the moment ▫ 1: vehicle is involved in communicating with some other vehicle in the cluster. (Unicast) ▫ 2: vehicle is involved in communicating with some other vehicles in the cluster. (multicast group) ▫ 3: vehicle is involved in communicating with a vehicle or RSU outside the cluster ▫ 4: the CH is leaving the cluster 04/03/2013 21
  • 22. TC-MAC Intra-cluster Communication • Disseminating intra-cluster non-safety messages: ▫ Unicast:  Set up without CH intervention.  Using the local ID for channel and slot time. ▫ Multicast:  Small group of vehicles (<5):  Set up without CH intervention.  Large group of vehicles (>=5):  Set up with CH intervention. 04/03/2013 22
  • 24. Clustering Clusterhead Election • Based on the traffic flow: ▫ Lane Weight ▫ Little overhead ▫ Network Connectivity Level (NCL) ▫ Average Distance Level (ADL) ▫ Average Velocity Level (AVL) ▫ Clusterhead Level (CHL): 04/03/2013 24 iiii AVLADLtNCLCHL ++= )(
  • 25. Clustering Cluster Maintenance • The behavior of many vehicles may change the topology of the cluster: 1. A Clusterhead leaving the cluster 2. A new vehicle joining the cluster 3. A cluster member leaving the cluster 4. Two clusters come in range of each other 5. A multi-hop cluster shrinks to a one-hop cluster 04/03/2013 25
  • 26. Clustering Cluster Maintenance A Clusterhead leaving the cluster : 04/03/2013 26
  • 27. Clustering Cluster Maintenance A new vehicle joining the cluster : 04/03/2013 27
  • 28. Clustering Cluster Maintenance Two clusters come in range of each other: 04/03/2013 28
  • 29. CDMA/TC-MAC Inter-cluster communication • CDMA/TC-MAC hybrid protocol for inter-cluster communication. • CDMA code for each cluster ▫ Intra-cluster communication • Two protocols: 1.Code assignment protocol 1.Recovery protocol 04/03/2013 29
  • 30. CDMA/TC-MAC Code assignment protocol • Select a CDMA code to the cluster  Done by the CH • 18 different CDMA codes: ▫ Based on the highway and the cluster’s directions ▫ 2 codes are global for each highway direction ▫ 4 codes for each traffic direction  1 code is temp ▫ Two clusters with two different codes between clusters sharing the same code 04/03/2013 30
  • 31. CDMA/TC-MAC Recovery protocol • Solve the issue of having two clusters in range of each other and sharing the same code 04/03/2013 31
  • 33. Outline • Background • Related Work • Thesis Statement • TC-MAC • Evaluation • P2P File Sharing using TC-MAC • Conclusion • Future Work 33 04/03/2013
  • 34. Evaluation Experiment Plan 04/03/2013 34 • NS-3 network simulator ▫ For VANET, (Arbabi and Weigle, 2010):  Intelligent Driver Model (IDM)  MOBIL lane change model • Network settings: ▫ Transmission range = 300 m ▫ Max. safety message size = 200 bytes ▫ Max. non-safety message size = 1200 bytes ▫ Date rate = 6 Mbits/sec ▫ CCHI = SCHI = 0.050 sec
  • 35. Evaluation Experiment Plan 04/03/2013 35 • Clusterhead Election: ▫ Scenarios:  Implemented for a highway  Different number of lanes, 2, 3, and 4 lanes  2 exits, on the right  25% of vehicles on the rightmost lane take the exit ▫ Evaluation metrics:  The number of CH changes ▫ Comparison:  Lowest-ID, Highest-degree, and Utility Function algorithms
  • 38. Evaluation Experiment Plan 04/03/2013 38 • TC-MAC: ▫ Scenarios:  Implemented for a highway  Different number of lanes, 2, 3, and 4 lanes  Different vehicles densities  Single-hop and two-hop clusters ▫ Evaluation metrics:  Reliability of safety messages  Direct safety/update messages  Indirect safety messages  Throughput of non-safety messages
  • 41. Evaluation TC-MAC (Results) 04/03/2013 41 • Single-hop cluster, all vehicles in the cluster are engaged in communications during their own slot time on the SCHs
  • 42. Evaluation TC-MAC (Results) 04/03/2013 42 • Single-hop cluster, half vehicles in the cluster are engaged in communications during their own slot time on the SCHs
  • 43. Evaluation WAVE (Results) 04/03/2013 43 • Percentage of collisions during the CCHI for WAVE using a single-hop cluster
  • 44. Evaluation WAVE (Results) 04/03/2013 44 • Reliability of Safety messages in WAVE using a single- hop cluster
  • 45. Evaluation TC-MAC (Results) 04/03/2013 45 • The Throughput of non-safety messages using TC-MAC in a single-hop cluster
  • 46. Evaluation WAVE (Results) 04/03/2013 46 • The Throughput of non-safety messages using WAVE in a single-hop cluster
  • 47. Outline • Background • Related Work • Thesis Statement • TC-MAC • Evaluation • P2P File Sharing using TC-MAC • Conclusion • Future Work 47 04/03/2013
  • 48. Application P2P File Sharing Using TC-MAC 04/03/2013 48 • Large-scale file sharing between two vehicles • Using their slots on the SCHs • Using un-used slots on the SCHs ▫ Needs CH permission • Single-hop cluster
  • 49. Application Example 04/03/2013 49 • Assume vehicle A with local ID=4 wants to share a 4 MB MP3 file with vehicle B with local ID=15 ▫ A will make the handshake with B ▫ A will request time slots on the SCHs from the CH
  • 50. Application Example 04/03/2013 50 • To ensure that vehicles A and B are still receiving update messages from other vehicles nearby during the transmission of the shared file ▫ Switching on the SCH is required
  • 54. Conclusion • TC-MAC performs better than WAVE ▫ Collision free ▫ Higher reliability of safety messages ▫ High throughput of non—safety messages ▫ Support high densities ▫ Support topology changes, through the local IDs • CH election algorithm: ▫ Fewer CH head changes compared to other algorithms 04/03/2013 54
  • 55. My Contributions • Summary of existing MAC protocols for VANETs ▫ "MAC Protocols for VANETs", in Mobile Ad Hoc Networking, Cutting Edge Directions, 2nd ed., 2013. • A multi-channel cluster-based TDMA MAC protocol to coordinate intra-cluster communications (TC-MAC) ▫ [IEEE VTP, 2012], [MP2P, 2013] • A CH election and cluster formation algorithm based on the traffic flow and a cluster maintenance algorithm. ▫ [ON-MOVE, 2010] • A multi-channel cluster-based CDMA/TDMA hybrid MAC protocol to coordinate inter-cluster communications ▫ [IEEE Transactions on Intelligent Transportation Systems, in preparation] 04/03/2013 55
  • 56. Future Work • Further Analysis: ▫ The effect of guard intervals ▫ Three-hop clusters ▫ Different data rates • Design a numbering scheme for cluster members ▫ Missed update messages • Enhance the utilization on the SCHs ▫ By using the un-used slots on the SCHs. • Speed-based clustering ▫ Highways with different speed for each lane • CDMA/TDMA evaluation using simulation 04/03/2013 56
  • 57. Publications • Mohammad Almalag, Michele C. Weigle, Stephan Olariu, and Samy El-Tawab, Peer- to-Peer File Sharing in VANETs Using TC-MAC, Proceedings of the International Workshop on Mobile Peer-to-Peer Computing (MP2P) San Diego, CA, March 2013. • Mohammad Almalag, Stephan Olariu, and Michele C. Weigle, TDMA Cluster- based MAC for VANETs (TC-MAC), Proceedings of the IEEE Workshop on VANETs From Theory to Practice (VTP). San Francisco, CA, June 2012. • Mohammad S. Almalag and Michele C. Weigle. Using Traffic Flow for Cluster Formation in Vehicular Ad-hoc Networks. Proceedings of the Workshop On User Mobility and Vehicular Networks (ON-MOVE), Denver, CO, October 2010, pp. 631-636. • Book Chapter: Mohammad Almalag, Stephan Olariu, and Michele C. Weigle. MAC Protocols for VANETs. In S. Basagni, M. Conti. S. Giordano, I. Stojmenovic, eds., editors, Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd Edition. Wiley- IEEE Press, March 2013. • Book Chapter: Mohammad S. Almalag. Safety-related vehicular applications. In Stephan Olariu and Michele C. Weigle, editors, Vehicular Networks From Theory to Practice. Chap- man & Hall/CRC, 2009.ACM (Association for Computing Machinery). 04/03/2013 57
  • 58. Thank you Questions Mohammad Salem Almalag Department of Computer Science Old Dominion University 04/03/2013 58

Notes de l'éditeur

  1. This question was the starting point of research. The answer was NO Then I started to think, how can I make the answer to be YES?
  2. Vehicular Ad-hoc Networks (VANETs) are important component of Intelligent Transportation Systems (ITS). VANETs enable the exchange of messages between vehicles and between vehicles and infrastructure, as shown in the figure. Such communications aim to: Increase safety on the road Improve transportation efficiency And provide comfort to drivers and passengers.
  3. VANET is useful for a wide variety of applications, including both safety applications and non-safety applications [24]. Safety apps: Talk about EEBL as an example. If there is a truck in front of you that is blocking the view of the traffic ahead. And if someone used the break, the truck will block the tail lights, which will make the 1 sec not enough to react!!!! Non-safety apps: Talk about if you are traveling to Cali and you have a child that wants to watch a movie, how you can download it in the car.
  4. -In the US, VANETs use 75 MHz of spectrum specially allocated by the U.S. Federal Communications Commission for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure communication (V2I) using Dedicated Short Range Communication (DSRC) technology [19]. The spectrum band is divided into seven channels: Channel 178 is the control channel (used for safety/update messages) The other SIX channels are service channels. (to support non-safety messages) WAVE The IEEE has developed the 1609 family of standards for Wireless Access in Vehicular Environments (WAVE) In WAVE, the IEEE 1609.4 standard operates on top of IEEE 802.11p in the MAC layer. Which is Based on CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) mechanism IEEE 1609.4 focuses on multichannel operations of a DSRC radio. It introduces a Sync Interval
  5. - scalability is the ability to handle the addition of nodes or objects without suffering a noticeable loss in performance or increase in administrative complexity. 1- Due to the shared wireless channel with a CSMA/CA medium access scheme, the limited bandwidth is further decreased by poor channel utilization. Explain the hidden terminal problem
  6. Safety messages need to be sent every 100 msec. - Why? -&gt; This desire came from the allowable latency requirements of Life-Critical safety applications. -&gt; note that what Wang et al. did was  -- to enforce 90% and 95% reliability of safety messages, they changed the amount of time that non-safety apps can send during the 100ms interval. In high density, CCH interval will be higher than the SCH interval. So, non-safety mesg will be almost stopped. Traffic density: Low = 40 Medium = 80 High = 160
  7. (JUST SAY ACRONYMS) The issues of MAC protocols for WAVE, as described above, led researchers in developing new MAC protocols for VANETs. In general, MAC protocols can be classified into three different categories: channel partitioning: channel partitioning is done using the following methods: Time Division Multiple Access (TDMA), Frequency-Division Multiple Access (FDMA) and Code-Division Multiple Access (CDMA). These protocols are based on sharing the channel efficiently at high uniform load. The main advantages of protocols developed under this category are reducing interference between nodes and providing fairness. However, they add allocation complexity and suffer from inefficient channel utilization at low loads. random access: also known as contention based protocols, are based on the notion of CSMA. The goal of MAC protocols is to increase throughput, so protocols under this category aim to keep packet collisions to a minimum. The advantage of random access protocols is that they are not sensitive to underlying mobility and topology changes. Also, CSMA protocols are efficient in low load scenarios. However, in networks such as VANET, the hidden terminal problem and exposed terminals affect the system performance. taking turns: use either polling (master-slave) or token ring techniques. Such techniques provide fairness by giving each node a turn to transmit. They also provide a real time bandwidth allocation.
  8. VeSOMAC: a MAC protocol for inter-vehicular wireless networking using DSRC They designed a self-configuring TDMA slot reservation protocol capable of inter-vehicle message delivery with short and deterministic delay bounds. To achieve the shortest delay, vehicles determine their TDMA time slot based on their location and movement on the road. the TDMA slot assignment is designed to be in the same sequential order with respect to the vehicles physical location. Dis. Adv: VeSOMAC does not explain the communication between vehicles and RSUs. If the message is sent from tail to head, it will need a time frame for each hop VeMAC: TDMA two transceivers: One for CCH: safety messages and control messages for slot assignment. One for SCHs. VeMAC is designed based on having one control channel and multiple service channels in the network. Vehicles in both directions and RSUs are assigned to time slots in the same TDMA time frame. vehicles are said to be either travelling in the right (R) or left (L) direction. The time frame in VeMAC is divided into three different slots sets, L, R, and F. - To avoid the hidden terminal problem: each vehicle in VeMAC includes in the header on the CCH: the time slots used by the vehicle on the SCH the time slot used by each neighboring vehicle on the CCH the time slots used by each neighboring vehicle on the SCH the position and the current direction of the vehicle Overhead: Before accessing the CCH, vehicles has to check for the ones that are not used by other vehicles 2-hops away. This information is provided by other vehicles nearby. PP-CSMA: based on a priority scheme in CSMA using different backoff time spacing prioritization scheme as a combination of: Closeness of the transmitting vehicle to the receiving vehicle the message type Besides the priority scheme, a polling scheme: Each vehicle maintains a polling table that holds information about other vehicles positions. Dis. Adv: Did mention broadcasting MCTRP : More than one ring These rings are formed according to the velocity of vehicles and the road conditions. If a vehicle has an emergency message to be sent, it generates a tone, which is out of the frequency band used for data transmission. If the vehicle is in the receivers polling table, the receiver will clear for the sender to transmit the cd csdc
  9. In this case, we guarantee that every vehicle in the cluster sends one update/safety message every 100 msec to meet the safety message requirements. What is accuracy of GPS time sync? Typical accuracies range from better than 100 nanoseconds to a few milliseconds depending on the synchronization protocol
  10. Once the cluster is formed: The CH will assign local IDs to all cluster members. Then, the CH will send a table of the assigned local IDs to all cluster members
  11. Once the cluster members receive their local IDs, they will be using them to access to the channel to send/receive safety/update and non-safety messages. Notice that the Integer Division Theorem guarantees that if i ≠ j then either:
  12. Our goal is to design lightweight communication protocols that avoid, to the largest extent possible, the involvement of the CH in setting up connections between vehicles. The CH will also use the un-used mini-slots to rebroadcast safety messages. Remind that all vehicles in cluster within range of each other.
  13. -
  14. you need to add an example after this slide (before moving on to cluster).  Say you have two vehicles that need to communicate while sending their update messages.  How does this work?  Here you could explain the issue with missing update messages if their SCH is the same slot as others&apos; CCH.  You also should explain that the CH will rebroadcast update messages during unused slots.  It&apos;s never mentioned except in the evaluation, but it&apos;s an important part of the protocol.
  15. The CH will be selected based on the flow of the majority of traffic. If 2 CHs candidates have the same CHL, the one with the lowest ID will be the CH
  16. A Clusterhead leaving the cluster A new vehicle joining the cluster A cluster member leaving the cluster Two clusters get in range of each other A multi-hop cluster shrinks to a one-hop cluster
  17. We modified TC-MAC to overcome the inter-cluster communications challenge. The modification I made is using CDMA combined with TC-MAC for inter-cluster communications. With the use of the CDMA assigned code and TC-MAC inside the cluster, intra-cluster collisions should not happen. Also, this will support broadcast inside the cluster without the risk of the interference with other vehicles from other clusters. Code Assignment protocol is used to assign a CDMA code to the cluster
  18. Code Assignment protocol is used to assign a CDMA code to the cluster 14 codes CDMA/TCMAC considers vehicles in opposite directions, as well as opposite highway.
  19. The Recovery Protocol works when a vehicle in a cluster detects another vehicle from another cluster using the same CDMA code When the gap between the two clusters is less than 300 m, at least one vehicle from each cluster will detect the present of the other cluster, vehicles X and Y. The vehicle for the approaching cluster will inform its CH The CH will pick another CODE
  20. the GWs of both clusters need to get engaged in the process. the GWs of both clusters need to get engaged in the process. Let us assume that GW_tail of cluster A is sending and GW_head of cluster B At time t : GW_ tail of cluster A will send an advertisement on the mini-slot 0 on the CCH using CDMA code Code 1 . This advertisement will include the cluster size of A and the CDMA code used by cluster A (3, and Code 2 ). GWhead of cluster B will receive the advertisement from GWtail of cluster A. Then, it will pass the advertisement to the CH of B during its own time in cluster B using CDMA code Code 3. Note, this process could be done within 100 msec, before GWhead of cluster B sends back its own advertisement acknowledgement to GWtail of cluster A on the CCH. At time t +100 msec : GW head of cluster B will send an advertisement-acknowledgement to G Wtail of cluster A . Beside its cluster’s CDMA code and size, GW head of cluster B indicates that it has received the previous advertisement from GW tail of cluster A , and in the process of assigning a local ID in cluster B to GW tail of cluster A . The GWtail of cluster A will receive the advertisement-acknowledgement from GWhead of cluster B, and then pass its own CH. For the next transmission cycle, GWtail of cluster A should listen to the GWhead of cluster B on CCH during mini-slot 0 to get its own local ID in cluster B. At time t + 200 msec: By this time, GWhead of cluster B has already received from the CH of cluster B the local ID assigned to GWtail of cluster A. GWhead of cluster B sends the local ID to GWtail of cluster A. By the end of this cycle, GWtail of cluster A should receive the local ID of GWhead of cluster B in cluster A, and it can be sent to GWhead of cluster B during its own time slot in cluster B. After finishing the setup for the inter-cluster communications, vehicles GWtail of cluster A and GWhead of cluster B will be treated as cluster members of both clusters A and B.
  21. I ran simulations using ns-3 network simulator [53], which is a follow-on to the popular ns-2 simulator. For VANET, I used modules [which is developed by Dr Arbabi and Weigle from our research lab] that added well-known traffic mobility models, the Intelligent Driver Model (IDM) [55] and the MOBIL lane change model [56]. The goal was to create a vehicular network on highways with different number of lanes and different number of vehicles.
  22. Make sure to say that my algorithm is the traffic flow
  23. Make sure to say that my algorithm is the traffic flow
  24. Based on the network setting we have, The slots sizes are
  25. What is Communication Density? Communication Density is used to measure the channel load in vehicular communications. This is done by calculating the number of carrier sensible events per unit of time. In our evaluation, the CD is the number of messages per second.
  26. This aims to develop a P2P file sharing application using TC-MAC to improve the file downloading time between neighbouring vehicles.
  27. This aims to develop a P2P file sharing application using TC-MAC to improve the file downloading time between neighbouring vehicles.
  28. the granted time slots on the SCHs in the first half of the TDMA frame, and switch to the CCH during the second half of the TDMA frame. In the following TDMA frame, vehicles i and j will keep listening to the CCH, and then switch to the granted time slots on the SCHs in the second half of the TDMA frame. This process will continue until the file transmission is completed, or interrupted by the CH due to changes in the availability of the unused time slots