27 Ameer Aliee
27 Ameer Aliee
Abstract
Vehicle Ad hoc Networks (VANET) emerged as a subset of the
Mobile Ad hoc Network (MANET) application; it is considered
to be a significant approach to the ITS (Intelligent Transportation
System). VANETs are introduced to assist drivers and improve
safety issues and driving comfort, as a step towards constructing a
safer, smoother, cleaner and more intelligent environment. At the
present time vehicles are equipped with On Board Units (OBU)
this enables vehicles to sense situations affecting other vehicles
and manage communications. VANET is a new communication
paradigm that enables the communication between vehicles
moving at high speeds on the roads. This inspired to develop several
new applications like, traffic engineering, traffic management,
dissemination of emergency information to avoid hazardous
situations and other user applications.802.11p, also known as
WAVE, is a standard protocol intended for future traffic systems in
order to support safety and commercial non-safety applications for Fig. 1: Vehicular Ad-Hoc Network Overview
vehicular communication. 802.11p is amended from 802.11a, and
both are based on OFDM. The main difference between 802.11a VANETs and MANETs present some similar characteristics such
and 802.11p is that 802.11p uses 10 MHz frequency bandwidth as low bandwidth, short range of transmission and omnidirectional
(half of bandwidth of 802.11a) in order to make the signal more broadcast. However, VANETs have some unique characteristics
robust against fading and increase the tolerance. This paper such as:
investigate the performance of 802.11p for Vehicle-to-Vehicle
communication through real-world experiments using different A. Highly Dynamic Topology
adhoc routing protocols. We measure throughput and packet losses Vehicles move at different directions and/or speed and, as a result
of 802.11pin urban environments. In addition, the performance of the topology changes constantly;
routing protocol with different modulations by varying the number
of vehicles to evaluate the feasibility of using rate adaptation for B. Frequently Disconnected Network
safety V-to-V applications. The highly dynamic topology results in frequent changes in its
connectivity, thus the link between two vehicles can quickly
Keywords disappear while they are transmitting information;
Performance, Analysis, Ad Hoc Network, AODV, DSR, DSDV,
NS2 C. Geographical Type of Communication
Vehicles to be reached typically depend on their geographical
I. Introduction location. This differs from other networks where the target node
The increasing in demand of wireless communication and the needs or a group of target nodes are defined by an ID or a group ID;
of new wireless devices have tend to research on self-organizing,
self-healing networks without the interference of centralized or D. Constrained Mobility and Prediction
pre-established infrastructure/authority. The networks with the VANETs present highly dynamic topology but vehicles usually
absence of any centralized or pre-established infrastructure are follow a certain mobility pattern constrained by roads, streets and
called Ad hoc networks. Ad hoc Networks are collection of self- highways, traffic lights, speed limit, traffic conditions, and drivers’
governing mobile nodes [1]. driving behaviors. Thus, given the mobility pattern, the future
Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad position of the vehicle is more feasible to be predicted;
Hoc Networks (MANETs). VANET is one of the influencing areas
for the improvement of Intelligent Transportation System (ITS) E. Propagation Model
in order to provide safety and comfort to the road users. VANET Typically, VANETs operate in tree environments: highway,
assists vehicle drivers to communicate and to coordinate among rural and city. In a highway, the propagation model is usually
themselves in order to avoid any critical situation through Vehicle assumed to be free-space, but the signal can suffers interference
to Vehicle communication e.g. road side accidents, traffic jams, by the reflection with the walls around the roads. In a city, its
speed control, free passage of emergency vehicles and unseen surroundings can be complex and more difficult to communication
obstacles etc. Besides safety applications VANET also provide due to variable node density and the presence of buildings, trees
comfort applications to the road users. For example, weather and other objects that act as obstacles to the communication signal
information, mobile e-commerce, internet access and other and cause shadowing, multipath and fading effects. Usually, the
multimedia applications [2]. Fig. 1 shows the overall working propagation model is assumed to be not free-space due to those
structure of VANET. characteristics of the communication environment. In the rural
environments, due to the complex topographic forms (fields, hills, B. Multichannel Operation
climbs, dense forests, etc.), it is important to consider the signal IEEE 1609.4 is one of the standards of the IEEE 1609 protocol
reflection and the attenuation on the signal propagation. Thus, in family, which manages channel coordination and supports MAC
this scenario the free-space model is not appropriate. As in any service data unit delivery. This standard describes seven different
other network, the propagation model in a VANET must consider channels with different features and usage (six service channels
the effects of potential interference of wireless communication (SCH) and one control channel (CCH)). In addition, these
from other vehicles and the existence of largely deployed access channels use different frequencies and transmit powers. Eichler
points. [3] mentions that each station continuously alternates between
Several publications ([3-5]) have studied the performance of the control channel and one of the service channels; however the
802.11p, however they do not support realistic vehicular mobility different channels cannot be used at the same time. According
simulation. In [6], the authors present a comprehensive evaluation to [9], the control channel is used for system control and safety
and simulative review of the performance of 802.11p and WAVE data transmission. On the other hand, non-safety messages are
standards. They use Qualnet network simulator for the simulation exchanged by the six service channels. The IEEE 802.11p MAC
portion. In terms of modelling accuracy, A new model of IEEE layer is based on multichannel operation of WAVE architecture
802.11 MAC and PHY, which support IEEE 802.11P, is designed and 802.11e EDCA. This mechanism defines four different access
and implemented in ns-2 network simulator version 2.34 [7]. This categorizes (AC) for each channel. The access categories are
version of ns-2 network simulator is used for this paper [8]. indicated by AC0-AC3, and each of them has an independent
queue [3]. The EDCA mechanism provides prioritization by
The remainder of this paper is organized as follows. In section II assigning different contention parameters to each access category.
we clarify the WAVE and IEEE802.11p structure.Different adhoc AC3 has the highest priority to access medium, and AC0 has the
protocols are described in section III. The simulation scenario lowest priority. So there are six service channels and one control
is conducted in section IV. Results from the simulation and the channel and each of them has four different access categories.
analyses of the performance metrics of the IEEE 802.11p are Consequently, during data transmission, there are two contention
presented in section V. Finally, this paper is concluded in Section procedures to access the medium:
VI. • Internal contention procedure which occurs inside each
channel between their access categories by using the
II. Overview of 802.11p Protocol contention parameters (Arbitrary InterFrame space (AIFS)
In this section we briefly present an outline of WAVE architecture and Contention Window (CW)),
system and IEEE 802.11p protocol for VANET. • The contention procedure between channels to access the
medium is supported by different timer settings based on the
internal contention procedure.
along the roadside, formation of loops. The stations periodically transmit their routing
• On-board unit (OBU) mounted on a vehicle and can operate tables to their immediate neighbors. A station also transmits its
while moving. routing table if a significant change has occurred in its table from
the last update sent. So, the update is both time-driven and event-
IEEE 1609.1 standard defines a WAVE application known as driven.
resource manager (RM) which should allow communication The routing table updates can be sent in two ways: a “full dump”
between applications runs on RSUs and OBUs. The RM resides or an incremental update. A full dump sends the full routing table
on either OBUs or RSUs [10]. to the neighbors and could span many packets whereas in an
incremental update only those entries from the routing table are
E. Security Services sent that has a metric change since the last update and it must fit in a
The IEEE 1609.2 standard defines security services for the packet. If there is space in the incremental update packet then those
WAVE architecture and the applications which run through this entries may be included whose sequence number has changed.
architecture. This standard defines the format and the processing When the network is relatively stable, incremental updates are
of secure messages; furthermore, it describes the core security sent to avoid extra traffic and full dump are relatively infrequent.
functions [11]. In a fast-changing network, incremental packets can grow big so
full dumps will be more frequent.
III. Vanet Routing Protocol
Wireless networks can be classified in two types: 2. Ad Hoc on -Demand Distance Vector Routing (AODV)
AODV [11] discovers routes on an as needed basis via a similar
A. Infrastructure Networks route discovery process. However, AODV adopts a very different
Infrastructure network consists of a network with fixed and wired mechanism to maintain routing information. It uses traditional
gateways. A mobile host communicates with a bridge in the network routing tables, one entry per destination. This is in contrast to
(called base station) within its communication radius. The mobile DSR, which can maintain multiple route cache entries for each
unit can move geographically while it is communicating. When it destination. Without source routing, AODV relies on routing table
goes out of range of one base station, it connects with new base entries to propagate an RREP back to the source and, subsequently,
station and starts communicating through it. This is called handoff. to route data packets to the destination. AODV uses sequence
In this approach the base stations are fixed. numbers maintained at each destination to determine freshness
of routing information and to prevent routing loops. All routing
B. Infrastructure Less (Ad-hoc) Networks packets carry these sequence numbers.
In ad hoc networks [14] all nodes are mobile and can be connected
dynamically in an arbitrary manner. As the range of each host’s An important feature of AODV is the maintenance of timer -based
wireless transmission is limited, so to communicate with hosts states in each node, regarding utilization of individual routing table
outside its transmission range, a host needs to enlist the aid of its entries. A routing table entry is expired if not used recently. A set
nearby hosts in forwarding packets to the destination. So all nodes of predecessor nodes is maintained for each routing table entry,
of these networks behave as routers and take part in discovery indicating the set of neighboring nodes which use that entry to
and maintenance of routes to other nodes in the network. Ad route data packets. These nodes are notified with RERR packets
hoc Networks are very useful in emergency search-and-rescue when the next -hop link breaks. Each predecessor node, in turn,
operations, meetings or conventions in which persons wish to forwards the RERR to its own set of predecessors, thus effectively
quickly share information, and dataacquisition operations in erasing all routes using the broken link. In contrast to DSR, RERR
inhospitable terrain. This ad-hoc routing protocols can be divided packets in AODV are intended to inform all sources using a link
into two categories: when a failure occurs. Route error propagation in AODV can be
visualized conceptually as a tree whose root is the node at the point
1. Table-Driven Routing Protocols of failure and all sources using the failed link as the leaves.
In table driven routingprotocols, consistent and up-t o-date routing
information to all nodes is maintained at each n ode. 3. Dynamic Source Routing (DSR)
The key distinguishing feature of DSR [13] is the use of source
2. On-Demand Routing Protocols routing. That is, the sender knows the complete hop - by-hop route
In On-Demand routingprotocols, the routes are created as and to the destination. These routes are stored in a route cache. The
when required. When a source wants to send to a destination, it data packets carry the source route in the packet header. When
invokes the route discovery mechanisms to find the path to the a node in the ad hoc network attempts to send a data packet to a
destination destination for which it does not already know the route, it uses
a route discovery process to dynamically determine such a route.
B. Ad-Hoc Routing Protocols Description Route discovery works by flooding the network with route request
(RREQ) packets. Each node receiving an RREQ rebroadcasts it,
1. Destination -Sequenced Distance -Vector unless it is the destination or it has a route to the destination in its
The Destination-Sequenced Distance-Vector (DSDV) [12] route cache. Such a node replies to the RREQ with a route reply
Routing Algorithm is based on the idea of the classical Bellman- (RREP) packet that is routed back to the original source. RREQ
Ford Routing Algorithm with certain improvements. Every mobile and RREP packets are also source routed. The RREQ builds up
station maintains a routing table that lists all available destinations, the path traversed across the network. The RREP routes itself back
the number of hops to reach the destination and the sequence to the source by traversing this path backward. The route carried
number assigned by the destination node. The sequence number is back by the RREP packet is cached at the source for future use.
used to distinguish stale routes from new ones and thus avoid the If any link on a source route is broken, the source node is notified
using a route error (RERR) packet. The source removes any route for Urban VANET model for different routing protocols. For
using this link from its cache. A new route discovery process must reliability, seed values are given for 5 different simulation which
be initiated by the source if this route is still needed. DSR makes are used to find the values and the average is considered. The
very aggressive use of source routing and route caching. performance of different routing protocol using 802.11p standard
are studied based on the performance metrics.
IV. Simulations
The simulation model is based on NS 2 simulation version 2.34. V. Simulated results
The simulation scenario is designed according to the normal For all the simulations, the same movement models were used,
state of car running on a road. The position and the movement of the number of traffic sources wasvaried from 4, 8, 16, 24, 32 and
the nodes are given in the screen scenario generator file shown maximum speed of the nodes was set to 40kmph and the number
in Table 1. The routing parameters are obtained from the trace of nodes was varied as 8, 16, 32, 48 and 64.
file. To evaluate the performance of the routing protocols, some
parameters have been used in the TCL file for measuring the A. Packet Delivery Ratio(PDR)Vs Number of Nodes
efficiency of vehicle-to-vehicle communication. The studies of The performance of various routing protocols such as AODV,
these parameters are analyzed by the NS 2 Trace file. Therefore DSDV and DSR in terms of packet delivery ratio to the number
the Agent Trace ON and Route Trace ON in the TCL file are of nodes is shown below in figure 3 and values obtained are given
activated. The speed of the vehicles is assumed to be constant at in Table 3.
40kmph. An IEEE working group has invented a new PHY/MAC
layer amendment of the 802.11p standard, which is designed for Table 3:
car-to-car and car-to-infrastructure communication only. NODES AODV DSDV DSR
The critical parameters used in the NS 2.34 version simulation is
given in below table: 8 80.218 67.94 71.7638
16 75.1415 63.5137 59.9913
Table 1: Parameters for NS 2.34 32 76.0607 54.456 52.4402
Network Area 600m x 300m 48 76.0572 53.34 50.8423
Radio Range 200m
64 77.6726 52.2667 51.015
Traffic Type CBR
Visualization Tool Nam, Trace
Duration 200 seconds
MAC Layer 802.11p,802.11
Protocol AODV,DSDV,DSR
Number of nodes 8,16,32,48,64
Speed 40Kmph
Table 4: Throughput in 802.11p Fig. 5 shows the Normalized Routing Load (NRL). It is observed
NODES AODV DSDV DSR that DSDV consistently has more NRL (19.67%) compared to
reactive protocols. This is because the proactive routing protocols
8 634.27 775.44 508.07
generate sustained control traffic, in order to have updated
16 553.4 613.29 310.34 information about the topology and routing paths. This process
32 474.88 354.22 111.26 is done irrespective of user communication. On one hand this
48 511.83 331.01 97.01 helps in avoiding initial latency of finding routes, but in return
64 484.15 327.71 63.27 it generates more routing overhead compared to reactive routing
protocols. It is observed that AODV has less routing overhead
(23.15%) compared to DSDV with NLR% as 19.67.
VI. Conclusion
In this paper, we compared the performance of DSDV, AODV and
DSR routing protocols for ad hoc networks using ns-2 presents the
study of an efficient routing protocol for vehicular communication
in city environment. The earlier VANET models discussed only
the communication between vehicles through the RSU. Most of
the researchers used standard 802.11 for VANET model with the
movements of mobile nodes within the city area.
Fig. 5: Normalized Routing Load Vs Number of Nodes