Instant Download The Next Generation Vehicular Networks, Modeling, Algorithm and Applications Zhou Su PDF All Chapters
Instant Download The Next Generation Vehicular Networks, Modeling, Algorithm and Applications Zhou Su PDF All Chapters
com
https://textbookfull.com/product/the-next-
generation-vehicular-networks-modeling-algorithm-
and-applications-zhou-su/
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-loucas/
textbookfull.com
https://textbookfull.com/product/game-theory-for-next-generation-
wireless-and-communication-networks-modeling-analysis-and-design-zhu-
han/
textbookfull.com
https://textbookfull.com/product/security-and-privacy-for-next-
generation-wireless-networks-sheng-zhong/
textbookfull.com
https://textbookfull.com/product/reliability-prediction-for-
microelectronics-1st-edition-joseph-b-bernstein/
textbookfull.com
Digital Archetypes Adaptations of Early Temple
Architecture in South and Southeast Asia 1st Edition
Sambit Datta
https://textbookfull.com/product/digital-archetypes-adaptations-of-
early-temple-architecture-in-south-and-southeast-asia-1st-edition-
sambit-datta/
textbookfull.com
https://textbookfull.com/product/native-but-foreign-indigenous-
immigrants-and-refugees-in-the-north-american-borderlands-brenden-w-
rensink/
textbookfull.com
https://textbookfull.com/product/the-practice-of-spatial-analysis-
helen-briassoulis/
textbookfull.com
https://textbookfull.com/product/islam-and-secular-citizenship-in-the-
netherlands-united-kingdom-and-france-1st-edition-carolina-ivanescu-
auth/
textbookfull.com
https://textbookfull.com/product/teacher-education-innovation-
intervention-and-impact-1st-edition-robyn-brandenburg/
textbookfull.com
ESG Investing For Dummies® Brendan Bradley
https://textbookfull.com/product/esg-investing-for-dummies-brendan-
bradley/
textbookfull.com
Wireless Networks
Series Editor
Xuemin Sherman Shen
University of Waterloo, Waterloo, ON, Canada
The purpose of Springer’s Wireless Networks book series is to establish the state
of the art and set the course for future research and development in wireless
communication networks. The scope of this series includes not only all aspects
of wireless networks (including cellular networks, WiFi, sensor networks, and
vehicular networks), but related areas such as cloud computing and big data.
The series serves as a central source of references for wireless networks research
and development. It aims to publish thorough and cohesive overviews on specific
topics in wireless networks, as well as works that are larger in scope than survey
articles and that contain more detailed background information. The series also
provides coverage of advanced and timely topics worthy of monographs, contributed
volumes, textbooks and handbooks.
** Indexing: Wireless Networks is indexed in EBSCO databases and DPLB **
Rui Xing
Shanghai University
Shanghai, China
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The next generation vehicular networks are expected to provide services with highly
improved network performance in terms of low cost and latency as well as high
network efficiency and quality of experience (QoE) to vehicles. Towards better
network maintainability and sustainability, this book proposes the novel network
envisions and framework design principles to realize the goals of the next generation
vehicular networks. As it is widely recognized, enabling technologies such as
information centric networks (ICN), edge caching, computation offloading, artificial
intelligence (AI), and autonomous driving play important roles in the wireless
technology developments along with the research on intelligent transportation
systems (ITS) and smart cities. The investigation and development on the integration
of vehicular networks and the new enabling technologies thus provide important
references for designing and developing the next generation vehicular networks.
However, with the advance of vehicular applications and the diverse service
requirements of vehicles, to develop the next generation vehicular networks by
investigating the integration of vehicular networks and the enabling technologies
becomes a new challenge. The reasons that contribute to this are detailed as follows:
(1) There is a huge amount of content to be delivered and vehicle users typically
have different behaviors in the vehicular networks. With the integration of ICN
and vehicular networks, an analytical scheme to facilitate the content delivery in
information centric vehicular networks is thus needed, where the behaviors of
vehicle users in the content delivery process should be taken into account. (2)
With the massive demands of various kinds of content services and different social
relationships among vehicles, the edge caching in vehicular networks faces the
challenges to decrease the latency, increase the efficiency of the networks, and
improve the QoE of vehicles. To this end, a novel edge caching framework by
considering the service requirements and the social ties of vehicles is necessary
to be developed. (3) In the vehicular networks, vehicles typically need to execute
various computing tasks during driving, such as video processing, online social
network services, and virtual reality. Caused by the limited computation power,
vehicles need to offload a part of their tasks to edge devices. Since the emerging
network applications may have different requirements of computing resources, the
v
vi Preface
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Overview of Vehicular Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Architecture of Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Applications in Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Overview of Enabling Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.1 Advanced Communication-5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.2 Mobile Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.3 Network Function Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.4 Software Defined Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.5 Computation Offloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.6 Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.2.7 Information Centric Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.2.8 Edge Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.2.9 Autonomous Driving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.2.10 Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.3 Aim of the Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2 Reputation Based Content Delivery in Information Centric
Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.2 Overview of Information Centric Vehicular Networks . . . . . . . . . . . . . . . . 32
2.2.1 Content Delivery in Vehicular Networks . . . . . . . . . . . . . . . . . . . . . 32
2.2.2 ICN Based Content Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2.3 Challenges of Content Delivery in Information
Centric Vehicular Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.3 Reputation Based Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.4 Framework of Reputation Based Content Delivery
in Information Centric Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.4.1 Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
ix
x Contents
xiii
xiv Acronyms
As one of the most important enabling technologies to realize the next generation
intelligent transportation system (ITS), vehicular networks are considered as a set
of vehicles embedded with on-board units (OBUs) and road infrastructures (i.e.,
roadside units (RSUs) and base stations (BSs)) [1–5]. With a radio interface, each
OBU can make the connection with other OBUs, RSUs, BSs and other smart
devices, by which they can communicate with each other to share useful information
with the goal of facilitating the driving and transportation system. Generally, as
the typical scenario which is shown in Fig. 1.1, vehicular networks mainly consist
of two types: (1) vehicle to vehicle communications, i.e., V2V, and (2) vehicle to
roadside infrastructure communications, i.e., V2I [6–10].
For V2V communications, a vehicle can communicate with the vehicles within
its communication coverage directly via a single hop connection [11–15]. In addi-
tion, a group can be formed by vehicles to achieve the long distance communication
via opportunistic routing through a multiple hop connection. In this way, a vehicle
can connect with other vehicles which are outside of its communication coverage.
For V2I communications, both the RSUs and BSs have the communication coverage
so that they can communicate with the vehicles when the vehicles drive in the
coverage [16–20]. Vehicular networks integrate the V2V and V2I by which the
information can be smoothly shared in the networks. For example, if a vehicle
is suffering a traffic accident, with the help of V2V communications, all vehicles
connected with it can obtain this accident information. In addition, the accident
information can be further relayed to other vehicles and RSUs or BSs to re-plan the
driving routes. With the real time information sharing, the traffic accidents can be
reduced and the traffic efficiency can be improved.
sensing, wrong way driving warning, signal violating warning and lane change
assistance [42]. For example, a vehicle can integrate the information from other
vehicles in the same lane to avoid collisions. If the vehicle intends to change its
driving lane, by using the messages from the adjacent vehicles in the neighboring
lane, it can complete the lane change in safety.
• Traffic applications: This type of application aims at improving the driving
experience by optimizing the traffic flow and providing vehicle position infor-
mation and maps [43]. Compared with safety applications, traffic applications
have no strict latency and reliability requirements. These applications may need
to be supported by a large number of alert messages. For instance, most of the
accidents are caused by the over speed of vehicles. Therefore, the vehicle speed
management becomes particularly important. In this case, the alert messages
(e.g., the regular speed limit notification) can help vehicle drivers pay attention to
their driving speeds. In addition, this type of application can greatly enhance the
traffic efficiency. One of the cases is that the cooperation detection and navigation
of vehicles and roadside infrastructures can help a driver obtain the optimal path
to the destination by collecting the traffic information in the vehicular networks.
In addition, by regulating and scheduling traffic flow, the traffic efficiency can be
significantly improved.
• Infotainment applications: The applications belong to this category is to pro-
vide on-demand entertainment services to the driving vehicles, which includes
custom information services, Internet access, multimedia content sharing, video
streaming, and so on. In recent years, video contents and video applications have
become the increasing infotainment services, such as remote video conferences,
live news and films. In fact, with the deployment of vehicular networks, vehicles
are no longer a simple means of transportation for people, but a private place to
support entertainment services. In this way, the time of attendance can be fully
used to improve the driving experience.
The fifth generation (5G) mobile communication technology is the latest generation
of cellular mobile communication technology. As the next telecommunication
standard, the 5G wireless system has attracted more and more attention from
academia, industry and government [44–47]. The development of 5G comes from
the growing demand for mobile data. Specifically, with the development of mobile
Internet, the networks exhibit two notable features. One feature is the growing
number of connected devices. Another feature is the emergence of new services
and applications requested by the connected devices. Meanwhile, the skyrocketing
mobile data traffic poses serious challenges to the network:
1.2 Overview of Enabling Technologies 5
MEC layer
User layer
cloud. In this way, the traffic congestion on the backbone networks thus can be
alleviated [53–55]. Furthermore, the latency of the computation tasks can be greatly
reduced compared with that executed by the remote cloud servers so that the QoE
of the vehicles can be guaranteed. Besides, with the distributed deployment of the
MEC servers, a large number of computation demands generated by vehicles can
be responded simultaneously [56], where the efficiency of the networks can be
improved. The detailed comparison of MCC and MEC is shown in Table 1.1.
A three-layer service model of MEC is depicted in Fig. 1.2. From this figure, we
can see that the framework consists of three layers, which are user layer, i.e., various
types of mobile devices (e.g., smart phones, desktops, laptops, tablets, watches
and vehicles), MEC layer and cloud layer. In vehicular networks, vehicle users
typically have different task computing demands. Due to the physical proximity
between MEC servers and vehicles, each task computing service can be responded
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
1.2 Overview of Enabling Technologies 7
and supported by MEC server immediately. After the execution of the task has been
accomplished, the MEC server then returns the result to the vehicle. In this way,
the energy consumption related to radio access and dissemination latency can be
greatly decreased compared with relying on the cloud server. However, with the low
computing and executing power of MEC servers, they can not always meet all of the
service demands generated from vehicles. In this case, the MEC servers can relay
these computing demands to the cloud server. After the task is completed, the cloud
server delivers the result of the computing task to the MEC server which will further
deliver the result to the vehicle. In this way, for the urgent computing tasks, they can
be executed by the MEC servers to reduce the latency time. For the tasks without
the strict delay requirements, they can be completed by the cloud server to improve
the resource utilization and task completion efficiency.
The network services are generally running on proprietary and dedicated hardware.
Network function virtualization (NFV) [57–61] is a network architecture that
aims to virtualize various types of network services. By consolidating different
network equipment on standard high-volume servers and leveraging virtualization
technologies, NFV has emerged as an initiative to transform the way of network
functions in software [62]. In particular, it can easily be migrated from one network
equipment to another without the need of having custom hardware appliances for
each network function. In this way, the flexibility of network service deployment can
be improved. In addition, compared with hardware installing, the investment cost of
the network provider can be reduced [63]. For example, a virtual session boundary
controller can be deployed to protect the networks without the construction cost and
complexity for installing a physical network protection unit.
The NFV architectural framework [64], as shown in Fig. 1.3, generally consists of
three parts which are virtual network functions (VNFs), NFV infrastructure (NFVI)
and NFV management and orchestrator (NFV MANO), respectively.
• VNFs are software implementation versions of network function components
running on multiple virtual machines (VMs). Each VNF is controlled by an
element management system (EMS).
• NFVI provides the network environment, where VNFs are deployed and exe-
cuted [65]. The virtual resources on NFVI are abstracted and logically partitioned
from the underlying hardware resources through a virtualization layer, where the
hardware resources can be computing, storage and network resources.
• NFV MANO provides organization and management of VNFs, which is con-
trolled by a set of VNF managers. The physical and virtual resources of NFVI
are also controlled through a virtualized infrastructure manager. In addition, NFV
orchestrator is in charge of VNF and other network services so that they can
achieve reasonable orchestration.
8 1 Introduction
NFV
Orchestrator
NFVI
Virtualized
Hardware Virtualization Virtual Software
Infrastructure
Resource Resource
Manager
Northbound Northbound
Interface (NBI) Interface (NBI)
SDN Controller
Southbound OpenFlow
Interface (SBI)
of network control [75]. In the SDN based vehicular networks, the RSUs and BSs are
only in charge of providing services for vehicles. The control decisions are made by
the SDN controller which has the global view of the networks. On the other hand,
the programmability of the control makes it easier to create new abstractions in
vehicular networks, simplify network management and promote network evolution
[76–79]. Particularly, in the case of the SDN-based vehicular networks, the vehicles
and the road infrastructures in the data plane are served as the forwarding devices
[69].
As shown in Fig. 1.4, the network space can be decoupled into three planes,
which are the data plane, control plane and application plane, respectively
[80–83].
• Data plane: The data plane abstracts the underlying resources (e.g., vehicles)
as SDN switches. These switches conform to the unified scheduling, follow
the OpenFlow protocol and route traffic along the path towards the selected
destination network [80]. In other words, the data plane does not concern about
the control policy. It only needs to address the incoming and outgoing data
packets according to the control instruction published by the control plane.
• Control plane: The control instruction is forwarded from each switch to the
centralized controller, i.e., SDN controller. It executes direct control for the data
plane elements through the well-defined southbound interface (SBI) [83]. The
separation of the data plane and the control plane also benefits from the well-
10 1 Introduction
defined programming interface between the switches and the SDN controller
[71]. In the development of SBI technology, OpenFlow is the most notable
example [84]. Its goal is to provide a platform that enables researchers to
run experiments in networks [82]. Through OpenFlow, it is possible to control
multiple switches by a single controller.
• Application plane: The application plane consists of many types of applications,
such as efficiency applications, security applications and infotainment appli-
cations in vehicular networks [85]. Each application represents a client entity
and may request services from the SDN controller, where the communication
between the clients and the SDN controller is routed by the northbound interface
(NBI).
With the help of MEC technology, the computation resources can be brought to the
edge of the networks. In MEC, computation offloading is considered as one type
of consumer-oriented service. This is because the vehicle users can benefit from
MEC by computation offloading [86–89], e.g., speed up the process of computation,
save computation resources, alleviate energy consumption and prolong battery life.
For the integrated networks, the computation offloading aims to migrate some
computation tasks or functions from vehicles to MEC servers. The computation
offloading process contains three parts, which are offloading decision, offloading
execution and results return, respectively.
In the vehicular networks, each vehicle typically has computing resources to
execute its task by itself. In fact, vehicles on the road can form a group, which is
called as vehicular cloud, to share their computing resources [90–93]. The resources
owned by vehicles are however less than those of MEC server. For a vehicle which
intends to compute its task, the first step is to make the task offloading decision. The
decision indicates that the vehicle decides whether to offload its computing task
to one of the MEC servers in the networks or not. Then, if the vehicle decides to
offload its task, the task will be executed by its connected MEC server. After the
task execution has been accomplished, the task result will be returned to the vehicle
using the V2I communications.
Apart from the computation offloading decision, the vehicle also needs to
determine the number of computation tasks that can be offloaded to its connected
MEC server. Basically, a decision on computation offloading can result in two cases.
One case is binary offloading, where the vehicle will offload all computation tasks
or offload nothing. Another decision is to select a part of the computation tasks to
offload, while the rest is processed by the vehicle itself. In addition, a task can be
divided into several mutually independent subtasks or submodules, by which a part
of the subtasks can be offloaded to the MEC server to speed up the task computing
process. On the other hand, some subtasks can not be executed in a parallel way. For
1.2 Overview of Enabling Technologies 11
MEC server
Base
Station
Binary
offloading
Local
computing
Partial
offloading
Computation tasks
to be executed
example, the input of task B may be based on the output of task A. If a user intends
to execute task B, it should obtain the result of task A at first.
To summarize, the offloading decisions can be divided into three categories
which are local computing, binary offloading and partial offloading, respectively.
The details of different computation offloading decisions are shown in Fig. 1.5.
• Local computing: In the integrated networks, both end-user devices (e.g., smart
phones, laptops and tablets) and IoT devices (e.g., vehicles equipped with OBUs)
have computation capacities. Thus, the computation tasks of vehicles can be
executed locally based on their own computation resources when the MEC
servers are not available or the vehicles have enough time and computation
resources to execute the computation tasks. Furthermore, if a vehicle does not
want to give payment for executing offloading services, it can select local
computing to execute the task.
• Binary offloading: The binary offloading means that all computation tasks
cannot be partitioned and are offloaded and executed as a whole at the MEC
server, where each computation task is required to be executed within the
deadline. If the computation resources of the MEC server are not available, it
can deliver the computation tasks to the cloud server for computing. After the
offloaded tasks are completed, the results will be returned to the corresponding
vehicles. The flow-process diagram of computation offloading is depicted in
Fig. 1.6.
Random documents with unrelated
content Scribd suggests to you:
rakkautensa tarinaa tai, mennäksemme myöhempään aikaan,
kuunnelkaamme hetkinen Montaignen viisautta ja Voltairen naurua,
Shakespearen huvinäytelmien syvää huumoria tai Goethen
nuoruudenlyriikan täyteläistä tunnetta! Tai — jos tahdomme pysyä
omien kirjailijaimme piirissä — omistakaamme päivämme
Runebergin Hannan juhannusidyllille tai seuratkaamme Aleksis
Kiveä hänen retkillään "teille kultaisille Hämeenmaan"! Tai — jos
emme tunne olevamme viritettyjä ottamaan vastaan runoutta —
viipykäämme hetkinen jonkun ajattelijan, tutkijan, historioitsijan,
valtiomiehen, löytöretkeilijän teoksen ääressä, kirjan parissa, jonka
muistamme joskus vieneen meidät ulkopuolelle oman pienen
maailmamme ajatuksen ja luonnon suureen maailmaan. Jos näin
teemme, emme voi olla tuntematta, miten paljon olemme
kirjoillemme velkaa, noille hiljaisille seuralaisillemme, jotka
läheisyydessämme, jatkuvassa vuorovaikutuksessa kanssamme,
elävät omaa erikoista, salaperäistä elämäänsä, hengen ajatonta
elämää.
*** END OF THE PROJECT GUTENBERG EBOOK RUNOUDEN
KUVASTIMESSA ***
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.