JU Journal of Information Technology (JIT), Vol. 2, June 2013 17 Application of Graph theory and Error Correcting Code in VANETs Mostofa Kamal Nasir and Shamim Al Mamun Abstract—Vehicular Ad-Hoc Networks (VANETs) are fetching more and more importance for researchers trying to find solutions to improve safety and comfort of passenger and drivers. VANET applications demand some form of concentration and dealings with the driver, raising a legitimate concern on how safe is their use while driving. Finding the best route towards a destination in the complex and complicated roads network of the modern cities is a major challenge in the attempt to improve traffic conditions. This paper presents an application of graph theory in VANET that offers a solution to this problem, based on the Bellman-Ford algorithm and Dijktra algorithm. This application aims at reducing the total travel time towards a destination by providing the best route. This paper also represent how to correct error while transmitting information in VANET. Index Terms— ITS, VANET, Graph, Hamming Code, Ad-hoc and Routing. V I. INTRODUCTION ANET is an emerging new communication technology between nodes that they are beyond of the reach of transmission of the radio is made in multi hops through the intermediate nodes contribution[5]. Moreover, the topology of the networks can move dynamics due to inoperative. On the other hand, the media without wire, into the absence of infrastructures and the multi hops routing transforms these networks in potentially drop the performance[6]. The characteristics of the VANET require a solution that integrates the routing protocols of ad-hoc networks. Over the past ten years, research on this technology has accelerated sharply due to possible commercial implications and the likely impact on road. It arises over the years many development organizations in order to give a boost to the imminent standardization of protocols and devices on the VANET. It is possible to employ the VANET scenario in a graph structure G = (V, E) with V equal to the set of vehicles and E the set of physical links between nodes. The following figure 1, can realize a scenario of this type of networks. which has attracted a lot of research attention from academic community and industry. VANET is based on Wi-Fi technology aim to offer vehicles the possibility of exchange of information of any kind, whose nodes are mainly the vehicles and characterized by high mobility. VANET is a special type of mobile ad-hoc networks (MANET), are free to move randomly and organize themselves arbitrarily various rapidly and unpredictably topology[1]. Such a network may operate alone or be connected to the Internet. VANET differ from the simple MANET to the high mobility of nodes which causes frequent and radical topology changes[2]. You may also notice how the set of candidate applications to be developed for this technology as well as available resources and limitations due to development scenario, make the VANET distinct area of environment of wireless communications[3]. The main characteristic of the VANET is the infrastructure absence[4], such as access point or base stations, existing in the Wi-Fi, WiMax, GSM or UMTS. The communication Fig:-1: Vehicular Ad-hoc Network Manuscript received February 9, 2013. Mostofa Kamal Nasir, was with Dept. Of CSE, Mawlana Bhashani Science and Technology University Santosh, Tangail, Bangladesh; (e-mail: kamal.mostofa@ gmail.com). Shamim Al Mamun, was with Institute of Information Technology, Jahangirnagar University, Savar, Dhaka-1342, Bangladesh (e-mail: [email protected]). II. APPLICATION OF VANET The use of radio communications for the interaction between vehicles to vehicles and vehicle to infrastructure is strongly aim at the establishment of an ITS. The use of these JU Journal of Information Technology (JIT), Vol. 2, June 2013 18 technologies is intended that as well as get real-time news about what is happening on the road that was running. There are three types of application of VANET that are safety, nonsafety and infotainment[7]. Applications for VANETs include safety, traffic management, commercial ad dissemination, driver assistance, web surfing, voice, gaming and infotainment applications. A vehicle may contain multiple application units which are built-in or portable communication devices running a variety of these applications. These applications have different delay, reliability, security, and bandwidth requirements. Due to the mere size that a VANET might grow into, with the millions of vehicles in each country, and due to the diversity of non-safety vehicular applications desired by various users, researchers have identified the necessity for a new mobility mechanism, defined as network mobility, to match these needs. Some major application of VANET are reduction of traffic congestion, reduction of the emission of exhaust gas due to traffic, prevention of road accidents and improvement of the social role of the automobile. The vehicleto-vehicle communications, namely those for the exchange of information between vehicles only, however, played a dominant role much of the research produce then are still valid today. sequence number); flag of validity of the route (whether the route is valid or invalid or repair); distance in number of hops (hop count), list of precursors for that route, time of validity (lifetime). If the node want to transfer a packet, first know who is connected to the network and also needs to know the topology of the network so that with the Bellman-Ford algorithm, the shortest path can be calculated and then proceed with the routing. The routing based on distance vector is simple from the computational point of view and does not require large quantities of memory. However, the protocol requires a longer time than other protocols to establish a connection between two nodes of a network. III. APPLICATION OF GRAPH IN VANET Practical applications of graph theory are route planning in different types of network. The research question for this work is how efficiently graph theory can be use in route planning for VANET. It makes use of this theory because trivially think of the network as a graph, formed by the vehicles as nodes and wireless links as sides. In essence, the level of the protocol stack, called the network layer, which is responsible for routing data will essentially implement the techniques based on the Bellman-Ford algorithm[8] and Dijktra algorithm[9]. Due to the high dynamic nature of the VANET, find and maintain paths for routing packets is a difficult task. There are few proposals to solve the problem that have arises in the implementation of VANET routing protocols. VANET routing can be classify as topology based, position-based, cluster-based, broadcast and geocast. These groups include whole range of different protocols with each covering specific needs. In this work we will describe how graph theory deployed on VANET. This technique essentially consists in the transmission, by all the nodes, from a table or vector, containing the connections that nodes have. Ultimately each node, check your connections, create a table with one record for each connection and exchange with their neighbours, so updating your table. This ends when all nodes have received all the tables. In addition, the table should be submitted periodically or when there is a change of network topology. In essence each node with the exchange of the tables tends to know the topology of the network for which, given the circumstance, it is possible to use the Bellman-Ford algorithm for the calculation of the minimum path. In the routing table stored by every node have the information about the IP addresses of the destination node (destination IP); sequence number of the destination node (destination IV. SCENARIO In this paper we will precede with a demonstration of a real scenario in which it is necessary to communicate through this kind of networks. The following figure presents an intersection of four roads where vehicles form a network and if one vehicle wants to data passes to another through the theoretical considerations set out above. The yellow lines in the figure show the links that exist between the various wireless nodes (vehicle), the yellow car on the left has three connections, one with the blue car and the other two with other cars cut off from the figure, for completeness will be considered in the graph that represents the network. Now going to consider only the necessary parts of this scenario we get the following picture: Fig-3: S Scenario network alone VANET Graph representation of the scenario is: Fig:-4: Graph representing the scenario JU Journal of Information Technology (JIT), Vol. 2, June 2013 19 STEP 1: Creating tables from all nodes (S = Source, D = Destination, W = Weight). S 1 Node1 D W 3 5 S 2 Node2 D W 3 3 S 3 3 3 Node3 D 1 2 4 W 5 3 4 S 4 4 Node4 D W 3 4 5 6 Node5 D 4 6 9 8 S 5 5 5 5 W 6 6 3 4 Node6 D 5 4 7 S 6 6 6 W 6 5 2 Node7 D W 6 2 S 7 S 8 Node8 D W 5 4 STEP 2: The nodes communicate with their neighboring tables built by deleting duplicate records S 1 3 3 Node1 D W 3 5 2 3 4 4 S 2 3 3 Node2 D W 3 3 1 5 4 4 S 3 3 3 Node3 D W 1 5 2 3 4 4 3 3 5 5 S 4 4 4 1 2 6 9 Node4 D W 3 4 5 6 6 5 5 3 6 3 S 5 5 5 5 4 4 6 6 Node5 D W 4 6 6 6 9 3 8 4 3 4 6 5 4 5 7 2 We consider that the propose scenario is form by the shown nodes, also here the weight of each link be arbitrarily assigned while in reality is calculate from a series of factors such as vehicle speed, weather conditions etc. Each node (vehicle) has a protocol stack consisting of layers from which we find the physical layer is formed by hardware that allows wireless connection, then the latter is located between the application layer formed by a number of utilities and between them there is the network layer that implements the protocols. We use the distance vector and in turn make use of the Bellman-Ford algorithm for the resolution of paths. The above graph show in order to define a shortest path between two nodes for exchange data, it will be necessary to implement the technique of distance vector. Finally we can find a routing table of each node with the shortest path length like the following table: From the above table it is clear that each node knows the topology of the graph and by considering the case in which one of them requires the transmission of a data to another node will then process to the calculation of the shortest path through the algorithm repeatedly invoke. S 6 6 6 4 4 5 5 5 Node6 D W 5 6 4 5 7 2 3 4 5 6 4 6 9 3 8 4 S 7 6 6 Node7 D W 6 2 5 6 4 5 S 8 5 5 5 Node8 D W 5 4 4 6 6 6 9 3 S 9 Node9 D W 5 3 TABLE-1 SHORTEST PATH TABLE All nodes S D W 1 3 5 2 3 3 3 4 4 4 5 6 4 6 5 5 6 6 5 8 4 5 9 3 6 7 2 Assume, the node 1 wants to transmit a packet to node 7, and then it will display the table2 of minimum weights: TABLE 2 MINIMUM WEIGHTS TABLE Iter N N2 N3 N4 N5 N6 N7 N8 N9 h= 0 h= 1 h= 2 h= 3 h= 4 h= 5 0 ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ 0 ∞ 5 (1) ∞ ∞ ∞ ∞ ∞ ∞ 0 8 (3) 5 (1) 9 (3) ∞ ∞ ∞ ∞ ∞ 0 8 (3) 5 (1) 9 (3) 15 (4) 14 (4) ∞ ∞ ∞ 0 8 (3) 5 (1) 9 (3) 15 (4) 14 (4) ∞ 19 (5) 18 (5) 0 8 (3) 5 (1) 9 (3) 15 (4) 14 (4) 16 (6) 19 (5) 18 (5) JU Journal of Information Technology (JIT), Vol. 2, June 2013 TABLE 3: HAMMING (7, 4) CODE d1 d2 d3 d4 0 0 0 0 0 0 0 0 0 0 20 apparatuses available in this type of application does not have large computational capacity in terms of processor and memory, so it is a time consuming tasks of encoding and decoding of a code and also make the communication between devices on the network very slow. Hence the hamming code is an option for the choice of error detection and correction[10]. Hamming code is linear, perfect, and capable of detecting and correcting an error, for which it is possible to implement directly into hardware encoding and decoding. There are two methods to encode and decode by hamming, first method with logical operations and second one is with matrices G and H. For the Hamming code (7, 4), taking advantage of the scheme in Table 2 is obtained the following code words p1 p2 d1 p3 d2 → 0 0 0 0 0 1 → 1 1 0 1 0 1 0 → 0 1 0 1 0 0 1 1 → 1 0 0 0 0 0 1 0 0 → 1 0 0 1 1 0 1 0 1 → 0 1 0 0 1 0 1 1 0 → 1 1 0 0 1 0 1 1 1 → 0 0 0 1 1 1 0 0 0 → 1 1 1 0 0 1 0 0 1 → 0 0 1 1 0 p3 = d 2 + d3 + d 4 1 0 1 0 → 1 0 1 1 0 1 0 1 1 → 0 1 1 0 0 The coverage of the parity bit can be defined by the following diagram: 1 1 0 0 → 0 1 1 1 1 1 1 0 1 → 1 0 1 0 1 1 1 1 0 → 0 0 1 0 1 1 1 1 1 → 1 1 1 1 1 node from which it takes the weight calculation. From the table and the graph we see that the node 1 wants to send a data to node 7, it will know that the entire path weight is equal to 16 and the packet traverse through the node p= 1, 3,4,6,7. From Table 1 shows that for Hamming (7, 4) is obtain as follows. p1 = d1 + d 2 + d3 p2 = d1 + d3 + d 4 Fig-5:- Coverage of parity bits Asserting that the parity bit 1 (p1), the data bits d1, d2 and d4 means that it is able to correct an error of one of these bits. The word p1, p2, p3, d1, d2, d3, d4 that must be coded to generate other three bits k1, k2 and k3 defined as follows: k1 = p1 + d1 + d 2 + d 4 k2 = p2 + d1 + d3 + d 4 k3 = p3 + d 2 + d3 + d 4 Fig-5: Graph of shortest paths for the scenario analyzed I. APPLICATION OF HAMMING CODE IN VANET For the error correction and security application the channel coding plays a vital role because the transmission channel may be easily affected by noise. So it is necessary to consider another aspect which concerns the application context, the The location of the error in accordance with the following table: This type of coding is extremely fast and simple to implement due to the fact that requires the use of only XOR gates. Possible circuit diagram is as follows: JU Journal of Information Technology (JIT), Vol. 2, June 2013 21 The code words are all linear combinations of rows of the matrix G. The three equations of equality contained in the block X of the matrix G are This write as c • H = 0 where H is a matrix 7×3 are called parity matrix: ⎡0 ⎢1 ⎢ ⎢1 ⎢ H = ⎢1 ⎢1 ⎢ ⎢0 ⎢0 ⎣ 1 1⎤ 0 1⎥⎥ 1 0⎥ ⎥ ⎡X ⎤ 1 1⎥ = ⎢ ⎥ ⎣I 3 ⎦ 0 0⎥ ⎥ 1 0⎥ 0 1⎥⎦ TABLE 5: CORRECTION TABLE USING MATRIX G AND H Fig-6:- Circuit diagram to detects of parity bits I1 I2 I3 I4 0 0 0 0 p1 = i2 + i3 + i4 p2 = i1 + i3 + i4 p3 = i2 + i3 + i4 0 0 0 0 0 0 which are arranged in to form the 16 words of the code: In total 2k =16 and 2n = 128 configurations are use for 7 bits, and the code words differ in at least three positions. Then d = 3 and the code can detect all single and double errors and is TABLE -4: OUTPUT OF THE ENCODER Second method with matrices G and H The three-digit parity are different combinations of the four digits of information in the following scheme: K1 K2 K3 Meaning 0 0 0 No Error Output Encoder 0000000 0 0 1 Error in receiving bit 1(bit p1) 1000000 0 1 0 Error in receiving bit 2(bit p2) 0100000 0 1 1 Error in receiving bit3(bit p3) 0010000 1 0 0 Error in receiving bit4(bit p4) 0001000 1 0 1 Error in receiving bit5(bit p5) 0000100 1 1 0 Error in receiving bit6(bit p6) 0000010 1 1 1 Error in receiving bit7(bit p7) 0000001 I1 I2 I3 I4 P1 P2 P3 → 0 0 0 0 0 0 0 1 → 0 0 0 1 1 1 1 1 0 → 0 0 1 0 1 1 0 0 1 1 → 0 0 1 1 0 0 1 0 1 0 0 → 0 1 0 0 1 0 1 0 1 0 1 → 0 1 0 1 0 1 0 0 1 1 0 → 0 1 1 0 0 1 1 0 1 1 1 → 0 1 1 1 1 0 0 1 0 0 0 → 1 0 0 0 0 1 1 1 0 0 1 → 1 0 0 1 1 0 0 1 0 1 0 → 1 0 1 0 1 0 1 1 0 1 1 → 1 0 1 1 0 1 0 1 1 0 0 → 1 1 0 0 1 1 0 1 1 0 1 → 1 1 0 1 0 0 1 1 1 1 0 → 1 1 1 0 0 0 0 1 1 1 1 → 1 1 1 1 1 1 1 able to correct all. For the correction simply search the word that differs in only one bit from the one received. It coding in the form c = i • G where c is the vector of 7 elements transfer (code word), i is the vector of 4 elements of the digits of information, G is the matrix generating size 4x7: ⎡1 ⎢0 G=⎢ ⎢0 ⎢ ⎣0 0 1 0 0 0 0 1 0 0 0 0 1 0 1 1 1 1 0 1 1 1⎤ 1⎥⎥ = [I 4 × X ] 0⎥ ⎥ 1⎦ we can calculate the Syndrome y = c + e where e is the error vector, s = y.H = c.H + e.H = e.H The Syndrome[11] is a vector of n - k = 3 components, which says if the three rules are equal or less satisfied. The syndrome may occur in 23 = 8 ways, while the possible configurations of error (including the lack of errors) are 27 = 128. Easily occurs that the same syndrome corresponds to 128/8 = 16 different configurations of error. If the calculation of the Syndrome s JU Journal of Information Technology (JIT), Vol. 2, June 2013 produces a null vector means that the received word is correct, otherwise adding the coset leader, corresponding to the obtained syndrome, the word received will be possible to correct the error. In this, the Standard Decoding Array (SDA) will be composed as coset leaders syndrome[12] as follows: u u • H For example, if the received word is w = 1110000 then w • H = 000 which is the syndrome 0000000. From that v = W + u = 1,110,000 + 0,000,000 = 1,110,000. If the received word is w = 1110001 then w • H = 001 which is the syndrome of 0,000,001. From that v = w + u =1110001 + 0000001 = 1110000. The word received was correct. II. CONCLUSION The application of graph theory in routing of different network is very common. In this research work we try to adopt some graph theory for VANET. We consider VANET as a dynamic graph where vehicle is a node of graph and link among the vehicle think as an edge. The aim is to transmitting and receiving the data among the vehicle by constructing a network. Transmission and reception is occurring at network layer and the techniques used for this based on Bellman-Ford algorithm and Dijktra algorithm. Recent research confirms that further technical and innovative protocols that enable data transmission vehicle to vehicles with fewer problems, eg. data loss, poor safety, etc. Regarding the channel coding, in real application contexts using other types of codes such as convolution codes or turbo codes can correct more than one error and with high performance in terms of time required for the encoding or decoding. 22 REFERENCES [1] D. R. Girinath and S. Selvan, "Vehicular adhoc network routing protocols in realistic situations," in International Conference on Control, Automation, Communication and Energy Conservation, INCACEC 2009, pp. 1-6. [2] H. Menouar, et al., "Movement Prediction-Based Routing (MOPR) Concept for Position-Based Routing in Vehicular Networks," in IEEE 66th Vehicular Technology Conference, VTC-2007, pp. 2101-2105. [3] T. Hua-Wen, et al., "An on-demand routing protocol with backtracking for mobile ad hoc networks," in IEEE Wireless Communications and Networking Conference, WCNC 2004, pp. 1557-1562 Vol.3. [4] J. e. o. H¨arri, et al., "Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy," EURECOM Sophia-Antipolis, 2006. [5] C. Jingwen, et al., "A novel trusted routing scheme using attribute similarity for VANET," in 3rd International Conference on Advanced Computer Control (ICACC), 2011, pp. 427-430. [6] L. Fan and W. Yu, "Routing in vehicular ad hoc networks: A survey," IEEE Vehicular Technology Magazine, vol. 2, pp. 12-22, 2007. [7] Y. Toor, et al., "Vehicle Ad Hoc networks: applications and related technical issues," IEEE Communications Surveys & Tutorials, vol. 10, pp. 74-88, 2008. [8] M. Ekpanyapong, et al., "Statistical Bellman-Ford algorithm with an application to retiming," presented at the Proceedings of the 2006 Asia and South Pacific Design Automation Conference, Yokohama, Japan, 2006. [9] D. B. Johnson, "A Note on Dijkstra's Shortest Path Algorithm," J. ACM, vol. 20, pp. 385-388, 1973. [10] R. ma and S. Cheng, "Hamming coding for Multiple Sources," in IEEE International Symposium on Information Theory Proceedings (ISIT), 2010, pp. 171-175. [11] W. Fanglei and W. Jijie, "Syndrome testable design software package, instrument and Syndrome testing system for sequential circuits," in Test Symposium, 1992. (ATS '92), Proceedings., First Asian (Cat. No.TH0458-0), 1992, pp. 218-222. [12] T. Crimmins and H. Horwitz, "Mean-square-error optimum coset leaders for group codes," IEEE Transactions on Information Theory, vol. 16, pp. 429-432, 1970. TABLE 6 SDA FOR THE HAMMING CODE(7,4) Coset leaders u Mostofa Kamal Nasir has been serving as an Assistant Professor and chairman of the Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University (www.mbstu.ac.bd), Santosh, Tangail-1902, Field of Interest is Vehicular Adhoc Network , Cloud Computing, and Mobile Wireless Network E-mail: [email protected] Sindrome u H 0000000 000 1000000 011 0100000 101 0010000 110 0001000 111 0000100 100 0000010 010 0000001 001 Shamim Al Mamun has been serving as an Assistant Professor in the Institute of Information Technology (IIT), Jahangirnagar University (www.juniv.edu), Savar, Dhaka. His research interest includes optical wireless communications. He is the member of IEEE Computer Society. .
© Copyright 2026 Paperzz