Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue: Computing Terminologies and Research Development Conference Held at SCAD College of Engineering and Technology, India Effective Collision Detection Using E-VeMAC in VANET D.Dharunya Santhosh, A.Krishnaveni PG Scholar, Assistant Professor SCAD College Of Engineering & Technology, Tirunelveli, Tamil Nadu, India Abstract-The mobile adhoc network (MANET) is an autonomous transitory association of mobile nodes that communicate with each other over wireless links.The vanet is a special type of mobile adhoc networks, which forms a network among the moving vehicles dynamically without any infrastructure. The information exchange among vehicles provides a great opportunity for the development of new driver assistance systems. This technique helps in gathering information about the other vehicle, the road traffic and environmental conditions. Moving vehicles are considered as the nodes in vanet. Due to this node mobility, transmission collision is often caused. In the proposed system, VeMAC protocol and an enhancement of VeMAC called Energy-VeMAC is introduced to prevent the collision and to improve the rate of throughput in message transfer between the vehicles. Analysis result is produced for VeMAC and EVeMAC based on the collision rate. I.INTRODUCTION Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers that relay packets generated by other nodes to their destination. These nodes are often energy constrained—that is, battery-powered—devices with a great diversity in their capabilities. In this energy-constrained, dynamic, distributed multi-hop environment, nodes need to organise themselves dynamically in order to provide the necessary network functionality in the absence of fixed infrastructure or central administration.Despite the many design constraints, mobile ad hoc networks offer numerous advantages. First of all, this type of network is highly suited for use in situations whereas fixed infrastructure is not available, not trusted, too expensive or unreliable. Because of their self-creating, self-organising and self-administering capabilities, ad hoc networks can be rapidly deployed with minimum user intervention. There is no need for detailed planning of base station installation or wiring. Furthermore, capacity, range and energy arguments promote their use in tandem with existing cellular infrastructures as they can extend coverage and interconnectivity. An important part of the future 4G architecture, which aims to provide pervasive computer environments that support users in accomplishing their tasks, accessing information and communicating anytime, anywhere and from any device. The concept of mobile ad hoc networking is not a new one and its origins can be traced back to the DARPA Packet Radio Network project in 1972. Then, the advantages such as flexibility, mobility, resilience and independence of fixed infrastructure, elicited immediate interest among military, police and rescue agencies in the use of such networks under disorganized or hostile environments. For a long time, ad hoc network research stayed in the realm of the military, and only in the middle of 1990, with the advent of commercial radio technologies, did the wireless research community become aware of the great potential and advantages of mobile ad hoc networks outside the military domain, witnessed by the creation of the Mobile Ad Hoc Networking working group within the IETF. Currently, mobile ad hoc network research is a very vibrant and active field and the efforts of the research community, together with current and future MANET enabling radio technologies. II.EXISTING SYSTEM According to [2] the node arrangements in the service channel reduces hidden terminal problem. The vemac protocol avoids the transmission collisions by providing implicit acknowledgements to the nodes. It also make use of the seven DSRC channels, support the frame broadcast service on the control channel and service channel. The major drawback is that the value of split up parameter is not obtained for the merging and access collision. In [11], the model reveals that the principal reason for the low PDR of the DCF protocol is packet collision due to the transmission from hidden terminal. This paper shows analysis of v2v communication using different MAC protocol. In [5] the adaptive space division multiplexing (ASDM) protection is provided against DOS attacks and significantly improves the network security, bandwidth utilization,automatically adjust the timeslot allocation in respose to changes in vehicle densities. Inorder to ensure an acceptable collision rate, significantly more bandwidth must be allocated than in an equivalent network using an explicit time slot allocation approach is the major factor to be focused. © 2014, ICCTRD All Rights Reserved Page | 128 Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3), March- 2014, pp. 128-131 III. PROPOSED SYSTEM In vanet there is node mobility on the control channel, which causes the transmission collision. To avoid such problems, the VeMAC protocol is created, which also supports the multihop broadcasting. By using VeMAC higher throughput in message transfer is obtained. VeMAC reduces collision by assigning service slots for each nodes. The source and destination vehicles are chosen and the most suitable service channel to reach the destination is generated by considering the reliability, interference and coverage area. Among the service channel obtained, the optimal service channel is selected by E-VeMAC based on the transmission power consumed, hop distance and energy. Energy balancing is one of the important challenges for wireless sensor networks (WSNs) since the tiny sensor nodes cannot be easily recharged once they are deployed. Up to now, many energy efficient routing algorithms or protocols have been proposed with techniques like clustering, data aggregation and location tracking etc. However, many of them aim to minimize parameters like total energy consumption, latency etc., that creates hotspot nodes and partitioned network due to the overuse of certain nodes. Distance-based Energy Aware Routing (DEAR) algorithm is proposed to ensure energy efficiency and energy balancing based on theoretical analysis of different energy and traffic models. During the routing process, individual distance as the primary parameter in order to adjust and equalize the energy consumption among involved sensors.Simulation results show that the DEAR algorithm can reduce and balance the energy consumption for all sensor nodes so network lifetime is greatly prolonged compared to other routing algorithms. The module split up is created as Node setup & Coverage area, Broadcast area & Base station, Source & destination nodes, Service channel & Slot Acquisition, VeMAC & E-VeMAC, Analysis. The number of nodes taken is the node setup. Each node is a vehicle for vanet scenario. The nodes are dynamically generated. The coverage area specifies the transmission range of each vehicle. In the vanet , each vehicle posses their own coverage area, which may interfere during the motion of vehicles. In telecommunications, the coverage of a radio station is the geographic area where the station, communicate. Broadcasters,and telecommunications companies frequently produce coverage maps to indicate to users the station's intended service area. Coverage depends on many factors, including orography (i.e. mountains) and buildings, technology and radio frequency. Some frequencies provide more improved regional coverage, while other frequencies penetrate better through obstacles.The broadcast area module identifies the neighbour node (vehicle) for broadcasting. It is calculated based on the hop distance calculation. The hop distance can be either single hop or multihop. The node which is the head in the cluster formed is the base station. It plays a vital role for broadcasting messages wit in a particular coverage area. The base station of a cluster communicates with the other cluster base station. A broadcast range (also listening area for radio, or viewing range or viewing area for television) is the service area that is generally the area in which a station's signal strength is suitable for most receivers for decoding it. However this also depends on interference from other stations. A mobile phone connects to a base station depending on the strength of the signal. That may be efficient and faster by higher power transmissions, better antennae and taller antenna masts. Signals will also need to be passed through buildings, which is a particular problem designing networks for large metropolitan areas with modern skyscraper buildings. Signals also do not travel deep underground, so specialized transmission solutions are used to deliver mobile phone coverage into areas such as underground parking garages and subway trains all the possible neighbor node of a particular node for communication. Inorder to reach the destination, the slot acquisition module generates the path by calculating the neighbor node, their neighbor node and so on, till the destination node is reach the suitable service channels for transmission is calculated. If the message transfer is between the clusters, then the transmission is splitted as, from the source to the base station of the cluster which the source node belongs and from the source base station to the destination base station. This communication is MSC, That is globally assumed and finally from the destination base station to the destination node. Based on the suitable service channel isolated by the VeMAC algorithm, the E-VeMAC chooses the most optimal service channel. IV. Related Works Source node Broadcast area Base station Service Channel Destnation node Slot Acquisition Node setup & coverage area VeMAC Energy VeMAC Figure: Architecture Diagram © 2014, ICCTRD All Rights Reserved Page | 129 Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3), March- 2014, pp. 128-131 V. DEAR ALGORITHM 1.Begin 2. Source node i has data to send to Base Station(BS) 3. if 𝑑𝑖,𝐵𝑆 <𝑑𝑖 (n=2) then 4. direct transmission 5. else 6. Choose next hop candidate set A with d(i,j) 𝜖 (dj,di+Δ) 7. Choose next hop candidate sub-set B∈A with dj,BS < di,BS 8. Choose next hop candidate sub-set C∈B with dc,BS < dB-C,BS9. Choose final next hop candidate j *∈ 𝐶 with maximal residual energy 10. end if 11. Node i sends RREQ to node j* to request route setup. 12. Node j* sends ACK to node i to confirm reception of RREQ 13. Node j* determines its next hop in an iterative way above and send RREQ 14. RREQ message reaches BS 15. BS sends RREP to node I and traffic begin 16.end Vehicular Ad Hoc networks(VANETs) have grown out of the need to support the growing number of wireless products that can now be used in vehicles. These products include remote keyless entry devices, personal digital assistant(PDA’s),laptops and mobile telephones. Vanets can be utilized for a broad range of safety and non-safety applications, allow for value added services such as vehicle safety, automated toll payment, traffic management etc…A vanet uses car’s as mobile nodes in a MANET to create a mobile network. A vanet turns every participating car into a wireless router or node allowing cars approx. 100 to 300m of each other to connect and, in turn create network with a wide range. VI. ENERGY-VEMAC ALGORITHM 1. To allocate service channel 2. Reliability of the service 3. Source and destination intended address 4. Addressing base station 5. Service channel allocation 6. Slot acquisition 7. Transmission 8. Collision detection 9. High priority slot allocation As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicle to one another so that a mobile internet is created. It is estimated that the first systems that will generate this technology are police and free vehicles to communicate with each other for safety purposes. VII . ANALYSIS MATLAB can be deployed for a wide range of applications, including signal and image processing, communications, control design, test and measurement, financial modeling and analysis, and computational biology. Add-on toolboxes extend the MATLAB environment to solve particular classes of problems in these application areas. The MATLAB code can be integrated with other languages and applications, and the developed MATLAB algorithms and applications can be distributed. The analysis report reduces the drawback of the existing system. Some simulation results have proven that the signaling broadcast channel set up delay. Inorder to ensure an acceptable collision rate, significantly more bandwidth must be allocated than in an equivalent network using an explicit time slot allocation approach. © 2014, ICCTRD All Rights Reserved Page | 130 Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3), March- 2014, pp. 128-131 Frequency hopping is often used to increase overall BTS performance; this involves the rapid switching of voice traffic between TRXs in a sector. A hopping sequence is followed by the TRXs and handsets using the sector. Several hopping sequences are available, and the sequence in use for a particular cell is continually broadcast by that cell so that it is known to the handsets. VIII. CONCLUSION This paper proposes an enhanced VeMAC protocol called E-VeMAC to reduce the collision rate in VANET, and to improve the throughput of message transfer. By using E-VeMAC ,the most suitable control channel for communication between the source to destination is identified. REFERECES [1] H.A. Omar, W. Zhuang, and L. Li, “VeMAC: A TDMA-Based MAC Protocol, for Reliable Broadcast in VANETs”, ieee transactions on mobile computing, vol. 12, no. 9, september 2013. [2] H.A. Omar, W. Zhuang, and L. Li, “VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks,” Proc. IEEE INFOCOM, pp. 413-418, Apr. 2011. [3] “Vehicle Safety Communications Project Task 3 Final Report,” Technical Report DOT HS 809 859, The CAMP Vehicle Safety Communications Consortium, Mar. 2005. [4] R. Baldessari et al., “Car-2-Car Communication Consortium Manifesto,” Technical Report Version 1.1, Aug. 2007. [5] J.J. Blum and A. Eskandarian, “A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications,” IEEE Trans. Intelligent Transportation Systems, vol. 8, no. 1, pp. 4-13, Mar. 2007. [6] R. Mangharam, R. Rajkumar, M. Hamilton, P. Mudalige, and F. Bai, “Bounded-Latency Alerts in Vehicular Networks,” Proc. Mobile Networking for Vehicular Environments, pp. 55-60, May 2007. [7] F. Watanabe, M. Fujii, M. Itami, and K. Itoh, “An Analysis of Incident Information Transmission Performance Using MCS/ CDMA Scheme,” Proc. IEEE Intelligent Vehicles Symp. (IV ’05), pp. 249-254, June 2005. [8] H. Nakata, T. Inoue, M. Itami, and K. Itoh, “A Study of Inter Vehicle Communication Scheme Allocating PN Codes to the Location on the Road,” Proc. IEEE Intelligent Transportation Systems Conf. (ITSC ’03), vol. 2, pp. 1527-1532, Oct. 2003. [9] IEEE Std 802.11p-2010, Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, IEEE, pp. 1-51, July 2010. [10] IEEE Std 802.11-2007 (Revision of IEEE Std. 802.11-1999), Standard for Information TechnologyTelecommunications and Information Exchange between Systems-Local and Metropolitan Area NetworksSpecific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, pp. 1-1184, June 2007. [11] M. Hassan, H. Vu, and T. Sakurai, “Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC Safety Applications,” IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3882-3896, Oct. 2011. [12] S. Eichler, “Performance Evaluation of the IEEE 802.11p WAVE Communication Standard,” Proc. IEEE 66th Vehicular Technology. Conf. (VTC ’07-Fall), pp. 2199-2203, Oct. 2007. [13] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, “ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services,” Wireless Networks, vol. 10, pp. 359-366, July 2004. [14] F. Borgonovo, L. Campelli, M. Cesana, and L. Fratta, “Impact of User Mobility on the Broadcast Service Efficiency of the ADHOC MAC Protocol,” Proc. IEEE 61st Vehicular Technology Conf. (VTC ’05-Spring), vol. 4, pp. 2310-2314, June 2005. [15] W. Franz, H. Hartenstein, and M. Mauve, Inter-Vehicle Communications Based on Ad Hoc Networking Principles: the FleetNet Project. Universita¨tsverlag Karlsruhe, 2005. © 2014, ICCTRD All Rights Reserved Page | 131
© Copyright 2026 Paperzz