Effective Collision Detection Using E-VeMAC in VANET

Volume 4, Issue 3, March 2014
ISSN: 2277 128X
International Journal of Advanced Research in
Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com
Special Issue: Computing Terminologies and Research Development
Conference Held at SCAD College of Engineering and Technology, India
Effective Collision Detection Using E-VeMAC in VANET
D.Dharunya Santhosh, A.Krishnaveni
PG Scholar, Assistant Professor
SCAD College Of Engineering & Technology, Tirunelveli, Tamil Nadu, India
Abstract-The mobile adhoc network (MANET) is an autonomous transitory association of mobile nodes that communicate with each other over wireless links.The vanet is a special type of mobile adhoc networks, which forms a network among the moving vehicles dynamically without any infrastructure. The information exchange among vehicles
provides a great opportunity for the development of new driver assistance systems. This technique helps in gathering
information about the other vehicle, the road traffic and environmental conditions. Moving vehicles are considered as
the nodes in vanet. Due to this node mobility, transmission collision is often caused. In the proposed system, VeMAC
protocol and an enhancement of VeMAC called Energy-VeMAC is introduced to prevent the collision and to improve
the rate of throughput in message transfer between the vehicles. Analysis result is produced for VeMAC and EVeMAC based on the collision rate.
I.INTRODUCTION
Opposed to infrastructured wireless networks, where each user directly communicates with an access point or
base station, a mobile ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network
is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes
that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each
other. In order to enable communication between nodes that are not directly within each other’s send range, intermediate
nodes act as routers that relay packets generated by other nodes to their destination. These nodes are often energy constrained—that is, battery-powered—devices with a great diversity in their capabilities. In this energy-constrained, dynamic, distributed multi-hop environment, nodes need to organise themselves dynamically in order to provide the necessary network functionality in the absence of fixed infrastructure or central administration.Despite the many design constraints, mobile ad hoc networks offer numerous advantages.
First of all, this type of network is highly suited for use in situations whereas fixed infrastructure is not available, not trusted, too expensive or unreliable. Because of their self-creating, self-organising and self-administering capabilities, ad hoc networks can be rapidly deployed with minimum user intervention. There is no need for detailed planning
of base station installation or wiring. Furthermore, capacity, range and energy arguments promote their use in tandem
with existing cellular infrastructures as they can extend coverage and interconnectivity. An important part of the future
4G architecture, which aims to provide pervasive computer environments that support users in accomplishing their tasks,
accessing information and communicating anytime, anywhere and from any device.
The concept of mobile ad hoc networking is not a new one and its origins can be traced back to the DARPA
Packet Radio Network project in 1972. Then, the advantages such as flexibility, mobility, resilience and independence of
fixed infrastructure, elicited immediate interest among military, police and rescue agencies in the use of such networks
under disorganized or hostile environments. For a long time, ad hoc network research stayed in the realm of the military,
and only in the middle of 1990, with the advent of commercial radio technologies, did the wireless research community
become aware of the great potential and advantages of mobile ad hoc networks outside the military domain, witnessed by
the creation of the Mobile Ad Hoc Networking working group within the IETF. Currently, mobile ad hoc network research is a very vibrant and active field and the efforts of the research community, together with current and future MANET enabling radio technologies.
II.EXISTING SYSTEM
According to [2] the node arrangements in the service channel reduces hidden terminal problem. The vemac
protocol avoids the transmission collisions by providing implicit acknowledgements to the nodes. It also make use of the
seven DSRC channels, support the frame broadcast service on the control channel and service channel. The major drawback is that the value of split up parameter is not obtained for the merging and access collision. In [11], the model reveals
that the principal reason for the low PDR of the DCF protocol is packet collision due to the transmission from hidden
terminal. This paper shows analysis of v2v communication using different MAC protocol. In [5] the adaptive space division multiplexing (ASDM) protection is provided against DOS attacks and significantly improves the network security,
bandwidth utilization,automatically adjust the timeslot allocation in respose to changes in vehicle densities. Inorder to
ensure an acceptable collision rate, significantly more bandwidth must be allocated than in an equivalent network using
an explicit time slot allocation approach is the major factor to be focused.
© 2014, ICCTRD All Rights Reserved
Page | 128
Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3),
March- 2014, pp. 128-131
III. PROPOSED SYSTEM
In vanet there is node mobility on the control channel, which causes the transmission collision. To avoid such
problems, the VeMAC protocol is created, which also supports the multihop broadcasting. By using VeMAC higher
throughput in message transfer is obtained. VeMAC reduces collision by assigning service slots for each nodes. The
source and destination vehicles are chosen and the most suitable service channel to reach the destination is generated by
considering the reliability, interference and coverage area. Among the service channel obtained, the optimal service
channel is selected by E-VeMAC based on the transmission power consumed, hop distance and energy. Energy balancing
is one of the important challenges for wireless sensor networks (WSNs) since the tiny sensor nodes cannot be easily recharged once they are deployed. Up to now, many energy efficient routing algorithms or protocols have been proposed
with techniques like clustering, data aggregation and location tracking etc. However, many of them aim to minimize parameters like total energy consumption, latency etc., that creates hotspot nodes and partitioned network due to the overuse of certain nodes. Distance-based Energy Aware Routing (DEAR) algorithm is proposed to ensure energy efficiency
and energy balancing based on theoretical analysis of different energy and traffic models.
During the routing process, individual distance as the primary parameter in order to adjust and equalize the energy
consumption among involved sensors.Simulation results show that the DEAR algorithm can reduce and balance the
energy consumption for all sensor nodes so network lifetime is greatly prolonged compared to other routing algorithms.
The module split up is created as Node setup & Coverage area, Broadcast area & Base station, Source & destination nodes, Service channel & Slot Acquisition, VeMAC & E-VeMAC, Analysis. The number of nodes taken is the node
setup. Each node is a vehicle for vanet scenario. The nodes are dynamically generated. The coverage area specifies the
transmission range of each vehicle. In the vanet , each vehicle posses their own coverage area, which may interfere during the motion of vehicles. In telecommunications, the coverage of a radio station is the geographic area where the station, communicate. Broadcasters,and telecommunications companies frequently produce coverage maps to indicate to
users the station's intended service area. Coverage depends on many factors, including orography (i.e. mountains) and
buildings, technology and radio frequency.
Some frequencies provide more improved regional coverage, while other frequencies penetrate better through obstacles.The broadcast area module identifies the neighbour node (vehicle) for broadcasting. It is calculated based on the
hop distance calculation. The hop distance can be either single hop or multihop. The node which is the head in the cluster
formed is the base station. It plays a vital role for broadcasting messages wit in a particular coverage area. The base station of a cluster communicates with the other cluster base station. A broadcast range (also listening area for radio,
or viewing range or viewing area for television) is the service area that is generally the area in which a station's signal
strength is suitable for most receivers for decoding it. However this also depends on interference from other stations.
A mobile phone connects to a base station depending on the strength of the signal. That may be efficient and
faster by higher power transmissions, better antennae and taller antenna masts. Signals will also need to be passed
through buildings, which is a particular problem designing networks for large metropolitan areas with modern skyscraper
buildings. Signals also do not travel deep underground, so specialized transmission solutions are used to deliver mobile
phone coverage into areas such as underground parking garages and subway trains all the possible neighbor node of a
particular node for communication.
Inorder to reach the destination, the slot acquisition module generates the path by calculating the neighbor node,
their neighbor node and so on, till the destination node is reach the suitable service channels for transmission is calculated. If the message transfer is between the clusters, then the transmission is splitted as, from the source to the base station of the cluster which the source node belongs and from the source base station to the destination base station. This
communication is MSC, That is globally assumed and finally from the destination base station to the destination node.
Based on the suitable service channel isolated by the VeMAC algorithm, the E-VeMAC chooses the most optimal service
channel.
IV. Related Works
Source node
Broadcast
area
Base station
Service Channel
Destnation
node
Slot Acquisition
Node setup & coverage area
VeMAC
Energy VeMAC
Figure: Architecture Diagram
© 2014, ICCTRD All Rights Reserved
Page | 129
Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3),
March- 2014, pp. 128-131
V. DEAR ALGORITHM
1.Begin
2. Source node i has data to send to Base Station(BS)
3. if 𝑑𝑖,𝐵𝑆 <𝑑𝑖 (n=2) then
4. direct transmission
5. else
6. Choose next hop candidate set A with d(i,j) 𝜖 (dj,di+Δ)
7. Choose next hop candidate sub-set B∈A with dj,BS < di,BS
8. Choose next hop candidate sub-set C∈B with dc,BS < dB-C,BS9. Choose final next hop candidate j *∈ 𝐶 with maximal
residual energy
10. end if
11. Node i sends RREQ to node j* to request route setup.
12. Node j* sends ACK to node i to confirm reception of RREQ
13. Node j* determines its next hop in an iterative way above and send RREQ
14. RREQ message reaches BS
15. BS sends RREP to node I and traffic begin
16.end
Vehicular Ad Hoc networks(VANETs) have grown out of the need to support the growing number of wireless
products that can now be used in vehicles. These products include remote keyless entry devices, personal digital assistant(PDA’s),laptops and mobile telephones.
Vanets can be utilized for a broad range of safety and non-safety applications, allow for value added services
such as vehicle safety, automated toll payment, traffic management etc…A vanet uses car’s as mobile nodes in a MANET to create a mobile network. A vanet turns every participating car into a wireless router or node allowing cars approx. 100 to 300m of each other to connect and, in turn create network with a wide range.
VI. ENERGY-VEMAC ALGORITHM
1. To allocate service channel
2. Reliability of the service
3. Source and destination intended address
4. Addressing base station
5. Service channel allocation
6. Slot acquisition
7. Transmission
8. Collision detection
9. High priority slot allocation
As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicle to one
another so that a mobile internet is created. It is estimated that the first systems that will generate this technology are police and free vehicles to communicate with each other for safety purposes.
VII . ANALYSIS
MATLAB can be deployed for a wide range of applications, including signal and image processing, communications, control design, test and measurement, financial modeling and analysis, and computational biology. Add-on toolboxes extend the MATLAB environment to solve particular classes of problems in these application areas. The MATLAB code can be integrated with other languages and applications, and the developed MATLAB algorithms and applications can be distributed. The analysis report reduces the drawback of the existing system.
Some simulation results have proven that the signaling broadcast channel set up delay.
Inorder to ensure an acceptable collision rate, significantly more bandwidth must be allocated than in an equivalent network using an explicit time slot allocation approach.
© 2014, ICCTRD All Rights Reserved
Page | 130
Santhosh et al., International Journal of Advanced Research in Computer Science and Software Engineering 4 (3),
March- 2014, pp. 128-131
Frequency hopping is often used to increase overall BTS performance; this involves the rapid switching of voice
traffic between TRXs in a sector. A hopping sequence is followed by the TRXs and handsets using the sector. Several
hopping sequences are available, and the sequence in use for a particular cell is continually broadcast by that cell so that
it is known to the handsets.
VIII. CONCLUSION
This paper proposes an enhanced VeMAC protocol called E-VeMAC to reduce the collision rate in VANET,
and to improve the throughput of message transfer. By using E-VeMAC ,the most suitable control channel for communication between the source to destination is identified.
REFERECES
[1]
H.A. Omar, W. Zhuang, and L. Li, “VeMAC: A TDMA-Based MAC Protocol, for Reliable Broadcast in VANETs”, ieee transactions on mobile computing, vol. 12, no. 9, september 2013.
[2]
H.A. Omar, W. Zhuang, and L. Li, “VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks,” Proc. IEEE INFOCOM, pp. 413-418, Apr. 2011.
[3]
“Vehicle Safety Communications Project Task 3 Final Report,” Technical Report DOT HS 809 859, The CAMP
Vehicle Safety Communications Consortium, Mar. 2005.
[4]
R. Baldessari et al., “Car-2-Car Communication Consortium Manifesto,” Technical Report Version 1.1, Aug.
2007.
[5]
J.J. Blum and A. Eskandarian, “A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications,” IEEE Trans. Intelligent Transportation Systems, vol. 8, no. 1, pp. 4-13, Mar. 2007.
[6]
R. Mangharam, R. Rajkumar, M. Hamilton, P. Mudalige, and F. Bai, “Bounded-Latency Alerts in Vehicular Networks,” Proc. Mobile Networking for Vehicular Environments, pp. 55-60, May 2007.
[7]
F. Watanabe, M. Fujii, M. Itami, and K. Itoh, “An Analysis of Incident Information Transmission Performance
Using MCS/ CDMA Scheme,” Proc. IEEE Intelligent Vehicles Symp. (IV ’05), pp. 249-254, June 2005.
[8]
H. Nakata, T. Inoue, M. Itami, and K. Itoh, “A Study of Inter Vehicle Communication Scheme Allocating PN
Codes to the Location on the Road,” Proc. IEEE Intelligent Transportation Systems Conf. (ITSC ’03), vol. 2, pp.
1527-1532, Oct. 2003.
[9]
IEEE Std 802.11p-2010, Standard for Information Technology-Telecommunications and Information Exchange
between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular
Environments, IEEE, pp. 1-51, July 2010.
[10] IEEE Std 802.11-2007 (Revision of IEEE Std. 802.11-1999), Standard for Information TechnologyTelecommunications and Information Exchange between Systems-Local and Metropolitan Area NetworksSpecific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, pp. 1-1184, June 2007.
[11] M. Hassan, H. Vu, and T. Sakurai, “Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC Safety
Applications,” IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3882-3896, Oct. 2011.
[12] S. Eichler, “Performance Evaluation of the IEEE 802.11p WAVE Communication Standard,” Proc. IEEE 66th
Vehicular Technology. Conf. (VTC ’07-Fall), pp. 2199-2203, Oct. 2007.
[13] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, “ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services,” Wireless Networks, vol. 10, pp.
359-366, July 2004.
[14] F. Borgonovo, L. Campelli, M. Cesana, and L. Fratta, “Impact of User Mobility on the Broadcast Service Efficiency of the ADHOC MAC Protocol,” Proc. IEEE 61st Vehicular Technology Conf. (VTC ’05-Spring), vol. 4,
pp. 2310-2314, June 2005.
[15] W. Franz, H. Hartenstein, and M. Mauve, Inter-Vehicle Communications Based on Ad Hoc Networking Principles: the FleetNet Project. Universita¨tsverlag Karlsruhe, 2005.
© 2014, ICCTRD All Rights Reserved
Page | 131