International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 Self-pruning broadcasting for information dissemination in vehicular ad hoc networks Sabaresan V Department Of Computer Science and Engineering Assistant Professor, Kalaivani College of Technology Coimbatore-641 105, Tamil Nadu, India [email protected] Abstract- Vehicular Ad-hoc Networks (VANETs) is a sub division schemes [3], information about neighbors is not necessary to be of Mobile Ad-hoc Networks (MANETs) and VANETs have extra maintained by the each node but it is very complex to develop dynamic nature compared to MANETs due to the fast moving analytical models of these protocols. In adaptive and nature of the vehicles. During the last few years, several decentralized approach make a decision based on the broadcasting scheme, such as counter and distance based scheme rebroadcasting decision algorithm and based on this approach, has been adopted. In probabilistic based schemes, information each node can dynamically regulate the values of its limited about neighbors need not be maintained by the each node. To factor using information from nearest nodes. This paper focuses Maintaining a good latency and reach-ability while minimizing redundant messages is a difficult task. In this paper, we propose on probabilistic based broadcasting schemes and introduces an self pruning broadcasting model to deal with the information enhanced scheme, called Scalable Broadcasting Algorithm dissemination problem in VANETs. Simulations results show that (SBA) with timer suppression mechanism to reduce the amount the proposed Scalable Broadcasting Algorithm (SBA) with timer of any extra efforts. SBA [4] is an instance of self-pruning suppression mechanisms have a better performance over protocol that sets the broadcast timer of a node based on the probabilistic based schemes. number of neighbours it has. In particular, this research is Keywords: VANETs/MANETs, information dissemination, broadcasting protocols, Scalable broadcasting algorithm. I. INTRODUCTION The main aim of the inter vehicle communication is to increase the vehicle safety or driver comfort by relaying necessary information from vehicle to vehicle. Two types of applications can be distinguished, comfort applications and safety applications. The comfort application can improve passengers comfort by updating them about route optimization and increase the traffic efficiency e.g., weather information, gas station or other location, etc. Whereas safety applications increase the safety of passengers by exchanging safety data via inter vehicle communication [1]. For example, a vehicle detecting a freezing road could inform other vehicles intending to use the affected route. Thus drivers could be notified that they are proceeding toward a spot where an accident has occurred. VANET has unique characteristics like high mobility with the constraint of road topology, limitless network size, communications support that make different it from MANETs [2]. Therefore, more and more researchers have concentrated on proposing suitable broadcasting protocols to deal with the highly dynamic nature (such as high dynamic topology supports, mobility modelling and frequently connected) of VANET. Broadcasting protocols may perform in a different way than MANET due to the following reasons. Since vehicles are treated as VANETs nodes, these entities can move too quickly as compared to normal MANETs nodes. In VANETs, the network topology changes frequently since vehicles can regularly leave and join the network. Information dissemination in VANETs can be performed based on several broadcasting schemes. In Probabilistic based ISSN: 2393-9184 encouraged by Scalable Broadcasting Algorithm (SBA) with timer suppression mechanisms to prioritize broadcasting of messages such that node with most exposed neighbours rebroadcast first [5].Simulations are conducted and obtained results show that SBA with simple timer suppression mechanisms outperforms the major probabilistic based broadcasting schemes. The rest of this paper is prepared as follows. Section II presents a categorization of existing broadcasting protocols with a brief account of most important approaches. Section III presents the proposed broadcasting method. Performance analysis of SBA with timer suppression mechanism using simulation is presented in this section IV. Conclusions are presented in Section V. II. RELATED WORKS Broadcasting is one of the fundamental primitive in network communication. Its goal is to transmit a message from one node of the network called the source to all other nodes. Remote nodes get the source message via intermediate nodes along paths in the networks. A broadcasting protocol for a given network prescribes in which steps which nodes transmit. Number of broadcasting protocols for information dissemination has been recently proposed. Proba bilisti c Broad castin g Proto col Determi Distan ce Based Location Based Count er Based Ad-hoc Cluster Based Simpl Fig. 1. Broadcasting methods e floodi ng Based nistic 36 International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 These broadcasting protocols mainly classified into two types: probabilistic and deterministic protocol. The first approach is probabilistic broadcast [6]. In a probabilistic broadcast protocol, the forwarding set is selected in a probabilistic approach. At what time a node receives a broadcast message, it will forward the message with several probability. The forwarding probability is also statically or dynamically computed locally at each node based on each node‟s surroundings. A probabilistic broadcast protocol usually causes unnecessary retransmissions, which incurs relatively additional overhead and possible packet collisions. Proper use of a probabilistic broadcasting method can reduce the number of rebroadcasts, and thus reduce the chance of contention and collision among neighboring nodes. The probabilistic broadcasting protocols are further classified into counter, distance and location based. In counter based broadcasting, a message will be rebroadcast no more than if the amount of received copies at a host is smaller than a threshold after RDT [7].when a broadcast begins, some nodes will rebroadcast the same packet, and so one node will receive the same packet a number of times. Every node will count the number of time that a packet is received during a random period, and then nodes will compare the number with predetermined thresholds to decide whether rebroadcast the same packet or drop. The advantage of this scheme is that nodes don‟t need to identify the structure of the network and don‟t need to exchange neighbor‟s knowledge, which suits VANETs temporary environment. But if counter based scheme is used in VANTEs, every node should wait a period and the delay will be increased; on the other hand, the threshold relates to the density network and it is difficult to select a suitable threshold value. The counter based scheme alone cannot effectively prevent packet collisions which frequently occur in dense VANETs. Distance based scheme is a broadcast scheme that uses the distance between sender and receiver to make the decision whether to rebroadcast or not. The signal power from the packet received is a parameter that can be used to calculate the distance. GPS can also be used for that purpose. In [8], authors have described a distance based scheme for broadcasting in ad hoc networks. In this scheme, nodes use the relative distance to make the decision. The longer the distance between receiving nodes whose distances to the sender are bigger than the threshold will rebroadcast the received packets. Previous we have used the number of times that a broadcast message has been heard or the distances to transfer hosts as our rebroadcasting metrics. If we can obtain the locations of those broadcasting hosts, it is even possible to estimate the additional coverage more accurately. Such an approach may be supported by positioning devices such as receivers. We note that location information was also used to make easy route discovery in a MANET. In [9], authors have described a location based scheme for broadcasting in ad hoc networks. In this scheme, node evaluate additional coverage area based on their location, if the additional area is less than a threshold, node will not rebroadcast the packets and vice versa. The distance and location methods are feasible in VANETs because vehicles are the nodes of VANETs and by equipping GPS; it is easy to get ISSN: 2393-9184 vehicles geography information. However, the determination of threshold is difficult too. If the value is too small, the effect is not obvious; if the value is too big, the reliability can‟t guaranteed. Another sub-class of broadcasting protocols is called deterministic broadcast [10]. In a deterministic broadcast protocol, the set of relay nodes is selected deterministically to cover the overall environment. At what time a node receives a broadcast message, it will make a decision deterministically whether to send the message or not. The advantages of deterministic broadcast schemes are low broadcast overhead and little possible packet collisions. However, deterministic broadcast schemes are flat to node mobility, as the deterministic system relies strongly on attachment information, will serve no purpose as node speed increases. The deterministic broadcasting protocols are further classified into ad-hoc, cluster-based and simple flooding. In [9], authors have described an ad-hoc Broadcasting Protocol for broadcasting in ad hoc networks. In this approach, only nodes selected as gateway nodes and a broadcast message header are allowed to rebroadcast the message. The approach is described as follow, 1. Place all two hop neighbours that able to only be reached by a single hop neighbour. Choose these single hop neighbours as gateways. 2. Compute the cover set that will take delivery of the message from the present gateway position. 3. In support of the neighbours not so far in the gateway position, locate the one that would cover the majority two hop neighbours not in the cover position. Set this single hop neighbour as a gateway. 4. Do again process 2 and 3 pending all two hop neighbours are covered. 5. At what time a node receives a message and is a gateway, this node determines which of its neighbours by now received the message in the same transmission. These neighbours are measured already covered and are dropped from the neighbour used to select the next hop get-ways. Clustering is the method of grouping nodes together into clusters or groups. An agent of each cluster is called the clusterhead. A cluster encompasses all nodes within a cluster-head‟s broadcast range. Nodes that belong to a cluster, but are not the cluster-head, are called normal nodes. Frequently nodes may belong to more than one cluster. These nodes are called gateway nodes. Only cluster-head nodes and entry nodes are in charge for propagating messages. The process of forming clusters may be moreover active or passive. Ordinary node broadcasts a message, that message is received by cluster-head node and is relayed to all nodes within its broadcast range. Gateway Node is receives the message from cluster-head and rebroadcasts the message. Cluster-head node receives the message and rebroadcasts it to its neighbouring nodes [11]. A cluster method is classified into following two types. In active clustering, nodes must cooperate in order to elect cluster-heads. This is achieved through periodic exchange of control information. In passive clustering, cluster formation is dependent on background data traffic. Therefore, passive clustering will not form clusters until there is background traffic. In passive clustering, the flow of data traffic is used to 37 International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 spread cluster control information and collect neighbour information through lot of different packet reception. In [12], authors have described a simple flooding approach for broadcasting in ad hoc networks. In this approach to perform broadcast is by flooding. In this method, a vehicle sends a message to all of its neighbours and its neighbours in return send message to its neighbours. This process continues until all the vehicles get the same message. In self-pruning broadcasting protocol [4], each node maintains the knowledge of its neighbors by periodically exchanging the Hello messages. The receiving node first compares its neighbors list to that of sender‟s list, and rebroadcast the message only if the receiving set can cover additional nodes. III. PROPOSED MODEL In Scalable Broadcasting Algorithm (SBA) with timer suppression mechanism, each node sends a message to their neighbour based higher priority (i.e., which node has more uncovered neighbours is proceed first). The following figure shows time suppression mechanism; there are 14 nodes in figure 2 with V1 as the source node. From the source node the information is transferred to its corresponding neighbour node and the information is broadcasted based on high priority. In this figure 2 vehicle V2 and V3 will start their receptive delay timer to broadcast the message from vehicle V1. Node V3 has more uncovered neighbour compared to node V2 therefore node C preferred first for rebroadcast information. Now node V6 and V7 are opposite each other to rebroadcast. Since the timer of the node V2 has taking place, it will have the priority to broadcasts earlier even through node V7 has additional uncovered neighbours, thereby the broadcasting by making vehicle V2 as a redundant node. Become aware of that this problem could be solved by preventing node V2 from sending earlier than node V7. Therefore in SBA with timer suppression mechanism, we propose to restart the timer of node V2. Whenever a low priority node receives a broadcast message then the delay timer can be restarted depending up on new uncovered neighbour information. Finally from the node V7 has more neighbour than node V2, it will cover nodes V8, V9, V10, V11, V12, V13 and V14, thus saving the broadcasting by V2. V 13 V 8 V 14V V 9 V 6 V V 7 2 V 11 10 V 12 V 5 V 3 V 4 V 1 Fig. 2. VANET with 14 nodes For example any node says B, that receives a broadcast message M from sender A, will perform the following steps. 1. If set of immediate neighbour of node B is the subset of immediate neighbour of node A and set of A, then no need to perform broadcast process since all neighbour of ISSN: 2393-9184 B has been covered by A. 2. The occurring later or after duplicate message will be discarded. 3. If the message M is received for the first time, then the covered set S is to store all covered nodes or more formally set of node B and message is equal to immediate neighbour of node A and set of A, Based on updated level of node B. 4. During timer the countdown, any duplicate message will be discarded and covered nodes set will be updated. i.e. set of node B and message is equal to immediate neighbour of node A and set of A, combination set of node B and message. Delay timer will be reset according to the recent uncovered neighborhood information. 5. After the delay timer expires and set of immediate neighbour of node B subset of node B and message, node B is overly retained from rebroadcast. Otherwise the message is rebroadcast. In addition to overly retained all the features of SBA introduces a timer suppression method that waits the rebroadcasting of nodes with lesser priority to enable the nodes that rebroadcast earlier to cover as many nodes as possible (including uncovered neighbours of suppressed nodes). However not all suppressed nodes will be relieved from rebroadcasting. Assume node V6 of Fig. 2 is not within range of node V7. Node V2 will be suppressed by nodeV6 and will finally timeout to cover node V6. IV. PERFORMANCE EVALUATION In this part, the performance evaluation of the proposed scheme not in favor of counter based and distance based schemes by the network simulator, ns2 (Network Simulator NS 2.34), is presented. Parameters associated to mobility and traffic scenarios are initial described. Performance metrics at the same time with simulation results are then reported and analyzed. The performance of the proposed scheme are measured and compared with probabilistic based schemes mainly, Counter based, and Distance based, under several node speeds and densities. Several threshold values for these schemes are used as follows: for Counter based scheme, the counter threshold is fix to 3 and 5, and for Distance based scheme, the distance threshold is fix to 50 and 100m. The simulation parameter described in table 1.The following performance metrics have been used to estimate each scheme [3, 4, and 7]. a. Saved ReBroadcast (SRB): is the ratio between the numbers of hosts really rebroadcasting and the numbers of host receiving a message. b. Awareness: usually called Reach-ability is the condition or capacity to see or to be aware of an event. Within the range of VANETs, awareness is defined as a driver‟s view and connected with thinking response to a condition or event. Awareness is directly connected to the reach-ability of the information to be disseminated. c. Latency: the interval from time the broadcast was initiated to the time the last host finished its rebroadcasting. 38 International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 SIMULATION PARAMETER VALUE Bandwidth 2 Mbps Network range 800 meter square Transmission range 200 meter Number of nodes 50, 100, 150 Nodes speed 1, 15, 25(Km/hr) Simulation duration 100 seconds Hello interval 1 second Message size 1000 bytes Speed 50km/hr 100 Counter=5 60 Distance=50 40 Distance=100 20 SRB(%) Speed 10km/hr SBA 80 Counter=3 60 Counter=5 40 Distance=50 20 Distance=100 0 50 100 150 Number of Vehicle SBA Counter=3 80 SRB(%) It includes queuing, retransmission, and propagation delays. Suitable latency is an important metric to figure out the efficiency of a protocol to delay sensitive applications like safety applications. Table 1 Simulation parameters 0 50 100 150 Number of Vehicle (iii) Fig 3. SRB VS Number of vehicle: (i) with low speed (10Km/hr), (ii) medium speed (30Km/hr), and (iii) high speed (50Km/hr) Figure 3 plots the SRB evaluation of the SBA timer suppression mechanism with the two common probabilistic based broadcasting schemes (distance based and counter based) as a role of network road density within the variety from 50 to 150 nodes where node speed is fixed to 10, 30, and 50 km/hr, correspondingly. We can study that SRB increases proportionally with the increase in the quantity of nodes for the all schemes. The results show that in a dense network the counter and distance based schemes exhibit lower SRB. Under different nodes density and speed, the SBA with timer suppression mechanism has important SRB as compared to the other broadcasting schemes. We can see that SBA timer suppression mechanism has better SRB over measured schemes. For example, in a network of 50 vehicles with a speed fixed to 10 km/hr, SBA with timer suppression mechanism is better than counter based scheme and better than distance based scheme. These results give good reason for the value of the proposed scheme, i.e., without using any extra affect such as fixed threshold, over counter and distance based schemes. (i) Speed 10km/hr 100 SRB(%) 80 0.5 Counter=3 Counter=3 0.4 Counter=5 Counter=5 60 Distance=50 40 Distance=100 20 0 50 100 150 Number of Vehicle SBA SBA Latency Speed 30km/hr 0.3 Distance=50 0.2 Distance=100 0.1 0 50 100 150 Number of Vehicle (i) (ii) ISSN: 2393-9184 39 International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 0.12 0.1 0.08 0.06 0.04 0.02 0 SBA Speed 10km/hr SBA Counter=3 120 Counter=3 Counter=5 100 Counter=5 Distance=50 Distance=100 Awareness Latency Speed 30km/hr 80 Distance=50 60 Distance=100 40 20 50 100 150 Number of Vehicle 0 50 100 150 Number of Vehicle (ii) (i) (iii) (ii) Fig 4. Latency VS Number of vehicle: (i) with low speed (10Km/hr), (ii) medium speed (30Km/hr), and (iii) high speed (50Km/hr) Figure 4 shows the broadcast latency at a variety of network densities with low, medium, and high vehicles speed. When number of vehicles increases, there transmission of messages increases, and therefore, resulting in decreasing latency. SBA with timer suppression mechanism scheme is a more efficient alternative protocol because it increases the number of saved rebroadcast and the network becomes less congested. We can make out that counter and distance based schemes have higher latency values due to higher redundant rebroadcasts. For example, in a network of 50 vehicles with a speed fixed to10 km/hr, threes is no or minute development compared to counter scheme and distance scheme. Following figure 5 shows the awareness (i.e., reach-ability) comparison of SBA with timer suppression mechanism scheme against the counter and distance based schemes. We can see that in dense networks, all broadcasting schemes prove the same strength in term of awareness among different vehicles speed. SBA with timer suppression mechanism scheme improves a number of the awareness, compared to counter and distance based schemes. ISSN: 2393-9184 (iii) Fig 5. Awareness VS Number of vehicle: (i) with low speed (10Km/hr), (ii) medium speed (30Km/hr), and (iii) high speed (50Km/hr) V CONCLUSION In this paper, we first review of broadcast protocols that have been proposed for MANETs. Self-Pruning Broadcasting for information Dissemination in VANETs is then presented. In this scheme, further ensuring nodes with additional uncovered neighbors rebroadcast first, a timer suppression mechanism to wait the rebroadcasting of nodes with low priority. These are useful to achieving the primary goals of dropping the number of rebroadcasting nodes and make high packet delivery ratio neighboring nodes without requiring any extra effort, such as distance capacity, fixed upper/lower bounds, or accurate number 40 International Journal of Emerging Researches in Engineering Science and Technology, Volume 1, Issue 1 November’14 of neighboring nodes. The performance of the proposed scheme is evaluated with NS2 under several mobility and traffic scenarios. The simulation results are compared with major Probabilistic based broadcasting protocols with respect to the vehicle‟s speeds and under several network density scenarios. The results show that SBA with timer suppression mechanism is the most efficient with respect to SRB in conditions of network density and nodes mobility. It provides a close to best solution in conditions of highest SRB and average latency while maintaining good reach-ability. REFERENCES [1] K. Dar, M. Bakhouya, J. Gaber, M. “Towards a decentralized architecture for information dissemination in inter-vehicles networks”. Wireless communication technologies for ITS applications. IEEE Communications Magazine 2010; 48(5):156–62. [2] Jagadeesh Kakarla, S Siva Sathya, B Govinda Laxmi, Ramesh Babu B. “A Survey on Routing Protocols and its Issues in VANET”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.4, August 2011. [3] M. Bakhouya, J.Gaber, P.Lorenz. An adaptive approach for information dissemination in Vehicular Ad hoc Networks .In: Journal of Network and Computer Applications and science direct; 2011.p 1-8. [4] Woon W, Yeung KL. “Self-pruning broadcasting for mobile ad hoc networks”. In: procedures of the 28th IEEE conference on Global telecommunications (GlobeCom‟09); 2009. [5] Wei Peng Xi-Cheng Lu. On the Reduction of Broadcast Redundancy in Mobile Ad Hoc Networks. IEEE Transaction on Mobile Computing, v.1 n.2, p.111-123, April 2002. [6] M. Bani Yassein, M. Bani Khalaf. “A Performance Comparison of Smart Probabilistic Broadcasting of Ad hoc Distance vector (AODV)”. Online: www.comp.leeds.ac.uk/ukpew09/papers/15.pdf. [7] Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang- Ping Sheu. “The Broadcast Storm Problem in a Mobile Ad Hoc Network”, in: Mobicom „99 Seattle Washington USA copyright ACM 1999 158113-142. [8] L.Zhou, G.Cui, H.Liu, Z.Wu and D.Luo. “NPPB: A broadcast scheme in dense VANETs”; information Technology journal 9(2): 247-256, 2010. [9] Demetres Kouvatsos and Is-Haka Mkwawa. Broadcasting Methods in Mobile Ad Hoc Networks: An Overview. Proceedings of the HetNet, UK; 2005. [10] Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun Wang. HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks. [11] Justin Lipman, Hai Liu, and Ivan Stojmenovic. Broadcast in Ad Hoc Networks. Computer Communications and Networks, DOI 10.1007/9781-84800-328-6_6, Springer-Verlag London Limited 2009. [12] Aneel Rahim, Fahad bin Muhaya, Zeeshan Shafi Khan. Enhanced Relevance-Based Approach for Network Control. Informatica 34 (2010) 223–22. ISSN: 2393-9184 41
© Copyright 2024 ExpyDoc