Professional Documents
Culture Documents
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 87
Abstract-On demand set up, fault tolerance and unconstrained connectivity are a couple of advantages ,that why mobile computing
continues to enjoy rapid growth. In last three decade ,tremendous improvement is made in research area of wireless adhoc network
and now a days ,one of the most attractive research topic is inter vehicle communication i.e. realization of mobile adhoc network
.VANETs have been recently attracting an increasing attention from both industry as well as research communities .A rich literature
in MANET exists, but the availability of traffic data and vehicle equipment motivate the researchers to explore the special
characteristics of VANET. In this paper we survey and compare from the literature ,the environment for MANET and VANET. Finally
we share a collection of useful references.
------------------------------------------------------------------------------
and make a comparison study. Finally we end with 3. High application requirement on data
the discussion and few useful references. delivery. Important VANET applications are for
traffic safety to avoid road accidents; potentially
2. Unique VANET characteristics and including safety-of-life. These applications have
high requirements with respect to real time and
comparison with MANET
reliability. An end-to-end delay of seconds can
2.1 Unique VANET characteristics render a safety information meaningless.
Though Vehicular network share common
4. No confidentiality of safety information. For
characteristics with conventional ad-hoc sensor
safety application the information contained in a
network such as self organized and lack of central
message is of interest for all road users and hence
control. VANET have unique challenges that
not confidential.
impact the design of communication system and its
protocol security[2]. These challenges include- 5. Privacy. Communication capabilities in vehicles
might reveal information about the driver/user,
1. Potentially high number of nodes. Regarding
such as identifier, speed, position and mobility
VANETs as the technical basis for envisioned
pattern. Despite the need of message
Intelligent Transportation System (ITS) we expect
authentication and non-repudiation of safety
that a large portion of vehicles will be equipped
messages, privacy of users and drivers should be
with communication capabilities for vehicular
respected in particular location privacy and
communication. Taking additionally potential road-
anonymity.
side units into account, VANET needs to be
scalable with a very high number of nodes. 2.2 Comparison of MANET and VANET
2. High mobility and frequent topology Mobile Ad-hoc networks and Vehicular Ad-hoc
changes. Nodes potentially move with high speed. networks are very much similar on various
Hence in certain scenarios such as when vehicle technical grounds but following are some
pass each other, the duration of time that remains parameters on the basis of which we can contrast
for exchange of data packets is rather small. Also, both environments.
intermediate nodes in a wireless multi-hop chain of
forwarding nodes can move quickly.
sending the advertisements and by not needing to that they conserve the bandwidth. but
receive them (A host could otherwise reduce its disadvantage is that each node is required to carry
power usage by putting itself in to the sleep or a GPS.
standby mode when they are not busy with other
tasks. Link breakage is reported by report error In signal stability protocols such as SSA[10],selects
message(RERR). routes based on location stability and signal
strength. In this approach routes stays longer thus
But since routes in vehicular networks are fragile, fewer route construction is needed. the
such protocols spend much time in discovering the disadvantage of this protocol is that when route
routes. So they are not suited for VANET. failure occurs no attempt is made to recover the
route delaying the route discovery.
Second category is hierarchical or hybrid such as
Zone Routing Protocol(ZRP)[8], divides the In last but not the least category of multicast
network into different zones. Intrazone is routing e.g. M-AODV[11] i.e. multicast extension of
performed by pro-active protocol. Inter-zone is AODV .It allows each node in the network to send
performed by reactive protocol. The advantage of out multicast data packets and the multicast data
this protocols is that it has reduced the packets are broadcast when propagating along the
communication overhead if we compare to multicast group tree.
traditional proactive protocols. Although they
present scalable route strategy for large scale
environment but their implementation has not
gained much popularity and not suited for VANET.
Table-2
associativity problem
SSA Flat Signal strength Route table Route stability/large delays
LAR Flat Shortest path Route cache Local route discovery/based
on source routing
ZRP Flat Shortest path Interzone/intrazone Less
tables commn.overhead/overlapping
zones
Broadcasting technique is used for sharing traffic [12].Fan li,Yu Wang,”Routing in vehicular adhoc networks:A
emergency conditions, advertisements etc. the way survey”,IEEE vehicular technology magazine,june 2007.
to achieve broadcasting is flooding and it is easy to [13]. V. Namboodiri, M. Agarwal, and L. Gao, “A study on the
be implemented. But its performance drops quickly feasibility of mobile gateways for vehicular ad-hoc networks,”
as networks grows larger. Two well known routing in Proceedings of the First International Workshop on
protocols are BROADCOMM[18] and Urban Multi- Vehicular Ad Hoc Networks, pp. 66–75, 2004.
hop Broadcast Protocol(UMB)[19].BROADCOMM
[14]. B. Karp and H.T. Kung, “GPSR: Greedy perimeter
works on hierarchical structure and it outperforms stateless routing for wireless networks,” in Proceedings of
flooding algorithm.UMB overcome the problem of the ACM/IEEE International Conference on Mobile
hidden nodes and packet collision. This protocol Computing and Networking (MobiCom), 2000.
give high success rate for heavy traffic density and
packet load. [15]. C. Lochert, M. Mauve, H. Füßler, and H. Hartenstein,
“Geographic routing in city scenarios,” ACM SIGMOBILE
Mobile Computing and Communications Review (MC2R),
5.Conclusion vol. 9, no. 1, pp. 69–72, Jan. 2005.
In this paper we discuss typical architectural [16]. J. Blum, A. Eskandarian, and L. Hoffman, “Mobility
management in IVC networks,” in IEEE Intelligent Vehicles
features of vehicular network and compare it with
Symposium, 2003.
traditional mobile ad-hoc network. Table 1 draws
an outline of MANET and VANET routing [17]. R.A. Santos, A. Edwards, R. Edwards, and L. Seed,
principles. In general although this paper gives no “Performance evaluation of routing protocols in vehicular
technically practical results but presents an overall adhoc networks,” The International Journal of Ad Hoc and
picture of different routing challenges that are Ubiquitous Computing, vol. 1, no. 1/2, pp. 80–91, 2005.
faced in vehicular environment and various routing [18]. M. Durresi, A. Durresi, and L. Barolli, “Emergency
procedures followed in both the networks. We broadcast protocol for intervehicle communications,” in
believe this paper will be helpful for future designer ICPADS ’05: Proceedings of the 11th International
in vehicular communication networks. Conference on Parallel and Distributed Systems—
Workshops (ICPADS’05), 2005.
6. References [19].. G. Korkmaz, E. Ekici, F. Özgüner, and Ü. Özgüner,
“Urban multi-hop broadcast protocol for inter-vehicle
[1].Bryan Parno, Adrian Perrig, “Challenges in Securing communication systems,” in ACM International Workshop on
Vehicular Networks”, Poster presented at USENIX Security Vehicular Ad Hoc Networks, pp. 76–85, 2004.
Symposium,August-04.
[2].Emanuel Fonseca,A.Festag,”A survey of Existing [20].T.H.Kim,W.K.Hong,H.Kim,”An effective multihop
approaches for secure ad-hoc routing and their applicability broadcast in vehicular adhoc networks”, proceedings 20th
to VANET”, NEC Network Laboratories,March 2006. International Conference on Architecture of Computing
[3] Frank Kargl “Secure Routing for Vehicular Networks.”. Systems, ARCS 2007, March 2007,springer.
SEVECOM Kick-off Workshop,2nd Feb,2006.
[4].M.Abolhasan,T.Wysocki,E.Dutkiewicz,”A review of
routing protocols for mobile ad-hoc Ms. Arzoo Dahiya is currently working as an Assistant
networks”,www.elseviercomputerscience.com professor in I.T.Deptt,Lingaya’s University,Faridabad.
[5].C.liu,J.Kaiser,”A survey of mobile adhoc network routing
protocols”university of Ulm technical report series,No.2003- Prof. (Dr.) R. K. Chauhan is currently working as a
08,germany 2005. Chairman, Department of Computer Science and Application
[6]Y.B.Ko,N.H.Vaidya,”Location Aided Routing in mobile ad- in Kurukshetra University, Kurukshetra. He has published
hoc networks”,proceedings ACM/IEEE Mobicomm,oct 1998. more than 70 research papers in International/National
[7] Mahdipour, E. Rahmani, A.M. Aminian, E. ,” Journal/Conference. He has guided 5 Ph.D. His research
Performance Evaluation of Destination-Sequenced Distance- interest includes Data Mining, DBMS and Networks.
Vector (DSDV) Routing Protocol”,
Proceeding March 2009 , page(s): 186 – 190, ISBN: 978-0-
7695-3567-8.
[8]Z.Hass,”Zone routing protocols for adhoc
networks”,internet draft,draft-ietf-manet-zrp-02.txt.
[9] Martin Mauve, et al, “A Survey on position based routing
in ad-hoc networks “, IEEE Network Magazine 15 (6), pp. 30-
39, November 2001.