- Open Access
- Total Downloads : 762
- Authors : Mr. Deven S. Patel, Prof. Amit Patel
- Paper ID : IJERTV2IS50186
- Volume & Issue : Volume 02, Issue 05 (May 2013)
- Published (First Online): 10-05-2013
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Reliable Multicast AODV Protocol for VANET Using Network Coding
Mr. Deven S. Patel
M.E(Info. Tech.)
I.T Department KIT&RC, Kalol
Prof. Amit Patel
Assistant Professor
I.T Department KIT&RC,Kalol
ABSTRACT
VANET is a major challenge now a days due to the high speed mobility, reliability and fast communication time are also major challenge in vehicular communication then our work proposed to the network coding. Random linear network coding is a particularly decentralized approach to the multicast problem. Use of random network codes introduces a non-zero probability however that some sinks will not be able to successfully decode the required sources. One of the main theoretical motivations for random network codes stems from the lower bound on the probability of successful decoding. So in Network coding instead of directly forwarding packet, here packets will be mixed and encoded over finite field like GALOIS field.
-
INTRODUCTION
Using network coding we can increase the reliability our network, In our technique we using Group Id, LAN ID, Node id, for identify node & the related area, when any car enter in the network then the main RSU allocates its unique group id & that group id is not permanent when it will be pass through the another RSU, then another group id allocate it. Between two main RSU ,there are also small RSU are available & these RSU containing the message from car & buffer in it, and when it got the signal it will be transmit to another car for assigning group id , its works same as a well as like a DHCP.
We transmit the message like infotainment & emergency, the infotainment message, store in RSU & when any car passing through that RSU range, then it will be multicast. That means this msg. multicast all nearest car which are comes to thats range. In this technique, we can also multicast our message, to opposite side LAN through this & we can also to decrease the load of RSU. & which msg. we multicast then its contain to id, group id. If group id & ID match then Using network coding we can directly to decrypt the packet node.
If group id not match then that node or car will carry that msg. up to that id will not match that car also this msg. transmit to RSU using this. In multicasting there is no intermediate node comes for transmission msg. so, every packet contain the information of encryption & decryption, for this technique we finally using the random liner network coding.
-
PROBLEM DEFINITION
To develop a reliability aware network coding based protocol to deliver information in VANET. Also to reliable content from others in VANET. DTN which connectivity is prime issue, so this problem will network coding then packet needs to the guarantee reliability. Finally the works for using network coding where the sending encrypted packets to other finite field to provide Reliability.
-
PROPOSED SYSTEM
In this Existing system there is no work done that investigates the throughput, reliability and
other quality-of-service (Quos) parameters in multicasting so for that make a protocol for VANET using network coding that increase the reliability of multicasting and also increase throughput of network. In this techniques using Group ID, LAN ID, Node ID.
Then Network Coding for Reliability, techniques for vehicle to vehicle and vehicle to Infrastructure to getting the maximum enhanced throughput using Network coding. And end to end fast reliable message transfer. In this scheme multicast the message to opposite side LAN vehicle & infrastructure & decrease the load of RSU. If group id match then using network coding we can directly to decrypt the packet node. & not match then node will be carry that message transmit to RSU. In multicasting there is no intermediate node comes for transmission message so, every packet contain that information of encryption and decryption for this techniques we finally using the random linier network coding.
-
-
LITERATURE SURVEY
The vehicular wireless networks are significantly different from the wireless ad-hoc networks that are implemented and deployed for the infrastructure-less environments. Firstly, the vehicles have far greater energy/power supply than normal mobile devices, as often energy can be derived from the vehicle itself. Secondly, given the size of the vehicle, a large number of sensors can be fitted onto the vehicles. This is particularly significant in case of having an intelligent transportation system with safety, security, communication, infotainment and other services deployed. Thirdly, the vehicles usually travel at high speeds and thereby have great difficulty in consistently maintaining vehicle-to- vehicle connectivity. Finally, unless there is a heavy investment in upgrading the current infrastructure, the vehicles are most often few hops away from BS or access points (AP). However, in order to have fixed access points to cover all roads at short distance one from another, huge and expensive investment is
required, which is practically impossible. Hence, there is a need to design and develop novel methods to enable vehicular wireless network support for the above requirements.
-
NETWORK CODING-BASED RELIABLE MULTICAST [12]
Based on the above observations, we aim to design an efficient coding-based reliable multicast scheme which performs the packet coding with the general coding operations and can effectively exploit the packet overhearing between different local groups. Below we discuss the details of our network coding-based reliable multicast scheme.
A.NODE OPERATION
The broadcast nature in wireless medium creates many opportunities for nodes to overhear packets when they are equipped with Omni- directional antennae. In our scheme, the net work nodes are set in the promiscuous mode and snoop all communications over the wireless medium, such that the node of one local group can overhear the packets transmitted from the source of another local group.
-
NETWORK CODING [16]
Consider a system that acts as information relay, such as a router, a node in an ad-hoc network, or a node in a peer Ties are broken arbitrarily. The algorithm results in the client requesting all of the blocks of the file from the servers such that the cost is minimized. As mentioned earlier, in this paper the cost function is hop distance. Therefore, the closest server is contacted first and as many blocks as are available are downloaded from it. If more blocks are required, the next closest server is contacted, and so on. This is illustrated fig 2.4. In the figure, Node A is attempting to download a file which consists of 60 blocks. Node B, within 1 hop, is contacted first and 20 blocks are requested from it, since those are all the blocks B has. Node C, 2 hops away, is then contacted, and 30 blocks are requested from it. Finally, node D, which is 3
hops distant, is contacted. Only 10 blocks remain, and so 10 blocks are requested from D instead of the 20 it has available. The unlabeled nodes do not have any blocks of the file. It may happen that due to client, server, or intermediate node mobility, or the receipt of too many non innovative blocks, a client may not be able to download the entire file as expected. In this event, the client repeats the search query to get an updated list of servers and costs, and then re- runs the algorithm, but leaves the counter, b, as is. This allows the client to obtain the remaining number of blocks required.
-
WHAT ARE THE BENEFITS F NETWORK CODING?[17]
-
Theoretically proven results about network coding mainly concern performance improvements in static settings. We review these first and then discuss random distributed settings.
Figure 2.1 A simple network coding example.
[16]A.THROUGHPUT GAIN IN STATIC ENVIRONMENT
A primary result that sparked the interest in network coding is that it can increase the capacity of a network for multicast flows. More specifically, consider a network that can be represented as a directed graph (typically, this is a wired network). The vertices of the graph correspond to terminals, and the edges of the graph correspond to channels. Assume that we have M sources, each sending information at some given rate, and N receivers. All receivers are interested in receiving all sources. Theorem
1. [21, 22] Assume that the source rates are such
that, without network coding, the network can support each receiver in isolation (i.e. each receiver can decode all sources when it is the only receiver in the network). With an appropriate choice of linear coding coefficients, the network can support all receivers simultaneously. In other words, when the N receivers share the network resources, each of them can receive the maximum rate could hope to receive, even if it were using all the network resources by itself. Thus, network coding can help to better share the available network resources (Figure 2.4). Network coding may offer throughput benefits not only for multicast flows, but also for other traffic patterns, such as unicast.
Figure 2.2 (Butterfly Network) S1 and S2 multicast to both R1 and R2. [17]
source S1 transmits to destination R2 and S2 to R1. With network coding we can send rate 1 to each receiver, while without, we can only send rate 1/2 to each receiver. There exist directed graphs where the throughput gains of network coding for multicasting can be very significant [21, 6]. However, in undirected graphs (e.g., a wired network where all links are half-duplex) the throughput gain is at most a factor of two [17]. Experimental results in [20] over the network graphs of six Internet service providers showed a small throughput gain in this case. Multicommodity flow problem). An interesting point is that network coding allows to
achieve the optimal throughput when multicasting using polynomial time algorithms. In contrast, achieving the optimal throughput with routing is NP-complete: this is the problem of packing Steiner trees in CS theory. Thus, even
when the expected throughput benefits of network coding are not large, we expect to be able to achieve them using simpler algorithms. We expand on this point in the following.
B. ROBUSTNESS & ADAPTIBILITY
The most compelling benefits of network coding might be in terms of robustness and adaptability. Intuitively, we can think that network coding, similarly to traditional coding, takes information packets and produces encoded packets, where each encoded packet is equally important. Provided we receive a sufficient number of encoded packets, no matter which, we are able to decode. The new twist that network coding brings, is that the linear combining is performed opportunistically over the network, not only at the source node, and thus it is well suited for the (typical) cases where nodes only have incomplete information about the global network state. Consider again Figure 2.5 and assume that A and B may go into sleep mode (or may move out of range) at random and without notifying the base station S. If the base station S broadcasts a (or b), the transmission might be completely wasted, since the intended destination might not be able to receive. However, if the base station broadcasts a xor b, or more generally, random linear combinations of the information packets, the transmission will bring new information to all active nodes.
-
SYSTEM DESIGN
Fig. 3.1 System Design
-
PROPOSED ALGORITHM
Procedure ()
Enter in WAVE network
Allocate dynamic group_id for zone wise Allocate dynamic lane_id for particular lane
-
If node_id = source_id group_id RSU_id Send_Procedure ()
{
Creates N Packets Call_Network Coding (N)
Set Destination_id Destination Group_id;
Send ()
}
-
If node_id = intermediate node
{
Call_Network Coding (N) Forward ()
}
-
If node_id = Destination_Node
{
Call_Network Decoding ()
}
End Procedure
-
-
IMPLEMENTATION THEORY
In this research work there are three modules are there
1)Vehicle generator 2)Network coding
3)Simulate NC in existing AODV protocol Using network coding we can increase the reliability our network , In our technique we using Group Id , LAN ID , Node id , for identify node & the related area , when any car enter in the network then the main RSU allocates its unique group id , & that group id is not permanent when it will be pass through the another RSU , then another group id allocate it. Between two main RSU , there are also small RSU are available & these RSU containing the message from car & buffer in it, and when it got the signal it will be transmit to another car for assigning group id , its works same as well as
like a DHCP. We transmit the message like infotainment & emergency, the infotainment message, store in RSU & when any car passing through that RSU range, then it will be multicast. That means this msg. multicast all nearest car which are comes to thats range. In this technique, we can also multicast our message, to opposite side LAN through this & we can also to decrease the load of RSU. & which msg. we multicast then its contain to id , group id. If group id & ID match then Using network coding we can directly to decrypt the packet node. If group id not match then that node or car will carry that msg. up to that id will not match that car also this msg. transmit to RSU using this. In multicasting there is no intermediate node comes for transmission msg. so, every packet contain the information of encryption & decryption, for this technique we finally using the linier network coding.
-
PACKET STRUCTURE
Sorce Node Destinaiton Node
WAVE ARCHITECTURE
Source Id
Destinat ion Id
security
Reliabili ty
Encrypti on
Co- Efficient matrix
Group Id
Payload
(PACKET STRUCTURE)
Fig.3.2 Packet Structure
Above the system Architecture there are two nodes first one is the source node and the second is the Destination node, When Source node are send any Information or messages to the destination that will be process into WAVE (Wireless Access Vehicular Environment) architecture there will be define as the packet structure and this contain Source ID, Destination ID, Security, Reliability, Encryption, Co- efficient Matrix, Group Id and Payload.
When Destination node Receive the message, according to packet structure it performs the decoding and getting the reliable message.
-
-
SIMULATION RESULT:
To analyze the effect of mobility, pause time was varied from 0 seconds (high mobility) to
100 seconds (low mobility). The number of nodes is taken as 50 and the maximum number of connection as 20. Graphs shown in Fig. 3.4 show the effect of Mobility for DSDV, DSR and AODV protocols with respect to various performance metrics.
-
PACKET DROPPED
Table- 1 Time Vs Packets Dropped
Fig. 3.3 Pause Time Vs Packets Dropped
DSDV performs poorly as it is dropping more number of packets at high mobility. Each packet that the MAC layer is unable to delive is dropped since there are no alternate routes. Both DSR and AODV allow packets to stay in the send buffer for 30 seconds for route discovery and once the route is discovered, data packets are sent on that route to be delivered at the
destination. If route fails, both DSR and AODV find new path within 30 seconds there by minimizing the possibility of packet drop.
-
IMPLEMENTATION OF NETWORK CODING
Here we choose which function we have to do according to that the randomly packet will be generated that packet will be multiply by same as the size of packet with random [n*n] matrix.
-
-
CONCLUSION
As VANET is an Emerging Area in which prime focus on Reliability so, that can be resolve by Network coding which can maximize bandwidth. Hence it can be simulated in AODV. Up to this related papers studied & find out the problem definition for this optimize multicasting based routing protocol use AODV protocol and as per our proposed algorithm, then changes in AODV protocol & stimulate this result for checks Reliability and throughput of multicasting.
REFERENCES
-
C. E. Palazzi, S. Ferretti and M. Roccetti,
“Communities on the road: fast triggering of
interactive multimedia services" Multimedia Tools Applications, Springer, May 2009.
-
M. Guo, M. H. Ammar, and E. W. Zegura,
“V3: A Vehicleto- Vehicle Live Video Streaming Architecture", IEEE Pervasive Computing and Communications, Hawaii, USA, 8- 12 March 2010.
-
K. Collins, G.-M. Muntean, “Route based Vehicular Traffic Management for Wireless Access in Vehicular Environments", IEEE Vehicular Technology Conference (VTC), Calgary, Canada, September 2010.
-
L. Armstrong and W. Fisher, “Wireless Access in Vehicular Environments", IEEE P802.11 – Task Group, last accessed on 26th March 2011,
http://www.ieee802.org/11/Reports/tgp\_update. htm
-
D. Jiang, V. Taliwal, A. Meier, W. Holfelder and R. Herrtwich, “Design of 5.9GHz DSRC- based Vehicular Safety Communication", IEEE Transactions on Wireless Communications, Vol. 13, No. 5, pp 36-43, October 2012.
-
J.-S. Park, U. Lee, S. Y. Oh, M. Gerla, and
D. Lun, “Emergency Related Video Streaming in VANETs using Network Coding", ACM Vehicular Adhoc Networks, Los Angeles, CA, USA, September. 2009.
-
J.-S. Park, U. Lee, S.-Y. Oh, M. Gerla and D.
S. Lun, Emergency-related Video Streaming in VANETs using Network Coding", ACM Vehicular Adhoc Networks, Los Angeles, CA, USA, September. 2010.
-
G.-M. Muntean, P. Perry and L. Murphy, “A Comparisonbased Study of Quality-Oriented Video on Demand", IEEE Transactions on Broadcasting, vol. 53, no. 1, part 1, pp. 92-102, March 2011.
-
H. Venkataraman, S. Agrawal, A. Maheshwari and G.-M. Muntean, “QPAMS – Quality Oriented Prioritized Adaptive Multimedia Scheme over two-Hop Wireless Networks", World Congress on Engineering and Computer Science (WCECS), Berkeley, 20-22 October, USA.
-
H. Venkataraman, G.-M. Muntean and H. Haas, “Spatial Reuse Efficiency Calculation for Multihop Wireless Networks", AEUe Journal, Science Direct, Elsevier, 2010.
-
S. P. Sheng, B.Y. Chang and H. Y. Wei,
“Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network" IEEE Asia Pacific Services Computing Conference, Yilan, Taiwan, 9-12 December, 2008.
-
K. Chi, X. Jiang, B. Ye, H. Y. Shwe, and S. Horiguchi, Efficient Network Coding-Based End-to-End Reliable Multicast in Multi-hop Wireless Networks, no. Apcc, 2009.
-
K. Chung, Y. Li, and W. Liao, Exploiting Network Coding for Data Forwarding in Delay Tolerant Networks, pp. 04, 2010.
-
Y. Wenzhong, H. Chuanhe, Z. Zhenyu, and
W. Tong, A Reliable Multicast for MANETs Based on Opportunistic Routing and Network Coding, pp. 540545, 2010.
-
A. Mawji and H. Hassanein, Efficient Multipoint P2P File Sharing in MANETs, 2009.
-
C. Fragouli, E. Ic, and E. Ic, Network Coding: An Instant Primer, 2011.
-
E. Alotaibi and B. Mukherjee, Survey paper A survey on routing algorithms for wireless Ad-Hoc and mesh networks, Computer Networks, vol. 56, no. 2, pp. 940965, 2012.
-
Y. Hsieh and K. Wang, Dynamic overlay multicast for live multimedia streaming in urban VANETs, Computer Networks, vol. 56, no. 16, pp. 36093628, 2012.
-
R. Oliveira, A. Garrido, R. Pasquini, and M. Lu, Towards the use of XOR-based Routing Protocols in Vehicular ad hoc Networks, 2011.
-
Y. Chen, G. Chen, and E. H. Wu, Multiple Trees with Network Coding for Efficient and Reliable Multicast in MANETs, 2010.
-
H. Venkataraman and G. Muntean, Performance Analysis of Real-Time Multimedia Transmission in 802 . 11p based Multihop Hybrid Vehicular Networks, pp. 11511155, 2010.
-
Majid Ghaderi, Don Towsley and Jim Kurose NETWORK CODING PERFORMANCE FOR RELIABLE MULTICAST 2007
-
Joon-Sang Park · Uichin Lee · Mario Gerla Vehicular communications: emergency video streams and network Coding 2010
-
Gongjun Yan Nathalie Mitton Xu Li Reliable Routing in Vehicular Ad hoc Networks 2010.