A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (VANETs)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
Vehicular communication is considered to be a backbone for many critical safety applications. In order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and reliable simulator is essential. Various open source and commercial simulating tools are available for this purpose. One of the key issues in this regard is the selection of a reliable simulator which implements all standard algorithms and paradigms giving accurate results. In this paper, we first present IEEE standard and protocols for vehicular communication, IEEE 802.11p and IEEE 1609.x, also known as WAVE protocol stack. The paper then discusses the necessary requirements for a generic discrete event simulator which can be used to simulate Vehicular Ad-hoc Networks. Since not all the network simulators can be used in the scenario of vehicular communication, we highlight the key features of some network simulators in the context of vehicular ad-hoc networks. The paper also highlights some of the implementation limitations in these simulators. Furthermore, the paper presents a discussion on traffic simulators by emphasizing on the underlying mobility models used in order to generate the realistic traffic patterns. A comparative study of both network and traffic simulators show the pros and cons of these simulation tools. The paper suggests the appropriate choice of a network simulator to be used as a VANET simulator
Authors and Affiliations
Sabih ur Rehman
Quality of Service Optimization in Realm of Green Monitoring using Broad Area Sensor Network (BASN)
A Wireless Sensor Network(WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some a...
Data storage security in Cloud
Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale ind...
A Novel Approach to Design Time Efficient and Secure encryption Algorithm (T-SEA)
A recent field of study is the security of the information over public network through encryption in efficient way. Even if there are no efficiency gains to be made, there are practical and usability issues. This...
Data Usage Monitor for a Shared Wireless NetworkConnection
Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wirelessconnection. The main objective of this technique is to balance and restrict the shared network data. It faci...
A Parameter free Clustering of Density Based Algortihm
Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...