Performance Evaluation of 802.11p-Based Ad Hoc Vehicle-to-Vehicle Communications for Usual Applications Under Realistic Urban Mobility
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 5
Abstract
In vehicular ad hoc networks, participating vehicles organize themselves in order to support lots of emerging applications. While network infrastructure can be dimensioned correctly in order to provide quality of service support to both vehicle-to-vehicle and vehicle-to-infrastructure communications, there are still many issues to achieve the same performance using only ad hoc vehicle-to-vehicle communications. This paper investigates the performance of such communications for complete applications including their specific packet size, packet acknowledgement mechanisms and quality of service requirements. The simulation experiments are performed using Riverbed (OPNET) Modeler on a network topology made of 50 nodes equipped with IEEE 802.11p technology and following realistic trajectories in the streets of Paris at authorized speeds. The results show that almost all application types are well supported, provided that the source and the destination have a direct link. Particularly, it is pointed out that introducing supplementary hops in a communication has more effects on end-to-end delay and loss rate rather than mobility of the nodes. The study also shows that ad hoc reactive routing protocols degrade performance by increasing the delays while proactive ones introduce the same counter performance by increasing the network load with routing traffic. Whatever the routing protocol adopted, the best performance is obtained only while small groups of nodes communicate using at most two-hop routes.
Authors and Affiliations
Patrick Sondi, Martine Wahl, Lucas Rivoirard, Ouafae Cohin
Minimization of Call Blocking Probability using Mobile Node velocity
Due to rapid growth in IEEE 802.11 based Wireless Local Area Networks (WLAN), handoff has become a burning issue. A mobile Node (MN) requires handoff when it travels out of the coverage area of its current access point (...
Knowledge Discovery in Health Care Datasets Using Data Mining Tools
Non communicable diseases (NCDs) are the biggest global killers today. Sixty-three percent of all deaths in 2008 – 36 million people – were caused by NCDs. Nearly 80% of these deaths occurred in low- and middle-in...
Classifying Natural Language Text as Controlled and Uncontrolled for UML Diagrams
Natural language text fall within the category of Controlled and Uncontrolled Natural Language. In this paper, an algorithm is presented to show that a given language text is controlled or uncontrolled. The parameters an...
A Novel Approach to Detect Duplicate Code Blocks to Reduce Maintenance Effort
It was found in many cases that a code might be a clone for one programmer but not the same for another one. This problem occurs because of inaccurate documentation. According to research, the maintainers are not aware o...
BYOD Implementation Factors in Schools: A Case Study in Malaysia
The Bring Your Own Device (BYOD) initiative has been implemented widely in developed countries as a mechanism to prepare the students for the 4th industrial revolution. Success stories of the initiative vary depending on...