SELECTIVE MAC FOR OBSTACLE AWARE CEV ENVIRONMENTAL MODEL FOR VANET (V2V)
Journal Title: ICTACT Journal on Communication Technology - Year 2017, Vol 8, Issue 2
Abstract
Vehicular Ad Hoc Network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMAC experiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
MAXIMIZE THE LIFETIME OF SENSOR NETWORK BY LOAD BALANCING USING TREE TOPOLOGY
In many wireless sensor networks due to the limited energy of sensor nodes energy conservation is one of the most important challenges. To enhance the lifetime of the network emphasis is given to design energy efficient...
GPRKEY - A NOVEL GROUP KEY REKEYING TECHNIQUE FOR MANET
A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and work without strict network administration. Ensuring security in mobile ad hoc network...
AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an inves...
AN ENERGY EFFICIENT CLUSTER-HEAD FORMATION AND MEDIUM ACCESS TECHNIQUE IN MULTI-HOP WBAN
In the present era, Wireless Body Area Network (WBAN) has emerged as one of the most desired healthcare technologies. Along with healthcare, its application area includes sports, entertainment, battlefield etc. Any time...
SECURE LOCALIZATION USING COORDINATED GRADIENT DESCENT TECHNIQUE FOR UNDERWATER WIRELESS SENSOR NETWORKS
In the Underwater Wireless Sensor Networks (UWSN) provide a solution for several aquatic and oceanographic applications. All these UWSN applications are need to be aware of the nodes positioning. In some insecure environ...