SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
IMPORTANCE OF REALISTIC MOBILITY 
MODELS FOR VANET NETWORK 
SIMULATION 
Bahidja Boukenadil¹ 
¹Department of Telecommunication, Tlemcen University, Tlemcen,Algeria 
ABSTRACT 
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested 
under a realistic conditions including, representative data traffic models, and realistic movements of the 
mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two 
mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model 
generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe 
several mobility models for VANET simulations. 
In this paper we aim to show that the mobility models can significantly affect the simulation results in 
VANET networks. The results presented in this article prove the importance of choosing a suitable real 
world scenario for performances studies of routing protocols in this kind of network. 
KEYWORDS 
VANET; Mobility Model; Simulations; Real World; MOVE; SUMO; CityMob; NS-2 etc. 
1. INTRODUCTION 
The mobility is the principal constraint met in the vehicular networks, therefore the performance 
investigation of VANET network routing require the exact prediction of mobility of nodes 
forming the network, and this is realized by the good choice of the mobility model. 
Generally, the traces and the synthetic models [1] are two kinds of mobility patterns used for the 
simulation of networks .for simulating the complex and large scale networks that require more 
real world scenarios for a real modeling, the traces are used. But in several situations, these traces 
are created with difficulty, particularly for the networks of high mobility like the vehicular 
networks. In this case, the mobility of nodes (i.e., the vehicles nodes) are modeled with the 
synthetic patterns, these models try to really present the behavior of these environments of 
vehicles. 
A variety of synthetic mobility models for vehicular networks are discussed in Literature, some of 
them are presented in Section II. Section III illustrate that a mobility model has a large effect on 
the performance evaluation in simulation of VANET network. Finally, Section IV presents some 
concluding remarks. 
DOI : 10.5121/ijcnc.2014.6513 175
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
176 
2. MOBILITY MODEL FOR VEHICULAR NETWORKS 
Many models of mobility can be used to generate the movement of the vehicles instead of the 
traces which are difficult to create in the VANET environments . 
However, the behavior of these networks is very complex; the drivers must react to the high 
change of the road conditions like the congestion, traffic jam, works in the roads. The state of the 
roads in turn depends on the behaviors of the drivers. Thus, the choice of the mobility model 
affects the relevance and viability of the obtained results. 
In general, vehicular traffic simulators or mobility models can be classified in two great kinds, the 
microscopic and macroscopic simulators. The microscopic simulator is interested in the 
movement of each vehicle taking part in the road traffic. In contrast the macroscopic simulators 
are interested in all the vehicles forming the networks; it compute road capacity and the 
distribution of the traffic in the road net, by determining a certain parameters like traffic density 
(number of vehicles per km per lane) or traffic flow (number of vehicles per hour crossing some 
points of interest, usually an areas with a great density of nodes) . 
The literature present a large variety of mobility models for VANET networks. 
The work of Saha and Johnson [2] model vehicular traffic in real road topologies of the maps of 
USA available from TIGER (Topologically Integrated Geographic Encoding) [3] database. The 
mobility of nodes is random.Vehicles compute the shortest path to get their destination over the 
graph by weighting the cost of displacement on each road on its speed limit and the traffic jam. 
Huang et al. [4] studied taxi behavior. In this work, a Manhattan style grid with a uniform block 
size is modeled. The streets of simulation area are two-way, with one lane in each direction. 
These lanes constrain vehicle movements. A set of parameters characterize the vehicle behavior 
which are preferred velocity ,maximum acceleration and deceleration, a velocity variation 
associated with the preferred speed at steady state and a list of preferred destinations, i.e., the taxi 
stands. . The taxis assigne randomly one of three preferred speeds. 
In the work of Choffnes et al. [5] , an integrated mobility and traffic model is conceived, named 
STRAW.For modeling real traffic conditions ,this model incorporates a simple car-following 
model with traffic control. The road map of this pattern is constructed by street plans with one 
lane in each direction .The vehicles move in these lanes according to a random street placement 
model.Each vehicle enters the map is placed behind the existing one. 
In [6] Haerri et al. proposed a vehicular mobility simulator for VANET networks, called 
VanetMobiSim [7] .The speed of vehicles for this model is determined by the use of the 
Intelligent Driver Model (IDM). 
Three different models were presented in the work of Mahajan et al. [8]: Stop Sign Model (SSM), 
Traffic Light Model (TLM) and Probabilistic Traffic Sign Model (PTSM).In this models All 
roads are two-way, with one lane in each direction for the SSM and PTSM, whereas TLM model 
streets with multiple lanes. An algorithm is employed to reproduce stop signs for each model. 
Martinez et al [9] present CityMob [10] .This mobility model generate different mobility patterns 
in VANETs, Simple Model (SM), Manhattan Model (MM) and Downtown Model (DM).Each 
model has its own characteristics,For the SM,the plan of the road is very simple, neither 
semaphores nor direction changes.In constract, MM and DM simulates semaphores at crossing
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
and random positions in zones with different vehicle density. CityMob allows to simulate 
damaged cars and tries to prevent congestions. Figure 1 present the interface of this model. 
Karnadi et al. [12, 13, 14] develop a tool MOVE (MObility model generator for VEhicular 
networks) [11] .This model provide facility for the users to generate real world scénarios in 
VANET environments. This model contains two editors, one for road map and the second for 
vehicle movement .The user can manually and automatically create the road topology or import it 
from existing real world maps such as Google maps. For vehicle movement, the pattern can be 
manually created, generated automatically or specified based on a bus time table to simulate the 
movements of public transportations. Figure2 shows the interface of this model. 
177 
Figure 1. Interface of CityMob
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
178 
Figure 2: Mobility Model Generator 
3. INFLUENCE OF MOBILITY MODEL IN VANET 
SIMULATIONS 
. 
The simulation results are greatly affected by the mobility model selected .The results presented 
in this section illustrate the importance of choosing a suitable mobility model for performances 
evaluation of routing protocols in VANET network. 
We use ns-2 [34] to compare the performance of the CityMob Model and the MOVE tool via a 
simulation.The routing of packets is accomplished with the Ad hoc On Demand Distance Vector) 
(AODV) [20]. We have chosen the parameters for both mobility models in a manner to simulate 
the same path as possible. 
AODV (Ad hoc On Demand Distance Vector) [1] is a reactive protocol that does route discovery 
when needed by a node. The route discovery process is initiated only when a source node has data 
traffic to send to a destination node, that makes AODV a truly On- Demand routing protocol. 
In our simulations, we chose AODV since it behaves well in several of the performance 
evaluations of the routing protocols (e.g. [21, 22, 23]).
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
The ns-2 code used in our simulations of AODV was obtained from [24]. 
Each simulation run lasted for 300 seconds with a uniform block size of 500 x 500 meters; the 
maximum speed of vehicles is of 40 m/s. 
The number of vehicles nodes from 15 to 100. We chose the traffic sources at a constant rate 
CBR (Constant Bit Rate). Traffic between nodes is generated using a traffic generator which is 
characterized by the following parameters: Data packets Size is 512 bytes, Interval between 
packets is 0.25s , maximum of packets transmitted 1000. All nodes use IEEE 802.11 MAC 
operating at 2Mbps. The propagation model employed in the simulation is TwoRayGround 
reflextion. 
In our comparison of the two mobility models, we consider the following performance metrics 
obtained from the AODV protocol: throughput, end-to-end delay and protocol overhead. 
179 
0 20 40 60 80 100 
0,023 
0,022 
0,021 
0,020 
0,019 
0,018 
0,017 
0,016 
0,015 
0,014 
0,013 
0,012 
0,011 
0,010 
0,009 
Move 
CityMob 
Throughput (bits/s) 
Number of vehicles 
Figure 3 : Throughput vs. number of vehicles. 
0 20 40 60 80 100 
0,50 
0,45 
0,40 
0,35 
0,30 
0,25 
0,20 
MOVE 
CityMob 
Average End-to-End Delay (sec) 
Number of vehicles 
Figure 4 : End-to-end delay vs. number of vehicles.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
180 
0 20 40 60 80 100 
110 
100 
90 
80 
70 
60 
50 
40 
MOVE 
CityMob 
Overhead 
Number of vehicles 
Figure 5 : overhead vs. number of vehicles. 
Figures 3, 4 and 5 illustrate the performance (i.e., Throughput ratio, end-to-end delay and 
overhead) of AODV with the two mobility models chosen.The Throughput (in figure 3) of 
AODV when using MOVE mobility model is higher and more stable than when using CityMob 
model.The trace 4 shows that AODV causes a low stable delay with MOVE because the roads are 
more defined compared to CityMob. 
Figures 5 illustrate the overhead AODV required with each of the chosen mobility models. The 
vehicles moving with CityMob have a higher overhead, as a result this model requires a higher 
amount of overhead compared to MOVE.These results confirm the suitability of MOVE tool for 
simulating VANET. 
4.CONCLUSIONS 
In this paper, we compared the performance of two mobility models for VANET Simulation i.e. 
MOVE (MObility model generator for VEhicular networks) and CityMob (City 
Mobility).Simulation analysis using realistic mobility model for VANET environment show that 
the performance of the protocol is greatly affected by the mobility model. The performance of an 
ad hoc network protocol can vary significantly with different mobility models then, the choice of 
mobility model in simulating VANET is very important.The mobility models for VANET should 
be most closely match the expected real-world scenario. In fact, the realistic scenarios can aid the 
development of the routing protocols significantly. 
As future work we plan to compare other mobility models discussed above. Results obtained from 
these studies would certainly facilitate in meeting the challenges associated with future 
development and evaluation of suitable routing protocols in vehicular networks.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
181 
REFERENCES 
[1] M. Sanchez and P. Manzoni. “A java-based ad hoc networks simulator. In Proc. of the SCS 
Western Multiconference Web-based Simulation Track, Jan. 1999 
[2] A.K. Saha and D.B. Johnson, “Modeling mobility for vehicular ad hoc networks,” in ACM 
Workshop on Vehicular Ad Hoc Networks (VANET 2004), Philadelphia PA, October 2004. 
[3] U.S. Census Bureau - Topologically Integrated Geographic Encoding and Referencing (TIGER) 
system, http://www.census.gov/geo/www/tiger. 
[4] E. Huang,W. Hu, J. Crowcroft, and I.Wassell, “Towards commercial mobile ad hoc network 
applications: A radio dispatch system,” in Sixth ACM International Symposium on Mobile Ad 
Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, Illinois, May 2005 
[5] D.R. Choffnes and F.E. Bustamante, “An integrated mobility and traffic model for vehicular 
wireless networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2005), 
Cologne, Germany, September 2005. 
[6] J. Haerri, M. Fiore, F. Filali, and C. Bonnet, “Vanetmobisim: generating realistic mobility 
patterns for vanets,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los 
Angeles, California, September 2006. 
[7] VanetMobiSim.http://en.pudn.com/downloads160/sourcecode/app/detail720214_en.html 
[8] A. Mahajan, N. Potnis, K. Gopalan, and A.Wang, “Evaluation of mobility models for vehicular 
ad-hoc network simulations,” in IEEE International Workshop on Next Generation Wireless 
Networks (WoNGeN 2006), Bangalore, India, December 2006. 
[9] Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, “CityMob: a 
mobility model pattern generator for VANETs,” in the ICC 2008 workshop proceedings. 
[10] CityMob’s source code is available at http://www.grc.upv.es/ 
[11] F. Karnadi, Z. Mo, K.-C. Lan, .Rapid Generation of Realistic Mobility Models for VANET., 
Poster Session, 11th Annual International Conference on Mobile Computing and Networking 
(MobiCom 2005), Cologne, Germany, August 2005. 
[12] F. K. Karnadi, Z. H. Mo, and K. c. Lan, “Rapid generation of realistic mobility models for 
vanet,” in IEEE WCNC,2007, pp. 2506–2511. 
[13] Karnadi, F.K.; Zhi Hai Mo; Kun-chan Lan; Sch. of Comput. Sci. & Eng., New South Wales 
Univ., Sydney, NSW, “Rapid Generation of Realistic Mobility Models for VANET”. IEEE 
Xplore 
[14] MOVE http://www.cs.unsw.edu.au/klan/move/. 
[15] SUMO Simulation of Urban MObility. http://sumo.sourceforge.net/. 
[16] A. Uchiyama, .Mobile Ad-hoc Network Simulator based on Realistic Behavior Model, 6th ACM 
International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), 
Urbana Champaign, IL, USA, May 2005. 
[17] Deutsches Zentrum f¨ur Luft-und Raumfahrt e.V. (DLR). Sumo– simulation of urban mobility. 
http://sumo.sourceforge.net/. 
[18] The Network Simulator ns 2. http://www.isi.edu/nsnam/ns/index.html. 
[19] QualNet Network Simulator. http://www.scalable-networks.com/.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 
[20] Perkins, C. and Royer, E. (1999). Ad hoc On Demand Distance Vector (AODV) Routing. In 
Proceedings 2nd Workshop on Mobile Computing Systems and Applications. New Orlean s, LA, 
USA: IEEE, February 1999, pp. 90–100. 
[21] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network 
routing protocols. In Proceedings of the ACM/IEEE International Conference on Mobile 
Computing and Networking (MOBICOM), pages 85–97, 1998. 
[22] B.Boukenadil, M.Feham, “Comparison between DSR, AODV and DSDV in VANET using 
CityMob”, in Proc. the 1th International Conference on New Technologies and Communication 
(ICNTC’2012), Chlef, Algeria, 05-06 December 2012. 
[23]P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. Routing protocols for 
mobile ad-hoc networks - a comparative performance analysis. In Proceedings of the ACM/IEEE 
International Conference on Mobile Computing and Networking (MOBICOM), pages 195–206, 
1999. 
[24]The Rice University Monarch Project. Monarch extensions to the ns simulator. URL: 
182 
http://www.monarch.cs.rice.edu/. Page accessed on May 30th, 2002

Mais conteúdo relacionado

Mais procurados

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal OneRobot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal Oneijcsit
 
Study of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanetStudy of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanetAlexander Decker
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...Milad Kiaee
 
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine LearningIRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine LearningIRJET Journal
 
Scenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous DrivingScenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous DrivingYu Huang
 
Traffic assignment
Traffic assignmentTraffic assignment
Traffic assignmentMNIT,JAIPUR
 
Driving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIIIDriving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIIIYu Huang
 
Modal split analysis
Modal split analysis Modal split analysis
Modal split analysis ashahit
 
Driving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIIIDriving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIIIYu Huang
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...IOSR Journals
 
Urban transportation system - methods of route assignment
Urban transportation system - methods of route assignmentUrban transportation system - methods of route assignment
Urban transportation system - methods of route assignmentStudent
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...eSAT Journals
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...eSAT Publishing House
 
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...srinivasanece7
 

Mais procurados (19)

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal OneRobot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
 
Study of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanetStudy of statistical models for route prediction algorithms in vanet
Study of statistical models for route prediction algorithms in vanet
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
 
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine LearningIRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
IRJET- Road Recognition from Remote Sensing Imagery using Machine Learning
 
Scenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous DrivingScenario-Based Development & Testing for Autonomous Driving
Scenario-Based Development & Testing for Autonomous Driving
 
Traffic assignment
Traffic assignmentTraffic assignment
Traffic assignment
 
Driving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIIIDriving Behavior for ADAS and Autonomous Driving VIII
Driving Behavior for ADAS and Autonomous Driving VIII
 
Traffic model
Traffic modelTraffic model
Traffic model
 
Modal split analysis
Modal split analysis Modal split analysis
Modal split analysis
 
Driving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIIIDriving behaviors for adas and autonomous driving XIII
Driving behaviors for adas and autonomous driving XIII
 
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
Performance of Phase Congruency and Linear Feature Extraction for Satellite I...
 
Adamu muhammad isah
Adamu muhammad isahAdamu muhammad isah
Adamu muhammad isah
 
Urban transportation system - methods of route assignment
Urban transportation system - methods of route assignmentUrban transportation system - methods of route assignment
Urban transportation system - methods of route assignment
 
Fb4301931934
Fb4301931934Fb4301931934
Fb4301931934
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
 
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...Ieeepro techno solutions   2013 ieee embedded project  - integrated lane and ...
Ieeepro techno solutions 2013 ieee embedded project - integrated lane and ...
 

Destaque

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rswIJCNCJournal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect ofIJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesIJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
 

Destaque (19)

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Semelhante a IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION

The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...ijasuc
 
Modeling and simulation of vehicular networks
Modeling and simulation of vehicular networksModeling and simulation of vehicular networks
Modeling and simulation of vehicular networksDaisyWatson5
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityIAEME Publication
 
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdfHighway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdfduytan35
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
 
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined ModesA Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined ModesAllison Koehn
 
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...iosrjce
 
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIESMEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIEScscpconf
 
Vanet report 2020 2nd semester
Vanet report 2020 2nd semesterVanet report 2020 2nd semester
Vanet report 2020 2nd semesterSudarshiniAuradkar
 
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)IJSRD
 
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsIJORCS
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...csandit
 
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptxREVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptxNafisaBashir1
 
H046405864
H046405864H046405864
H046405864IOSR-JEN
 
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCEREVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCEAnikohAbraham
 

Semelhante a IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION (20)

The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...The realistic mobility evaluation of vehicular ad hoc network for indian auto...
The realistic mobility evaluation of vehicular ad hoc network for indian auto...
 
Modeling and simulation of vehicular networks
Modeling and simulation of vehicular networksModeling and simulation of vehicular networks
Modeling and simulation of vehicular networks
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobility
 
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdfHighway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
Highway_Mobility_and_Vehicular_Ad-Hoc_Networks_in_.pdf
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined ModesA Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
A Simulation-Based Dynamic Traffic Assignment Model With Combined Modes
 
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
Simulation of Urban Mobility (Sumo) For Evaluating Qos Parameters For Vehicul...
 
E011113336
E011113336E011113336
E011113336
 
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIESMEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
MEASURING SIMILARITY BETWEEN MOBILITY MODELS AND REAL WORLD MOTION TRAJECTORIES
 
Vanet report 2020 2nd semester
Vanet report 2020 2nd semesterVanet report 2020 2nd semester
Vanet report 2020 2nd semester
 
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)A Review on Road Traffic Models for Intelligent Transportation System (ITS)
A Review on Road Traffic Models for Intelligent Transportation System (ITS)
 
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...Effect of mobility models on the performance of multipath routing protocol in...
Effect of mobility models on the performance of multipath routing protocol in...
 
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptxREVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
REVIEW OF MICROSCOPIC TRAFFIC FLOW USING ARTIFICIAL INTELLIGENCE.pptx
 
H046405864
H046405864H046405864
H046405864
 
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCEREVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
REVIEW OF MICROSCOPIC TRAFFIC MODEL USING ARTIFICIAL INTELLIGENCE
 

Mais de IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Mais de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Último

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION Bahidja Boukenadil¹ ¹Department of Telecommunication, Tlemcen University, Tlemcen,Algeria ABSTRACT In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations. In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network. KEYWORDS VANET; Mobility Model; Simulations; Real World; MOVE; SUMO; CityMob; NS-2 etc. 1. INTRODUCTION The mobility is the principal constraint met in the vehicular networks, therefore the performance investigation of VANET network routing require the exact prediction of mobility of nodes forming the network, and this is realized by the good choice of the mobility model. Generally, the traces and the synthetic models [1] are two kinds of mobility patterns used for the simulation of networks .for simulating the complex and large scale networks that require more real world scenarios for a real modeling, the traces are used. But in several situations, these traces are created with difficulty, particularly for the networks of high mobility like the vehicular networks. In this case, the mobility of nodes (i.e., the vehicles nodes) are modeled with the synthetic patterns, these models try to really present the behavior of these environments of vehicles. A variety of synthetic mobility models for vehicular networks are discussed in Literature, some of them are presented in Section II. Section III illustrate that a mobility model has a large effect on the performance evaluation in simulation of VANET network. Finally, Section IV presents some concluding remarks. DOI : 10.5121/ijcnc.2014.6513 175
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 176 2. MOBILITY MODEL FOR VEHICULAR NETWORKS Many models of mobility can be used to generate the movement of the vehicles instead of the traces which are difficult to create in the VANET environments . However, the behavior of these networks is very complex; the drivers must react to the high change of the road conditions like the congestion, traffic jam, works in the roads. The state of the roads in turn depends on the behaviors of the drivers. Thus, the choice of the mobility model affects the relevance and viability of the obtained results. In general, vehicular traffic simulators or mobility models can be classified in two great kinds, the microscopic and macroscopic simulators. The microscopic simulator is interested in the movement of each vehicle taking part in the road traffic. In contrast the macroscopic simulators are interested in all the vehicles forming the networks; it compute road capacity and the distribution of the traffic in the road net, by determining a certain parameters like traffic density (number of vehicles per km per lane) or traffic flow (number of vehicles per hour crossing some points of interest, usually an areas with a great density of nodes) . The literature present a large variety of mobility models for VANET networks. The work of Saha and Johnson [2] model vehicular traffic in real road topologies of the maps of USA available from TIGER (Topologically Integrated Geographic Encoding) [3] database. The mobility of nodes is random.Vehicles compute the shortest path to get their destination over the graph by weighting the cost of displacement on each road on its speed limit and the traffic jam. Huang et al. [4] studied taxi behavior. In this work, a Manhattan style grid with a uniform block size is modeled. The streets of simulation area are two-way, with one lane in each direction. These lanes constrain vehicle movements. A set of parameters characterize the vehicle behavior which are preferred velocity ,maximum acceleration and deceleration, a velocity variation associated with the preferred speed at steady state and a list of preferred destinations, i.e., the taxi stands. . The taxis assigne randomly one of three preferred speeds. In the work of Choffnes et al. [5] , an integrated mobility and traffic model is conceived, named STRAW.For modeling real traffic conditions ,this model incorporates a simple car-following model with traffic control. The road map of this pattern is constructed by street plans with one lane in each direction .The vehicles move in these lanes according to a random street placement model.Each vehicle enters the map is placed behind the existing one. In [6] Haerri et al. proposed a vehicular mobility simulator for VANET networks, called VanetMobiSim [7] .The speed of vehicles for this model is determined by the use of the Intelligent Driver Model (IDM). Three different models were presented in the work of Mahajan et al. [8]: Stop Sign Model (SSM), Traffic Light Model (TLM) and Probabilistic Traffic Sign Model (PTSM).In this models All roads are two-way, with one lane in each direction for the SSM and PTSM, whereas TLM model streets with multiple lanes. An algorithm is employed to reproduce stop signs for each model. Martinez et al [9] present CityMob [10] .This mobility model generate different mobility patterns in VANETs, Simple Model (SM), Manhattan Model (MM) and Downtown Model (DM).Each model has its own characteristics,For the SM,the plan of the road is very simple, neither semaphores nor direction changes.In constract, MM and DM simulates semaphores at crossing
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 and random positions in zones with different vehicle density. CityMob allows to simulate damaged cars and tries to prevent congestions. Figure 1 present the interface of this model. Karnadi et al. [12, 13, 14] develop a tool MOVE (MObility model generator for VEhicular networks) [11] .This model provide facility for the users to generate real world scénarios in VANET environments. This model contains two editors, one for road map and the second for vehicle movement .The user can manually and automatically create the road topology or import it from existing real world maps such as Google maps. For vehicle movement, the pattern can be manually created, generated automatically or specified based on a bus time table to simulate the movements of public transportations. Figure2 shows the interface of this model. 177 Figure 1. Interface of CityMob
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 178 Figure 2: Mobility Model Generator 3. INFLUENCE OF MOBILITY MODEL IN VANET SIMULATIONS . The simulation results are greatly affected by the mobility model selected .The results presented in this section illustrate the importance of choosing a suitable mobility model for performances evaluation of routing protocols in VANET network. We use ns-2 [34] to compare the performance of the CityMob Model and the MOVE tool via a simulation.The routing of packets is accomplished with the Ad hoc On Demand Distance Vector) (AODV) [20]. We have chosen the parameters for both mobility models in a manner to simulate the same path as possible. AODV (Ad hoc On Demand Distance Vector) [1] is a reactive protocol that does route discovery when needed by a node. The route discovery process is initiated only when a source node has data traffic to send to a destination node, that makes AODV a truly On- Demand routing protocol. In our simulations, we chose AODV since it behaves well in several of the performance evaluations of the routing protocols (e.g. [21, 22, 23]).
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 The ns-2 code used in our simulations of AODV was obtained from [24]. Each simulation run lasted for 300 seconds with a uniform block size of 500 x 500 meters; the maximum speed of vehicles is of 40 m/s. The number of vehicles nodes from 15 to 100. We chose the traffic sources at a constant rate CBR (Constant Bit Rate). Traffic between nodes is generated using a traffic generator which is characterized by the following parameters: Data packets Size is 512 bytes, Interval between packets is 0.25s , maximum of packets transmitted 1000. All nodes use IEEE 802.11 MAC operating at 2Mbps. The propagation model employed in the simulation is TwoRayGround reflextion. In our comparison of the two mobility models, we consider the following performance metrics obtained from the AODV protocol: throughput, end-to-end delay and protocol overhead. 179 0 20 40 60 80 100 0,023 0,022 0,021 0,020 0,019 0,018 0,017 0,016 0,015 0,014 0,013 0,012 0,011 0,010 0,009 Move CityMob Throughput (bits/s) Number of vehicles Figure 3 : Throughput vs. number of vehicles. 0 20 40 60 80 100 0,50 0,45 0,40 0,35 0,30 0,25 0,20 MOVE CityMob Average End-to-End Delay (sec) Number of vehicles Figure 4 : End-to-end delay vs. number of vehicles.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 180 0 20 40 60 80 100 110 100 90 80 70 60 50 40 MOVE CityMob Overhead Number of vehicles Figure 5 : overhead vs. number of vehicles. Figures 3, 4 and 5 illustrate the performance (i.e., Throughput ratio, end-to-end delay and overhead) of AODV with the two mobility models chosen.The Throughput (in figure 3) of AODV when using MOVE mobility model is higher and more stable than when using CityMob model.The trace 4 shows that AODV causes a low stable delay with MOVE because the roads are more defined compared to CityMob. Figures 5 illustrate the overhead AODV required with each of the chosen mobility models. The vehicles moving with CityMob have a higher overhead, as a result this model requires a higher amount of overhead compared to MOVE.These results confirm the suitability of MOVE tool for simulating VANET. 4.CONCLUSIONS In this paper, we compared the performance of two mobility models for VANET Simulation i.e. MOVE (MObility model generator for VEhicular networks) and CityMob (City Mobility).Simulation analysis using realistic mobility model for VANET environment show that the performance of the protocol is greatly affected by the mobility model. The performance of an ad hoc network protocol can vary significantly with different mobility models then, the choice of mobility model in simulating VANET is very important.The mobility models for VANET should be most closely match the expected real-world scenario. In fact, the realistic scenarios can aid the development of the routing protocols significantly. As future work we plan to compare other mobility models discussed above. Results obtained from these studies would certainly facilitate in meeting the challenges associated with future development and evaluation of suitable routing protocols in vehicular networks.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 181 REFERENCES [1] M. Sanchez and P. Manzoni. “A java-based ad hoc networks simulator. In Proc. of the SCS Western Multiconference Web-based Simulation Track, Jan. 1999 [2] A.K. Saha and D.B. Johnson, “Modeling mobility for vehicular ad hoc networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004), Philadelphia PA, October 2004. [3] U.S. Census Bureau - Topologically Integrated Geographic Encoding and Referencing (TIGER) system, http://www.census.gov/geo/www/tiger. [4] E. Huang,W. Hu, J. Crowcroft, and I.Wassell, “Towards commercial mobile ad hoc network applications: A radio dispatch system,” in Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, Illinois, May 2005 [5] D.R. Choffnes and F.E. Bustamante, “An integrated mobility and traffic model for vehicular wireless networks,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2005), Cologne, Germany, September 2005. [6] J. Haerri, M. Fiore, F. Filali, and C. Bonnet, “Vanetmobisim: generating realistic mobility patterns for vanets,” in ACM Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los Angeles, California, September 2006. [7] VanetMobiSim.http://en.pudn.com/downloads160/sourcecode/app/detail720214_en.html [8] A. Mahajan, N. Potnis, K. Gopalan, and A.Wang, “Evaluation of mobility models for vehicular ad-hoc network simulations,” in IEEE International Workshop on Next Generation Wireless Networks (WoNGeN 2006), Bangalore, India, December 2006. [9] Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, “CityMob: a mobility model pattern generator for VANETs,” in the ICC 2008 workshop proceedings. [10] CityMob’s source code is available at http://www.grc.upv.es/ [11] F. Karnadi, Z. Mo, K.-C. Lan, .Rapid Generation of Realistic Mobility Models for VANET., Poster Session, 11th Annual International Conference on Mobile Computing and Networking (MobiCom 2005), Cologne, Germany, August 2005. [12] F. K. Karnadi, Z. H. Mo, and K. c. Lan, “Rapid generation of realistic mobility models for vanet,” in IEEE WCNC,2007, pp. 2506–2511. [13] Karnadi, F.K.; Zhi Hai Mo; Kun-chan Lan; Sch. of Comput. Sci. & Eng., New South Wales Univ., Sydney, NSW, “Rapid Generation of Realistic Mobility Models for VANET”. IEEE Xplore [14] MOVE http://www.cs.unsw.edu.au/klan/move/. [15] SUMO Simulation of Urban MObility. http://sumo.sourceforge.net/. [16] A. Uchiyama, .Mobile Ad-hoc Network Simulator based on Realistic Behavior Model, 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana Champaign, IL, USA, May 2005. [17] Deutsches Zentrum f¨ur Luft-und Raumfahrt e.V. (DLR). Sumo– simulation of urban mobility. http://sumo.sourceforge.net/. [18] The Network Simulator ns 2. http://www.isi.edu/nsnam/ns/index.html. [19] QualNet Network Simulator. http://www.scalable-networks.com/.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014 [20] Perkins, C. and Royer, E. (1999). Ad hoc On Demand Distance Vector (AODV) Routing. In Proceedings 2nd Workshop on Mobile Computing Systems and Applications. New Orlean s, LA, USA: IEEE, February 1999, pp. 90–100. [21] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network routing protocols. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 85–97, 1998. [22] B.Boukenadil, M.Feham, “Comparison between DSR, AODV and DSDV in VANET using CityMob”, in Proc. the 1th International Conference on New Technologies and Communication (ICNTC’2012), Chlef, Algeria, 05-06 December 2012. [23]P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. Routing protocols for mobile ad-hoc networks - a comparative performance analysis. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 195–206, 1999. [24]The Rice University Monarch Project. Monarch extensions to the ns simulator. URL: 182 http://www.monarch.cs.rice.edu/. Page accessed on May 30th, 2002