Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

IMPROVED SELF-SCHEDULED ACCESS CONTROL FOR VEHICULAR AD

HOC NETWORKS (VANET)

ABSTRACT: safety. Mostly this is based on sensor data from


Wireless ad hoc networks are self-configuring, other cars. We could think of brake warning
dynamic networks in which nodes are free to sent from preceding car, and collision warning,
move and it forwards the data packets over the tailgate, information about road condition and,
multiple hops to the destination . Nowadays detailed regional weather forecast,
these networks are widely deployed in military maintenance,awareness about traffic jams,
applications, vehicular surveillance, and detailed information about an accident for the
disaster relief.Now, car is a formidable sensor rescue team and many other things and also the
platform, gathers the information from the updation of cars navigation systems to follow a
environment and sending it to drivers and nearby cars.
infrastructure to assist in safe navigation, Another possible category is maintenance of
pollution control and traffic management. In car. For example when car is break down it
this paper the system proposed the Enhanced send the information about your car to access the
Non-Cooperative Cognitive Division Multiple online help.So far there is no communication
Access (ENCCMA) proposal with MAC system between vehicles and between roadside
protocol.These protocols are responsible for and vehicles has been put into operation. there
active nodes. This proposed algorithm that are many application like detailed information
combines the Time Division Multiple Access about fuel prices and near by service station
(TDMA) and Frequency Division Multiple services ,infotainment for passengers includes
Access (FDMA) schemes with CR techniques chatting,gaming,etc,
to fulfill the requirements of real-time
communications. The emerging field of 2.VANET
cognitive radio (CR) networks is to alleviate the The emerging technology of Intelligent
problem of spectrum shortage by transmitting Transport Systems (ITS) has more attentions in
on other vacant portions of the spectrum. In cooperating safety systems for vehicles. To
addition, it can produce variations in spectrum avoid the road transport problems the vehicular
occupancy such as vehicles joining or leaving ad hoc networks (VANETs) and intelligent
the company. transportation systems (ITSs) are developed
through wireless communication technologies
Index terms-Wireless Ad hoc Network, by reducing traffic congestion and fuel
Enhanced Non-Cooperative Cognitive Division consumption. here the VANET is preferred by
Multiple Access ,CR, MAC,TDMA,and FDMA. combining the two techniques called FDMA and
TDMA. Generally VANET and ITS are able to
1.INTRODUCTION support both safety and non-safety applications.
Driving means changing the location constantly. Safety applications include automatic collision
This means that it demands for the information warning, bad weather detection and notification,
on the current location and data on the remote vehicle diagnostics, emergency
surrounding traffic, routes and much more. The management, and other assistances for safety
main category is driver assistance and car driving. Non-safety applications include
providing real-time traffic congestion and secondary users. Research in cognitive radio
routing information, high-speed tolling, MAC designing centers around developing
automobile high speed Internet access, vehicle efficient and robust medium access and sharing
tracking, and many others. To address those schemes to be deployed in networks with the
requirements vehicular and transportation presence of both primary and secondary users.
systems are introduced. These result in various Different from the existing methods of
types of communications and networks using opportunistic medium access in CRN's, we aim
vehicles: vehicle-to-infrastructure (V2I), to exploit the channel state information in
vehicle-to-roadside (V2R), and vehicle-to- scheduling data transmissions in a network of
vehicle (V2V) communications. The main aim is connected nodes through a competitive
to provide highly reliable and to provide the contention mechanism. Simulations show that
information to vehicles, drivers, and passengers. our changed MAC scheduling protocol for
distributed CRNs is capable of selecting
interference free links among various competing
links across the spectrum. We try to simulate the
protocol in a situation that has the presence of
both primary and secondary users, wherein
spectral opportunities available to secondary
users are limited and eclipsed by presence of
primary users. Efficient communication among
the cognitive users ultimately demands spectral
mobility and dynamic spectral sharing. Use of
channel state information makes a user self-
aware of the surroundings it is operating in and
guides it to decide its own contention schedule.
Fig1.Represents the types of vehicular Our contention mechanism is adopted from,
communication. channel aware aloha that is basically designed
for single channel, and channel aware ad-hoc
3. COGNITIVE RADIO networks.
Radio spectrum is a limited resource - contested The objective of our medium access control
by many, granted to few. The increasing demand protocol is to not only distributive choose
for this precious resource and current fixed between the competing links - ones those agree
spectrum allocation policy, have on one hand with user and spectral limitations and are
created starvation for the resource and on the obviously, better among other possible
other have led to underutilization of allocated selections, but also to embed the concepts of
spectrum. It was shown under the observation of spectral mobility and dynamic spectral usage in
the Federal Communication Commission that a wireless multihop network that has the
over 70 % of the allocated spectrum is not used presence of both primary and secondary users.
at any given time even in a crowded area where
the spectral usage is intensive. Therefore, there 4. The ENCCMA Proposal
is a call among the researchers to come up with The Enhanced Non Cooperative Cognitive
solutions that would not only solve the problem Medium Access (ENCCMA) proposal
of under usage of spectrum but also improve the represents TDMA mechanism which improves
current usage. Cognitive radio is a novel method the efficiency by guaranteeing the access delay
to solve the underutilization of the radio to ITS applications which require the real-time
spectrum. Cognitive radio users use the communications. The proposal consist of a
frequency bands allotted to licensed users, TDMA-based medium access control
whenever these bands are detected free. The mechanism. Here the signals are divided into
licensed users are often called primary users and different time slots to share the same frequency
the unlicensed opportunistic users are called channel to the user. The users transmit one after
the other each using its own time slot by analyse the result. There are different modules to
applying CR techniques to perform the outperform the proposed system
information transmission required by the  Network formation.
application. This enabled each user to learn and  Cluster formation and CH selection.
adapt to rapid changes in VANET environments.
 Path selection
another techniques used here is FDMA.
 Dynamic channel allocation
FDMA is a channel access method which offers
users an individual allocation of one or several  Performance analysis
frequency band or channels which is used in
multiple-access protocols as a channelization
protocol. The ENCCMA mechanism has been 6. Simulation results
designed to enhance the performance of the Scenario 1: This scenario shows the simple
original proposal. WSN network with mobile sinks, sensor nodes
and access nodes.
5. The ENCCMA Algorithm
The ENCCMA algorithm handles the actions of
each user.Basically, it determines the
transmission region and number and
identification.

Fig -3 Simple wireless sensor network.

Scenario 2: This scenario shows that all active


nodes broadcast their presence to the
neighboring nodes for the data transmission.

Fig2 - presents a flowchart of the ENCCMA


algorithm.
According to the ENCCMA transmission
mechanism, each transmission region is divided
into different time intervals and each user
makes use of them in a different way. Fig -4 broadcasting of nodes
The listen + transmission scheme is applied
when the selected region is the same as the one Scenario 3: The data is shared between RTU nd
in the previous iteration. First, the user sends the nodes to finding the exact location of accident
required information and listens during the vehicle. This scenario is useful to assist in safe
intervals of the region to check for the presence navigation.
of any interference and then it check the
availability of this region. Finally it allocates
the channel to access the transmission and
8. CONCLUSION
In this paper the proposed system used the
Enhanced Non-Cooperative Cognitive Division
Multiple Access (ENCCMA) proposal with
MAC protocol. This proposed algorithm that
combines the Time Division Multiple Access
(TDMA) and Frequency Division Multiple
Access (FDMA) schemes with CR techniques to
fulfill the requirements of real-time
communications. The emerging field of
cognitive radio (CR) networks is to alleviate the
Fig -2 the data is transferred by verifying that problem of spectrum shortage by transmitting on
identification. other vacant portions of the spectrum. By
having the analysis and simulation ,it is
7. SIMULATION AND RESULTS concluded that this mechanism offers only a
Along with the simulation results the throughput less throughput and less packet delay with more
and the packet delivered ratio is plotted. The packet loss.
first graph shows the throughput increases
consistently till the packet transmission take 9. FUTURE SCOPE
place and then it From this paper, it is suggested that further
maintain linearly. studies on STDMA and OFDMA must taken to
fulfilling the requirements of real-time
communications. Since STDMA does not
require slot synchronization and position
information to function.

REFERENCES
[1] Y. L. Morgan, “Notes on DSRC & WAVE
standards suite:
itsarchitecture,design,andcharacteristics,” IEEE
CommunicationsSurveys and Tutorials
,vol.12,no.4,pp.504–518,2010.
Fig –1 Throughput for packet transmission.
[2] S. A. Mohammad, A. Rasheed, and A.
This graph shows that the number of data Qayyum, “VANETarchitectures and protocols
packets received by each receiver over the stacks: a survey,” in
number of data packets sent by the source CommunicationTechnologies for
is increased . This shows that the system is Vehicles,vol.6596of Lecture Notes in
efficient. ComputerScience , pp. 95–105, Springer, 2011.

[3] CAR 2 CAR Communication Consortium


Manifesto, 2007,http://elib.dlr.de/48380/1/C2C-
CC manifesto v1.1.pdf .

[4]T.Ernst,V.Nebehaj,andR.Sør ˚asen, “CVIS:


CALM proof ofconcept preliminary results,” in
Proceedings of the 9th Interna-tional Conference
on Intelligent Transport Systems Telecommuni-
cations (ITST ’09), pp. 80–85, October 2009.
Fig 6.5The no of Packet Delivered over a Time . [5] http://www.cvisproject.org/.
[11] J. Levinson, J. Askeland, J. Becker et al.,
[6] D. Jiang and L. Delgrossi, “EEE 802.11p: “Towards fullyautonomous driving: systems and
towards an interna-tional standard for wireless algorithms,” in Proceedingsof the IEEE
access in vehicular environments,”in Intelligent Vehicles Symposium (IV ’11) , pp.
Proceedings of the 67th IEEE Vehicular 163–168,June 2011.
Technology Conference(VTC ’08), pp. 2036–
2040, May 2008. [12]C.Santos,F.Espinosa,D.Pizarro,F.Vald
´es,E.Santiso,andI.D´ıaz, “Fuzzy decentralized
[7]IEEE802.11p,“StandardforInformationtechno control for guidance of a convoyof robots in
log y—Telecom-munications and information non-linear trajectories,” in Proceedings of the
exchange between systems—Local and IEEEInternational Conference on Emerging
metropolitan area networks—Speciic Technologies and Factory
requirements.Part 11: Wireless LAN Medium Automation (ETFA ’10),pp.1–
Access Control (MAC) and 8,Bilbao,Spain,September2010.
Physical Layer (PHY) Speciications.
Amendment 6: WirelessAccess in Vehicular [13] M. Manzano, F. Espinosa,A. M. Bravo-
Environment”. Santos, E. Santiso,I. Bravo, and D. Garcia,
“Dynamic cognitive self-
[8]J.Funke,P.heodosis,R.Hindiyeh,G.Stanek,K. organizedTDMAformediumaccesscontrolinreal-
Kritatakirana,and C. Gerdes, “Up to the limits: timevehicletovehiclecommunications,”
autonomous Audi TTS,”in Proceedings of the Mathematical Problems in Engineering,vol. 2013,
Intelligent Vehicles Symposium,Alcal Article ID 574528, 13 pages, 2013.
´adeHenares, Spain, June 2012.
[[14]K. Bilstrup, E. Uhlemann, E. G. Str
[9] A. Broggi, P. Medici, E. Cardarelli, P. Cerri, A. ¨om,andU.Bilstrup,“On the
Giacomazzo, andN. Finardi, “Development of the abilityofthe802.11pMACmethodandSTDMAtos
control system for the VisLabintercontinental upportreal-time vehicle-to-vehicle
autonomous challenge,” in Proceedings of the13th communication,” EURASIP Journal onWireless
International IEEE Conference on Communications and
Intelligent TransportationSystems (ITSC Networking,vol.2009,ArticleID902414, pp.
’10) , pp. 635– 640, Madeira Island, 1687–1472, 2009.
Portugal,September 2010.
[15]K. Bilstrup, E. Uhlemann, E. G. Str¨om, and
[10] E. Onieva, J. Alonso, J. P ´erez, V. Milan U. Bilstrup,“Evaluation of the IEEE 802.11p
´es, and T. de Pedro,“Autonomous car fuzzy MAC method for vehicle-to-vehicle
control modeled by iterative geneticalgorithms,” communication,” in Proceedings of the IEEE
in Proceedings of the IEEE International 68thVehicular Technology Conference (VTC ’08)
Conferenceon Fuzzy Systems (FUZZ-IEEE ,pp.1–5,Calgary
’09),pp.1615–1620,JejuIsland,Republic of
Korea, August 2009.

You might also like