Professional Documents
Culture Documents
P2P Computing in Design of VANET Routing Protocol
P2P Computing in Design of VANET Routing Protocol
Abstract——The study of peer-to-peer network and vehicle ad hoc In Section 2, we provides a new routing protocol for VANET
network (VANET) are currently two hotspots in distributed named PAV, which efficiently integrates P2P computing with
computing and mobile communication researching domain. By VANET routing algorithms. The Simulation is made in section
building up a P2P overlay network on top of VANET's physical 3 by comparing the overall routing performance of PAV with
infrastructure, we effectively integrated P2P network’s advantage that of AODV. Finally the conclusion is achieved in Section 4.
on sustaining highly dynamic network into the design of VANET
routing protocol. By deploying passive VANET routing algorithms
with innovative P2P routing mechanisms, we propose a new kind 2. DESIGN OF PAV PROTOCOL
of VANET routing protocol named Peer Computing based Ad hoc A. Architecture of PAV Model
On Demand Vector (PAV). A detailed description of the P2P The object of our design is to construct a new type of
decentralized naming, route discovering, route querying and VANET routing model based on P2P computing technology.
updating algorithm used in PAV is presented in this paper. The Figure 1 depicts the architecture of PAV model, which can be
simulation results indicate that PAV has an improved routing used for providing file discovery service, information
performance in comparison with the popularly used AODV administration service, file transfer service and communication
protocol. security service.
Keywords: VANET, Peer-to-Peer, Structured P2P systems File Information File Communicat
Discovery Administration Transfer ion Security
Service Service Service Service
1. INTRODUCTION
Peer-to-peer (P2P) network is currently a hotspot in the
international network researching domain [1]. Recently, P2P Computing Based VANET Routing Algorithm
different kinds of P2P network models such as Napster, Freenet
and Gnutella have already been popularly used. However, each P2P Overlay Network (Node Naming and Indexing)
of them has some open problems [2] [3]. To solve these
problems, structured P2P overlay networks (SON) such as CAN, VANET Physical Network
Chord [4], Pastry and Tapestry are proposed to provide a kind
of mechanism to improve network scalability [5]. All of these
Figure 1.Architecture of PAV Model
SON algorithms have a common ground that they all assign
keys to data and nodes through a hashing function, and at the
same time they use these keys to store and maintain data which B. Basic design
are shared in the network [6]. 1) Node naming mechanism
On the other side, nowadays mobile ad hoc network (VANET) PAV adopts the similar node naming mechanism used in
technology also draws great attention of worldwide researchers Chord and HASN. By adopting a consistent hashing algorithm
and scientists. Vehicle Ad hoc Network (VANET) has become a [9][10], PAV assigns each node an m-bit node identifier (NID)
major topic during the last few years. Within the FleetNet (N<=2m). NID is chosen by hashing the node's IP address,
project [7] a novel mobile ad hoc network will be developed to which can be used to specify the location of node in a hash ring.
interconnect vehicles and roadside gateways via a mobile When a node joins the network for the first time, a NID ranges
Internet. 1Major services, supported by FleetNet will be road from 0 to (2m-1) will be automatically assigned to it based on
traffic telematics and communication for business and the adopted hashing algorithm. In contrast to HASN, the
entertainment purposes. [8]. relationship between a key identifier (KID) and a NID is one to
Currently, the research of P2P network and vANET are one mapping. In order to simplify the routing algorithm, PAV
always taken as two separated areas. But the results of our study adopts the discontinuous naming mechanism like Chord.
indicate that there are lots of joints between these two Fig.2 depicts the node naming mechanism used in PAV,
technologies. while Fig.2 (a) depicts the physical structure of VANET and (b)
depicts the corresponding hash ring structure in the logical
namespace.
NID=0000 A
Figure 3 The structure of PRT
NID=0001
vi. Normal departure: nodes leave the system deliberately. 3. SIMULATION OF PAV MODEL
vii. Abnormal departure: nodes leave the system without H. Simulation environment
any signs. 1). Simulation parameters:
To reduce route maintenance overhead, PAV takes no Simulation is done with fifty nodes within a
action for a mobile node's abnormal departure. As for a 1000m*1000m space. The physical parameters of each
node’s normal departure, PAV will take the following node can be depicted as follows:
actions: • Antenna is a full-direction antenna with a height of 1.5
The quitting node will firstly send a QREQ to its meter, the reception and transmission increments are both
predecessor P and successor S. When S and P receive the 1.0 dB.
message, S will update its predecessor as P and P will • The bandwidth of wireless radio is 2 Mb/s, which adopts
update its successor as S. Till now, the integrity of hash a two-path channel model.
ring is guaranteed. • The transmission power is 17.6 mw and the radius of
2) PAV route updating algorithm wireless radio broadcasting scope is 110 meters.
As a VANET routing protocol, PAV must handle the 2). Mobile model:
problem of nodes’ mobility. In VANET, a node’s position Fifty nodes are randomly distributed in the simulation
is changing with time, which leads to the dynamic network scope. And each node performs a Brown movement during
topology. When a destination node is out of reach, this may the simulation period. Besides these, we adopt the
be caused by some corresponding nodes’ normal or traditional pause time (PT) to define the mobile character
abnormal departure, or some nodes have move out of of our model. At the beginning of simulation, a node keeps
transmitting scope of others. Once this happens, PAV will static for a PT.
trigger routing updating algorithm reactively. Then it will randomly choose a destination node and
Generally, there are two kinds of triggering event: move toward it with a certain aped. When it arrives, the
• As for a mobile node’s normal departure, it will broadcast node will keep static for a PT and then choose a node as
Average Delay(ms)
packets per second. PAV
300
4). MAC layer:
A distributed coordination function (DCF) 250
mechanism is adopted in MAC layer. 200
I. Performance results
150
1). Packet Deliver Ratio (PDR)
Packet deliver ratio is an important criterion in 100
estimating a routing protocol’s performance in how well it 50
adapts to the change of network topology and how efficient 0 50 100 150 200 250 300 350 400
it provides a route discovery. Figure 7 depicts the Pause time(s)
relationship of PDR in PAVand AODV with PT.
As we can see in figure 4, the probability of link failure Figure 5. The comparison of AED between AODV and
between nodes and route failure decreases when the PAV
mobility of nodes decreases. The success rate and stability
of packet transmission in PAV is much better than those in 3). Node Storage Overhead (NSO)
AODV. The reason is that PAV has improved the node Node Storage Overhead is an important criterion in
discovery and packet delivery performance by taking estimating how much extra storage overhead that the
advantages of structures P2P routing mechanisms. routing protocol puts on each node. Figure 6 depicts the
However, the caching mechanism adopted in AODV is the relationship of NSO in PAV and AODV with the number
origin of its problem in providing out-of-time network of nodes in the network.
status and its low Packet deliver ratio. As we can see in figure 6, the cached routes for a mobile
node in AODV are in a direct proportion to the number of
0.92 nodes in network. That is to say, as for a VANET with N
0.90
Packet deliver ratio