Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

P2P Computing in Design of VANET Routing Protocol

Song Haibin1, Meng Qi2, Men Aidong3


2
IEEE student member, 1,2,3School of Telecommunication Engineering,
Beijing University of Posts and Telecommunications
Rd. Xitucheng 10th, 100876, Beijing
victorymeng@gmail.com

Abstract——The study of peer-to-peer network and vehicle ad hoc In Section 2, we provides a new routing protocol for VANET
network (VANET) are currently two hotspots in distributed named PAV, which efficiently integrates P2P computing with
computing and mobile communication researching domain. By VANET routing algorithms. The Simulation is made in section
building up a P2P overlay network on top of VANET's physical 3 by comparing the overall routing performance of PAV with
infrastructure, we effectively integrated P2P network’s advantage that of AODV. Finally the conclusion is achieved in Section 4.
on sustaining highly dynamic network into the design of VANET
routing protocol. By deploying passive VANET routing algorithms
with innovative P2P routing mechanisms, we propose a new kind 2. DESIGN OF PAV PROTOCOL
of VANET routing protocol named Peer Computing based Ad hoc A. Architecture of PAV Model
On Demand Vector (PAV). A detailed description of the P2P The object of our design is to construct a new type of
decentralized naming, route discovering, route querying and VANET routing model based on P2P computing technology.
updating algorithm used in PAV is presented in this paper. The Figure 1 depicts the architecture of PAV model, which can be
simulation results indicate that PAV has an improved routing used for providing file discovery service, information
performance in comparison with the popularly used AODV administration service, file transfer service and communication
protocol. security service.
Keywords: VANET, Peer-to-Peer, Structured P2P systems File Information File Communicat
Discovery Administration Transfer ion Security
Service Service Service Service
1. INTRODUCTION
Peer-to-peer (P2P) network is currently a hotspot in the
international network researching domain [1]. Recently, P2P Computing Based VANET Routing Algorithm
different kinds of P2P network models such as Napster, Freenet
and Gnutella have already been popularly used. However, each P2P Overlay Network (Node Naming and Indexing)
of them has some open problems [2] [3]. To solve these
problems, structured P2P overlay networks (SON) such as CAN, VANET Physical Network
Chord [4], Pastry and Tapestry are proposed to provide a kind
of mechanism to improve network scalability [5]. All of these
Figure 1.Architecture of PAV Model
SON algorithms have a common ground that they all assign
keys to data and nodes through a hashing function, and at the
same time they use these keys to store and maintain data which B. Basic design
are shared in the network [6]. 1) Node naming mechanism
On the other side, nowadays mobile ad hoc network (VANET) PAV adopts the similar node naming mechanism used in
technology also draws great attention of worldwide researchers Chord and HASN. By adopting a consistent hashing algorithm
and scientists. Vehicle Ad hoc Network (VANET) has become a [9][10], PAV assigns each node an m-bit node identifier (NID)
major topic during the last few years. Within the FleetNet (N<=2m). NID is chosen by hashing the node's IP address,
project [7] a novel mobile ad hoc network will be developed to which can be used to specify the location of node in a hash ring.
interconnect vehicles and roadside gateways via a mobile When a node joins the network for the first time, a NID ranges
Internet. 1Major services, supported by FleetNet will be road from 0 to (2m-1) will be automatically assigned to it based on
traffic telematics and communication for business and the adopted hashing algorithm. In contrast to HASN, the
entertainment purposes. [8]. relationship between a key identifier (KID) and a NID is one to
Currently, the research of P2P network and vANET are one mapping. In order to simplify the routing algorithm, PAV
always taken as two separated areas. But the results of our study adopts the discontinuous naming mechanism like Chord.
indicate that there are lots of joints between these two Fig.2 depicts the node naming mechanism used in PAV,
technologies. while Fig.2 (a) depicts the physical structure of VANET and (b)
depicts the corresponding hash ring structure in the logical
namespace.

1-4244-1312-5/07/$25.00 © 2007 IEEE 1502


2) Node state
PAV routing table (PRT) has a similar structure to that of the The following concepts are related to a mobile node's PRT in
routing table in dynamic source routing protocol. The difference an m-bit namespace.
lies in that the destination node and next hop node are all
depicted by node’s NID in PAV instead of their IP addresses. • Predecessor: the first node in the counterclockwise direction of
hash ring from current node;
• Successor: the first node in the clockwise direction of hash
ring from current node;
• PRTEntry[K].start: the starting location of the ring rangethat
the Kth PRT entry covers.
HPRTEntry[k ].start = (n + 2k −1 ) mod 2m ,1 ≤ K ≤ m
(1)
• Next Hop Ring Interval (NRI): the ring range that the Kth PRT
entry covers.
NRI [k ] = [ PRTEntry[ K ].start ,
PRTEntry[ K + 1].start ],1 ≤ K ≤ M (2)
• Next Hop Identifier (NHID): the NID of the first active node
G in the clockwise direction of NRI.
PRTEntry[ K ].start → NID(G ),1 ≤ K ≤ M (3)
• Next Hop Source Route (NHSR): the source route to the
corresponding next hop node G in PRTEntry[K]. Suppose
current node is S1, NHSR satisfies the following formula.
NHSR =< S1 , S2 , S3 ,..., G > (4)
A PRT is composed of PRTEntry[K].start, NHID and NHSR.
Fig.3 depicts the structure of PRT.
24 | 0
PRTEntry[K].start NHID NHSR

F <PRTEntry X> <NHID Y> <S1, S2, …Sx>

NID=0000 A
Figure 3 The structure of PRT
NID=0001

C. PAV route discovering algorithm


B The function of PAV route discovering method is to discover
the source route to destination node reactively.
NID=1100 NID=0010
F Generally, PAV route discovering method is triggered by
mobile nodes’ route updating method under the following
status:
i. When a node initiates a route query procedure or has received
NID=0100
a route query message (RREQ), it will first query its PRT. If the
corresponding route entry is null or outdated, it will trigger
NID=1000
C route discovering method.
D ii. When a middle node in the source route returns a route error
message (RERR) to the node which initiates the data packet, the
initiating node will start the related route updating method,
which will then trigger the route discovering method.
(b). The structure of hash ring in logical namespace
PAV route discovering algorithm can be depicted as follows:
1). When a node M initiates or receives a RREQ message,
Figure 2. PAV Naming Mechanism it will firstly compare the source id and request id of the
message with those RREQ it has cached. If they are

1-4244-1312-5/07/$25.00 © 2007 IEEE 1503


matched, it means the RREQ message has been received
already, M will then discard it. Otherwise, go to step 2;
Table 1.PAV route discovering algorithm
2). M will check the Route_record of RREQ message to
verify whether it contains NID(M). If it does, M will
discard the message. Otherwise, go to step 3; D: destination node id;
3). M will check whether destination node belongs to the
PRT entries. If it does, go to step 5; otherwise, go to step 6; When vehicle M initiates a Route_Request or receives
4). M will check whether destination node is M itself. If it Route_Request_Packet{
is, go to step 5; otherwise go to step 6; //To avoid processing duplicate packets
5). M will check whether the communication channel is If(<source NID, req_id> ∈ (Taken RREQ[])) then
bi-directional. If it is, M will return route reply message { discard the packet;}
(RREP) to the query initiating node S directly. Otherwise, Else if (NID (current_node) ∈ Route_Record[])) then
M will trigger route discovering method to discover source { discard the packet;}
route to S and then return RREP to S; Else {Pick up D from RREP packet;}
6). M will add itself into the Route_Record, and broadcast //Optimized method: return RREP directly from PRT
the RREQ message to its neighbors. If (D ∈ NHID[]) then {return RREP_Hit;}
D. PRT querying algorithm Else if (D== NID(current)) then {
PRT querying algorithm can be depicted as follows: If (the link is bi-directional) {return RREP_Hit;}
1). When a node M initiates or receives a RREQ message, Else{Create Route_Request packets to find Sender;}
it will firstly compare the destination node id of RREQ
}
with NID(M). If they are matched, M will return RREP to
querying initiating node S. Otherwise, go to step 2; //M is between Sender and Destination
2). M will n node id (D) with PRT entries to find the NRI Else{
which D belongs to. If the PRT entry is found, M will Append NID(M) in Route_Record[] and broadcast RREQ
compare D with the corresponding NHID. If D > Packets;}}
PRTEntry[i]. NHID then transfer the message to the }
corresponding next hop node. Otherwise go to 3.
3). M will trigger route discovering method for destination
node D and wait for response. If the source route to D is E. PAV route maintenance algorithm
returned, M will update the NHID and NHSR of the PRT 1) Mobile Node Join and Depart
entry with D and source route to D, respectively. At the Due to the highly dynamic character, mobile nodes may
same time, M will return a RREP message to S. Otherwise, join and leave the network at any time. To save the route
M will return a query failure message to S. maintenance cost, when a node joins the network, PAV
4). During the process, each time a node M queries its will not initialize its PRT. On the contrary, the node will
route table, it will pick up the PRT entry whose NRI is construct its PRT on demand.
closest to D. And by comparing D with the corresponding The node join procedure can be depicted as follows:
NHID, M will determine whether it should trigger the route i. Node M will firstly choose a member node B as its
discovering process for D. If it is unnecessary to trigger a bootstrap node. And B must satisfy the following criterion:
route discovering process, M will transfer the RREQ A) B is inside M's transmitting scope, or we can say B is a
message to next hop node in the PRT entry. This process neighbor of M; B) Among all M's neighbors, B has a NID
goes on until a RREP is returned. which is closest to M's.
To sum up, PRT querying algorithm performs the ii. M will find its successor S on hash ring by the help of B.
following two functions: iii. M will get information of S's predecessor P. Then M
i. Route the RREQ message according to the PRT cached will send a join message to both P and S. when they
by each node.search into the PRT and compare destinatio receive the message, P will update its successor with M
ii. Update the outdated PRT entries cached by each node and S will update its predecessor with M. Till now, the
reactively. integrity of hash ring is guaranteed.
iv. M will then construct and update its PRT entries
reactively. And the triggering event is the corresponding
PRT entry querying procedure.
v. PAV classifies node departure event into two types:

1-4244-1312-5/07/$25.00 © 2007 IEEE 1504


a QREP to its neighbors. The node which has received
Table 2. PRT querying algorithm QREP will act as the triggering node of route updating
process.
• As for a data packet’s transferring failure, which will be
PRTEntry[i]: the ith entry in PAV routing table caused by nodes’ abnormal departure or movement, the
(PRT), 1 ≤ i ≤ M; node who initiates the data packet will act as the triggering
node of route updating process.
D: destination node id;
PAV route updating algorithm can be depicted as
When vehicle M initiates a Rout_Request or receives follows:
Route_Request_Packet i. As for condition II, the node N who initiates the data
{ packet will broadcast a route overdue message into the
Pick up D from RREP packet; network. And those related nodes will delete the outdated
If (D∈ NID(current_node)) then { PRT entries accordingly. Then go to step 2. As for
Return RREP_Hit;} condition I, go to step 4.
Else {// search in PRT ii. N will trigger a route discovering process for the
For k=1 to M { destination node. If the destination node is found and a
If ((D∈ [PRTEntry[i].start, PRTEntry[i+1].start]) & RREP is returned, N will update the outdated source route
(D> NHID[i] )){ forward to NHID[i];} in PRT with the currently discovered one.
Else {Invoke Route Discovery for D; iii.If the route discovering process ends with a failure result,
Wait for Reply; this denotes that the destination node may be down or has
If (Source route to D is Found) already left the network. In such a condition, N will
{ terminate the route discovering process and mark the
Update PRTEntry[i].NHID with NID(D); destination node as invalid. Then go to step 4.
Update PRTEntry[i].NHSR with Source iv.The triggering node will broadcast the destination node
route to D; invalid message into the network, the predecessor and
Return RREP_Hit;} successor of the invalid node will update their successor
Else{return RREP_Failed;} }} and predecessor after they receive the message,
respectively.
}}
Till now, the integrity of hash ring is guaranteed.
Other related nodes will then delete the outdated entries
from their local PRT after they receive the message.

vi. Normal departure: nodes leave the system deliberately. 3. SIMULATION OF PAV MODEL
vii. Abnormal departure: nodes leave the system without H. Simulation environment
any signs. 1). Simulation parameters:
To reduce route maintenance overhead, PAV takes no Simulation is done with fifty nodes within a
action for a mobile node's abnormal departure. As for a 1000m*1000m space. The physical parameters of each
node’s normal departure, PAV will take the following node can be depicted as follows:
actions: • Antenna is a full-direction antenna with a height of 1.5
The quitting node will firstly send a QREQ to its meter, the reception and transmission increments are both
predecessor P and successor S. When S and P receive the 1.0 dB.
message, S will update its predecessor as P and P will • The bandwidth of wireless radio is 2 Mb/s, which adopts
update its successor as S. Till now, the integrity of hash a two-path channel model.
ring is guaranteed. • The transmission power is 17.6 mw and the radius of
2) PAV route updating algorithm wireless radio broadcasting scope is 110 meters.
As a VANET routing protocol, PAV must handle the 2). Mobile model:
problem of nodes’ mobility. In VANET, a node’s position Fifty nodes are randomly distributed in the simulation
is changing with time, which leads to the dynamic network scope. And each node performs a Brown movement during
topology. When a destination node is out of reach, this may the simulation period. Besides these, we adopt the
be caused by some corresponding nodes’ normal or traditional pause time (PT) to define the mobile character
abnormal departure, or some nodes have move out of of our model. At the beginning of simulation, a node keeps
transmitting scope of others. Once this happens, PAV will static for a PT.
trigger routing updating algorithm reactively. Then it will randomly choose a destination node and
Generally, there are two kinds of triggering event: move toward it with a certain aped. When it arrives, the
• As for a mobile node’s normal departure, it will broadcast node will keep static for a PT and then choose a node as

1-4244-1312-5/07/$25.00 © 2007 IEEE 1505


the next destination. This process will be repeated till the contrary, PAV improves the route discovery efficiency by
simulation ends. We choose for different values of PT: 1, building up a P2P overlay network on VANET’s physical
60, 120, 180 and 360. topology and introducing PRT to accelerate the route
3). Service model: discovery process.But due to the detouring problem, the
In order to simulate the network services’ influence on AED of PAV is still relatively high.
PAV’s performance, we randomly choose 20 pairs of
nodes to transmit CBR packets to each other. The CBR 400
packets are 128 bytes packets with a transmission rate of 4 350 AODV

Average Delay(ms)
packets per second. PAV
300
4). MAC layer:
A distributed coordination function (DCF) 250
mechanism is adopted in MAC layer. 200
I. Performance results
150
1). Packet Deliver Ratio (PDR)
Packet deliver ratio is an important criterion in 100
estimating a routing protocol’s performance in how well it 50
adapts to the change of network topology and how efficient 0 50 100 150 200 250 300 350 400
it provides a route discovery. Figure 7 depicts the Pause time(s)
relationship of PDR in PAVand AODV with PT.
As we can see in figure 4, the probability of link failure Figure 5. The comparison of AED between AODV and
between nodes and route failure decreases when the PAV
mobility of nodes decreases. The success rate and stability
of packet transmission in PAV is much better than those in 3). Node Storage Overhead (NSO)
AODV. The reason is that PAV has improved the node Node Storage Overhead is an important criterion in
discovery and packet delivery performance by taking estimating how much extra storage overhead that the
advantages of structures P2P routing mechanisms. routing protocol puts on each node. Figure 6 depicts the
However, the caching mechanism adopted in AODV is the relationship of NSO in PAV and AODV with the number
origin of its problem in providing out-of-time network of nodes in the network.
status and its low Packet deliver ratio. As we can see in figure 6, the cached routes for a mobile
node in AODV are in a direct proportion to the number of
0.92 nodes in network. That is to say, as for a VANET with N
0.90
Packet deliver ratio

nodes, the cached routes for each node is O(N). On the


0.88
contrary, by implementing structured P2P routing
0.86
mechanism, the relationship of cached routes for each node
0.84
0.82
in PAV with the number of nodes is O(logN). By doing
0.80
this, PAV effectively decreases the route storage overhead
0.78 AODV for each node, and at the same time it decreases the route
0.76 PAV discovery and maintenance overhead related to these
0.74 cached routes as well.
0.72
0 50 100 150 200 250 300 350 400
Pause time(s)

Figure 4 The comparison of PDR between AODV and


PAV

2). Average End-to-end Delay (AED)


Average end-to-end delay is an important criterion in
estimating a routing protocol’s performance in how
efficient and fast it provides a route discovery. Figure 5
depicts the relationship of AED in PAV and AODV with
PT.
As we can see in figure 5, due to the broadcasting based
routing discovery mechanism, it takes AODV longer time
to rediscover route when current path is failed. On the

1-4244-1312-5/07/$25.00 © 2007 IEEE 1506


protocols operating in a logical namespace with those of
700 VANET routing protocols operating in a physical
namespace. By this means, PAV has inherited all the
600
advantages of P2P networking technology in sustaining
Overhead(Bytes)

500 highly dynamic networks and maintaining network


Node Storage

scalability. Besides these, PAV introduces a series of


400 optimizing mechanisms to solve the detouring problem of
AODV structured P2P overlay network and to further improve
300 PAV routing efficiency. The simulation results indicate that the
overall routing performance of PAV is remarkably better
200 over AODV.
100
[1] L. Z. Granville, D. A. Panisson, C. Melchiors, M.
0
Janilce B. Almeida, "Managing computer networks using
0 10 20 30 40 50 60 peer-to-peer technologies,", IEEE Communications
Node number Magazine, Vol. 43, No. 10, October 2005.
Figure 6. The comparison of NSO between AODV and [2] J. Xu, "On the fundamental tradeoffs between routing
PAV table size and network diameter in peer-to-peer networks,"
4). Routing Overhead (RO) IEEE INFOCOM, 2003 - The Conference on Computer
Routing Overhead is an important criterion in estimating Communications, Vol. 22, No. 1, Mar 2003, pp.
a routing protocol’s efficiency. Figure 10 depicts the 2177-2187.
relationship of RO in PAV and AODV with PT. As we can [3] S. Sen and J. Wang, "Analyzing peer-to-peer traffic
see in figure 7, the number of route packets in AODV is across large networks," IEEE/ACM Transactions on
huge due to the number of cached routes for each node is Networking, Vol. 12, No. 2, Apr 2004, pp. 219-232. [4] I.
huge as well (the number of cached routes for each node in Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F.
AODV has a relationship of O(N) with node number N). Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: A
The route maintenance and update processes caused by scalable peer-to-peer lookup protocol for internet
these cached routes consume lots of network bandwidth applications," IEEE/ACM Transactions on Networking,
and decrease the performance of AODV. On the contrary, Vol. 11, No. 1, Feb 2003, pp. 17-32.
PAV improves the routing performance by introducing [5] J. Xu, A. Kumar, and X. Yu, "On the fundamental
structured P2P overlay network technology and limiting tradeoffs between routing table size and network diameter
the number of cached routing within O(logN). in peer-to-peer networks," IEEE Journal on Selected Areas
in Communications, Vol. 22, No. 1, Jan 2004, pp. 151-163.
4500 [6] S. Jain, R. Mahajan, and D. Wetherall, "A study of the
Routing Overhead(packets)

4000 performance potential of DHT-based overlays," 4th


AODV USENIX Symposium on Internet Technologies and Systems
3500 PAV
(USITS 2003), March 2003.
3000 [7] H. Hartenstein, et al., “Position-Aware Ad Hoc
2500 Wireless Networks for Inter-Vehicle Communications: the
2000 FleetNet Project“, in Proc. ACM MobiHOC 2001, Long
1500 Beach, USA, Oct. 2001.
1000
[8]S. Jiang, Y. Liu, Y. Jiang, and Q. Yin, "Provisioning of
adaptability to variable topologies for routing schemes in
500
MANETs," IEEE Journal on Selected Areas in
0 50 100 150 200 250 300 350 400
Communications, Vol. 22, No. 7, Sep 2004, pp. 1347-1356.
Pause time(s) [9] J. Mischke and B. Stiller, "Efficient protocol
Figure 10. The comparison of RO between AODV and specification and implementation for a highly scalable
PAV peer-to-peer search infrastructure," NOMS 2004 -
IEEE/IFIP Network Operations and Management
4. CONCULUSION Symposium, Vol. 9, No. 1, Apr 2004, pp. 411-424.
Based on the study of synergies between P2P network [10] A. Duran and C.-C. Shen, "Mobile ad hoc P2P file
and VANET, we propose a new type of VANET routing sharing," WCNC 2004 - IEEE Wireless Communications
protocol named PAV. By building up a P2P overlay and Networking Conference, Vol. 5, No. 1, March 2004, pp.
network on top of VANET's physical infrastructure, PAV 114-119.
seamlessly integrates the functions of p2p overlay routing

1-4244-1312-5/07/$25.00 © 2007 IEEE 1507

You might also like