4,789 research outputs found
DEMO: Simulation of Realistic Mobility Model and Implementation of 802.11p (DSRC) for Vehicular Networks (VANET)
An ad hoc network of vehicles (VANET) consists of vehicles that exchange
information via radio in order to improve road safety, traffic management and
do better distribution of traffic load in time and space. Along with this it
allows Internet access for passengers and users of vehicles. A significant
characteristic while studying VANETs is the requirement of having a mobility
model that gives aspects of real vehicular traffic. These scenarios play an
important role in performance of VANETs. In our paper we have demonstration and
description of generating realistic mobility model using various tools such as
eWorld, OpenStreetMap, SUMO and TraNS. Generated mobility scenario is added to
NS-2.34 (Network Simulator) for analysis of DSR and AODV routing protocol under
802.11p (DSRC/WAVE) and 802.11a. Results after analysis shows 802.11p is more
suitable than 802.11a for VANET.Comment: 4 pages, 6 figures, International Journal of Computer Applicatio
Recommended from our members
Active networks: an evolution of the internet
Active Networks can be seen as an evolution of the classical model of packet-switched networks. The traditional and ”passive” network model is based on a static definition of the network node behaviour. Active Networks propose an “active” model where the intermediate nodes (switches and routers) can load and execute user code contained in the data units (packets). Active Networks are a programmable network model, where bandwidth and computation are both considered shared network resources. This approach opens up new interesting research fields. This paper gives a short introduction of Active
Networks, discusses the advantages they introduce and presents the research advances in this field
D’Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for protecting an individual machine: (1) cryptographic authentication of the agent’s owner, (2) resource managers that make policy decisions based on the owner’s identity, and (3) secure execution environments for each language that enforce the decisions of the resource managers. Then we discuss our planned market-based approach for protecting machine groups. Finally we consider several (partial) solutions for protecting an agent from a malicious machine.
Vehicle to Vehicle (V2V) Communication for Collision Avoidance for Multi-Copters Flying in UTM -TCL4
NASAs UAS Traffic management (UTM) research initiative is aimed at identifying requirements for safe autonomous operations of UAS operating in dense urban environments. For complete autonomous operations vehicle to vehicle (V2V) communications has been identified as an essential tool. In this paper we simulate a complete urban operations in an high fidelity simulation environment. We design a V2V communication protocol and all the vehicles participating communicate over this system. We show how V2V communication can be used for finding feasible, collision-free paths for multi agent systems. Different collision avoidance schemes are explored and an end to end simulation study shows the use of V2V communication for UTM TCL4 deployment
- …