SlideShare una empresa de Scribd logo
1 de 36
Adaptive dissemination of safety 
data among vehicles 
Chisalita, I. 、Shahmehri, N. 
Personal, Indoor and Mobile Radio Communications, 2006 IEEE 17th International Symposium on 
11-14 Sept. 2006 
KUAN-YU, CHEN 
stu9458@gmail.com
Outline 
• Introduction 
– Challenge 
• Related work 
• Protocol overview 
• Basic safety messages dissemination 
• Evaluation 
• Concluding remarks 
2014/10/29 2
Introduction(1/3) 
• An adaptive approach to dissemination of 
safety data among vehicles. 
• Support the driver in dangerous traffic 
situations. 
• Avoid the occurrence of such 
situations(collision warning and collision 
avoidance). 
2014/10/29 3
Introduction(2/3) 
• Challenge 
– Specific properties of the traffic environment. 
– The strict requirements of safety applications. 
• Vehicles that are not in each other 
communication range may need to exchange 
data. 
– Forwarding information. 
• Vehicles that send their data may not be aware 
of the receivers that will make use of it 
– Filtering of information. 
2014/10/29 4
Introducton(3/3) 
• The protocol makes use of contextual information 
for sustaining inter-vehicle communication 
adaptable to the current traffic situation. 
2014/10/29 5
Related work(1/4) 
• Three main area about communication 
– Group membership in vehicular networks 
– Medium access control(MAC) schemes 
– Traffic data dissemination. 
2014/10/29 6
Related work(2/4) 
• Various routing protocols have been 
proposed for data dissemination in ad-hoc 
networks 
• Protocols are less applicable to safety 
vehicular communication. 
• Require the establishment of routes to a 
given destinations. 
2014/10/29 7
Related work(3/4) 
• Protocols followed a reactive approach, 
where notifications are sent when vehicles 
detect hazards in traffic. 
• Takes a proactive approach where vehicles 
are regularly informed about the traffic 
situation. 
• Used for predicting the occurrence of 
dangerous situations. 
• e.g. Vehicle suddenly breaks down. 
2014/10/29 8
Related work(4/4) 
• DSRC (Dedicated Short Range Communication) 
– Specifies the MAC layer, the link layer and the radio 
layer for vehicular communication systems. 
– Vehicle-to-road 、Vehicle-to-vehicle 
– Augment DSRC functionality when providing safety 
services. 
2014/10/29 9
Outline 
• Introduction 
– Challenge 
• Related work 
• Protocol overview 
• Basic safety messages dissemination 
• Evaluation 
• Concluding remarks 
2014/10/29 10
Protocol overview(1/7) 
Problem 
• A large number of communicating hosts may 
tend to exchange data. 
• Produce a heavy load on the communication 
channel. 
• Difficulties in accessing the transmission medium 
and packet collisions. 
• Apply two techniques for controlling the 
dissemination of safety information. 
2014/10/29 11
First(1/2) 
• Define an organization of the vehicles in virtual 
clusters 
– limited in space and in composition. 
• Research in traffic safety has indicated that a 
vehicle can not extensively benefit by having data 
about a large number of vehicles. 
• imposed a 300 meters as the cluster size. 
2014/10/29 12
First(2/2) 
• Impact of the cluster size on the communication 
performance. 
– maximum number of members is 20. 
• The data is importance.(remain) 
– The sender be registered in cluster. 
• If this does not happen, the data describing the 
respective vehicle is removed. 
2014/10/29 13
Second 
• An anonymous context-based broadcast. 
• Receivers need to determine the data if they are 
the intended destination of this data. 
• Context-based filtering. 
– Based on a set of rules defined using research results 
in crash analyses. 
– Guidelines for developing active safety systems 
2014/10/29 14
Protocol overview(2/7) 
• Basic Safety Messages (BSM) 
Host identity Message sequence number 
Message type Vehicle velocity 
Vehicle positions(Two consecutive 
Vehicle heading 
indications) 
Vehicle status and size Road identity* 
Road type* Road slipperiness* 
Speed limit* Number of members 
Cluster members identities Other information 
2014/10/29 15
Protocol overview(3/7) 
• send error 
– BSMs are issued at regular time intervals. 
– BSM can not be transmitted and a new one is 
generated, the older BSM is removed and the new one 
is inserted into the buffer. 
• Forwarded 
– Same cluster may not directly receive data about each 
other. 
– Packet collision, shadowing or medium access 
– Filtering 
2014/10/29 16
Protocol overview(4/7) 
• VA runs a matching algorithm to determine if 
these hosts may have interest in VB’s data. 
– The process ends if such a host if found. 
VB 
VA 
Host 
2014/10/29 17
Protocol overview(5/7) 
• Produces a peak-load on the channel and can 
reduce communication performance 
• Before forwarding a BSM, a host waits an amount 
of time randomly selected between 0 and the 
transmission rate of BSMs. 
2014/10/29 18
Protocol overview(6/7) 
• Filtering and forwarding. 
– Using a context-based technique. 
• Traffic Postulates 
– P1: The vehicles in close proximity have important 
data. Their number is limited 
– P2: Vehicles in front and behind traveling on the same 
road and in the same direction have data of interest. 
– P3: Vehicles coming from an opposite direction can 
constitute a danger on undivided roads. 
– P4: Vehicles can collide if they arrive at an intersection 
at the same time. 
2014/10/29 19
Protocol overview(7/7) 
• Inclusion rule 
– (I1) The Euclidean distance between sender and 
receiver is less than SAT ± ΔD. (ΔD is a hysterezis 
threshold) 
• Regular rules 
– (R1)The sender and the receiver are traveling on the 
same road AND have similar heading. 
– (R2) The sender and the receiver are on the same 
undivided road AND have different headings AND the 
sender is ahead of the receiver. 
– (R3) The sender and the receiver are traveling on 
different roads AND a route contention is detected. 
2014/10/29 20
Outline 
• Introduction 
– Challenge 
• Related work 
• Protocol overview 
• Basic safety messages dissemination 
• Evaluation 
• Concluding remarks 
2014/10/29 21
Basic safety messages 
dissemination(1/3) 
• Providing vehicles with up-to-date traffic 
information in a regular manner can be 
performed using two approaches. 
• First 
– The constant rate approach, where BSMs are sent 
at fixed regular intervals. 
– The analysis indicated a rate of 10 BSMs/second 
as appropriate 
2014/10/29 22
Basic safety messages 
dissemination(2/3) 
• Second 
– Adaptive approach 
– General enough as to accommodate a large 
diversity of situations. 
– Velocities of the vehicles and the traffic density. 
2014/10/29 23
Basic safety messages 
dissemination(3/3) 
• vehicles velocity 
– Residential areas, 30 to 50 km/h 
– On country roads, 70 to 100 km/h 
– Highway, 100 to 150 km/h 
2014/10/29 24
Evaluation(1/10) 
• GloMoSim v2.3 
• Evaluation 
– BSMs delivery delay 
– packet collisions 
– send errors 
2014/10/29 25
Evaluation(2/9) 
2014/10/29 26
Evaluation(3/10) 
• BSMs delivery delay 
– The efficiency of information filtering was 
measured by the information filtering rate. 
– the ratio between accepted BSMs and received 
BSMs. 
• packet collisions 
– The collisions were normalized with the number 
of BSMs correctly received. 
• send errors 
– Number of BSMs issued by a host. 
2014/10/29 27
Evaluation(4/10) 
• System bandwidth,10 - 2000 kbps. 
• Communication service area or cluster size, 50 
- 600 m. 
• Network load, 6 – 20 vehicles/km/lane. 
• Vehicles mobility, 10 - 40 m/s. 
2014/10/29 28
Evaluation(5/10) 
Propagation model Two-ray 
Channel AWGN and Rician fading 
Radio model Based on IEEE 802.11 
Frequency 2.4GHz and 5.9 GHz 
MAC scheme Non-persistent CSMA 
Transmission Power 12 dBm (i.e. ~317m range) 
BSM size 112 bytes 
2014/10/29 29
Evaluation(6/10) 
• BSMs delay as a function of load density 
2014/10/29 30
Evaluation(7/10) 
• Packet collisions as a function of mobility 
2014/10/29 31
Evaluation(8/10) 
• Information filtering rate under mobility 
2014/10/29 32
Evaluation(9/10) 
• Send errors as a function of load density 
2014/10/29 33
Evaluation(10/10) 
• The extended version of the protocol 
considerably outperformed the basic version 
in most of the tests. 
• Areas of improvements 
– Efficient information filtering. 
– Forwarding techniques. 
– Better MAC schemes. 
2014/10/29 34
Concluding remarks(1/2) 
• Propose a protocol that makes use of 
contextual information for controlling the 
vehicular communication. 
• Future work will focus on improvements of 
the protocol. 
2014/10/29 35
Concluding remarks(2/2) 
• The development of a prototype system using 
on-market devices (e.g. 802.11 WLAN cards or 
DSRC transceivers when these will be available) 
is intended. 
2014/10/29 36

Más contenido relacionado

La actualidad más candente

Qos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
Qos Enabled Communication Support over Multicast Ad Hoc Networks: An OverviewQos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
Qos Enabled Communication Support over Multicast Ad Hoc Networks: An OverviewIJERA Editor
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
TDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsTDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsMichele Weigle
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
 
1705.01235
1705.012351705.01235
1705.01235Faw Yas
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)IRJET Journal
 
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621Edinaldo La-Roque
 
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeIOSR Journals
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
 
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...IJECEIAES
 

La actualidad más candente (17)

Qos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
Qos Enabled Communication Support over Multicast Ad Hoc Networks: An OverviewQos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
Qos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
TDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETsTDMA Slot Reservation in Cluster-Based VANETs
TDMA Slot Reservation in Cluster-Based VANETs
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsns
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
1705.01235
1705.012351705.01235
1705.01235
 
Congestion control
Congestion controlCongestion control
Congestion control
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
A novel centralized tdma
A novel centralized tdmaA novel centralized tdma
A novel centralized tdma
 
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621
UFPA_Artigo_AICT_2015_Edinaldo_La-Roque_20150621
 
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
 
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
Enhanced exponential rule scheduling algorithm for real-time traffic in LTE n...
 
Mac
MacMac
Mac
 

Destacado

車用通信報告
車用通信報告車用通信報告
車用通信報告冠宇 陳
 
Stm32 develop tool introduction
Stm32 develop tool introductionStm32 develop tool introduction
Stm32 develop tool introduction冠宇 陳
 
第三章Ti msp430平台介紹 v3
第三章Ti msp430平台介紹 v3第三章Ti msp430平台介紹 v3
第三章Ti msp430平台介紹 v3冠宇 陳
 
Based on raspberry pi with the application of Stepper
Based on raspberry pi with the application of StepperBased on raspberry pi with the application of Stepper
Based on raspberry pi with the application of Stepper冠宇 陳
 
The design of electronic license plate recognition terminal system based on n...
The design of electronic license plate recognition terminal system based on n...The design of electronic license plate recognition terminal system based on n...
The design of electronic license plate recognition terminal system based on n...冠宇 陳
 
第二周課程 Arduino介紹
第二周課程 Arduino介紹第二周課程 Arduino介紹
第二周課程 Arduino介紹冠宇 陳
 
2014暑期訓練之Linux kernel power
2014暑期訓練之Linux kernel power2014暑期訓練之Linux kernel power
2014暑期訓練之Linux kernel power冠宇 陳
 
Verilog 語法教學
Verilog 語法教學 Verilog 語法教學
Verilog 語法教學 艾鍗科技
 
簡介 GitHub 平台
簡介 GitHub 平台簡介 GitHub 平台
簡介 GitHub 平台Will Huang
 

Destacado (10)

車用通信報告
車用通信報告車用通信報告
車用通信報告
 
Stm32 develop tool introduction
Stm32 develop tool introductionStm32 develop tool introduction
Stm32 develop tool introduction
 
第三章Ti msp430平台介紹 v3
第三章Ti msp430平台介紹 v3第三章Ti msp430平台介紹 v3
第三章Ti msp430平台介紹 v3
 
Densebox
DenseboxDensebox
Densebox
 
Based on raspberry pi with the application of Stepper
Based on raspberry pi with the application of StepperBased on raspberry pi with the application of Stepper
Based on raspberry pi with the application of Stepper
 
The design of electronic license plate recognition terminal system based on n...
The design of electronic license plate recognition terminal system based on n...The design of electronic license plate recognition terminal system based on n...
The design of electronic license plate recognition terminal system based on n...
 
第二周課程 Arduino介紹
第二周課程 Arduino介紹第二周課程 Arduino介紹
第二周課程 Arduino介紹
 
2014暑期訓練之Linux kernel power
2014暑期訓練之Linux kernel power2014暑期訓練之Linux kernel power
2014暑期訓練之Linux kernel power
 
Verilog 語法教學
Verilog 語法教學 Verilog 語法教學
Verilog 語法教學
 
簡介 GitHub 平台
簡介 GitHub 平台簡介 GitHub 平台
簡介 GitHub 平台
 

Similar a Adaptive Safety Data Dissemination Vehicles

VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...IJCSEA Journal
 
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...ijmnct
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
VEHICULAR 2020 Presentation by Kohei Hosono
VEHICULAR 2020 Presentation by Kohei HosonoVEHICULAR 2020 Presentation by Kohei Hosono
VEHICULAR 2020 Presentation by Kohei HosonoKohei Hosono
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodologyJumpingJaq
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) ijceronline
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...Yi-Hsueh Tsai
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 

Similar a Adaptive Safety Data Dissemination Vehicles (20)

VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
ITS presentation
ITS presentationITS presentation
ITS presentation
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
EFFICIENT BROADCASTING MECHANISMS FOR DATA DISSEMINATION IN VEHICULAR AD HOC ...
 
A018210109
A018210109A018210109
A018210109
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
VEHICULAR 2020 Presentation by Kohei Hosono
VEHICULAR 2020 Presentation by Kohei HosonoVEHICULAR 2020 Presentation by Kohei Hosono
VEHICULAR 2020 Presentation by Kohei Hosono
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodology
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
 
50120130405022
5012013040502250120130405022
50120130405022
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Adaptive Safety Data Dissemination Vehicles

  • 1. Adaptive dissemination of safety data among vehicles Chisalita, I. 、Shahmehri, N. Personal, Indoor and Mobile Radio Communications, 2006 IEEE 17th International Symposium on 11-14 Sept. 2006 KUAN-YU, CHEN stu9458@gmail.com
  • 2. Outline • Introduction – Challenge • Related work • Protocol overview • Basic safety messages dissemination • Evaluation • Concluding remarks 2014/10/29 2
  • 3. Introduction(1/3) • An adaptive approach to dissemination of safety data among vehicles. • Support the driver in dangerous traffic situations. • Avoid the occurrence of such situations(collision warning and collision avoidance). 2014/10/29 3
  • 4. Introduction(2/3) • Challenge – Specific properties of the traffic environment. – The strict requirements of safety applications. • Vehicles that are not in each other communication range may need to exchange data. – Forwarding information. • Vehicles that send their data may not be aware of the receivers that will make use of it – Filtering of information. 2014/10/29 4
  • 5. Introducton(3/3) • The protocol makes use of contextual information for sustaining inter-vehicle communication adaptable to the current traffic situation. 2014/10/29 5
  • 6. Related work(1/4) • Three main area about communication – Group membership in vehicular networks – Medium access control(MAC) schemes – Traffic data dissemination. 2014/10/29 6
  • 7. Related work(2/4) • Various routing protocols have been proposed for data dissemination in ad-hoc networks • Protocols are less applicable to safety vehicular communication. • Require the establishment of routes to a given destinations. 2014/10/29 7
  • 8. Related work(3/4) • Protocols followed a reactive approach, where notifications are sent when vehicles detect hazards in traffic. • Takes a proactive approach where vehicles are regularly informed about the traffic situation. • Used for predicting the occurrence of dangerous situations. • e.g. Vehicle suddenly breaks down. 2014/10/29 8
  • 9. Related work(4/4) • DSRC (Dedicated Short Range Communication) – Specifies the MAC layer, the link layer and the radio layer for vehicular communication systems. – Vehicle-to-road 、Vehicle-to-vehicle – Augment DSRC functionality when providing safety services. 2014/10/29 9
  • 10. Outline • Introduction – Challenge • Related work • Protocol overview • Basic safety messages dissemination • Evaluation • Concluding remarks 2014/10/29 10
  • 11. Protocol overview(1/7) Problem • A large number of communicating hosts may tend to exchange data. • Produce a heavy load on the communication channel. • Difficulties in accessing the transmission medium and packet collisions. • Apply two techniques for controlling the dissemination of safety information. 2014/10/29 11
  • 12. First(1/2) • Define an organization of the vehicles in virtual clusters – limited in space and in composition. • Research in traffic safety has indicated that a vehicle can not extensively benefit by having data about a large number of vehicles. • imposed a 300 meters as the cluster size. 2014/10/29 12
  • 13. First(2/2) • Impact of the cluster size on the communication performance. – maximum number of members is 20. • The data is importance.(remain) – The sender be registered in cluster. • If this does not happen, the data describing the respective vehicle is removed. 2014/10/29 13
  • 14. Second • An anonymous context-based broadcast. • Receivers need to determine the data if they are the intended destination of this data. • Context-based filtering. – Based on a set of rules defined using research results in crash analyses. – Guidelines for developing active safety systems 2014/10/29 14
  • 15. Protocol overview(2/7) • Basic Safety Messages (BSM) Host identity Message sequence number Message type Vehicle velocity Vehicle positions(Two consecutive Vehicle heading indications) Vehicle status and size Road identity* Road type* Road slipperiness* Speed limit* Number of members Cluster members identities Other information 2014/10/29 15
  • 16. Protocol overview(3/7) • send error – BSMs are issued at regular time intervals. – BSM can not be transmitted and a new one is generated, the older BSM is removed and the new one is inserted into the buffer. • Forwarded – Same cluster may not directly receive data about each other. – Packet collision, shadowing or medium access – Filtering 2014/10/29 16
  • 17. Protocol overview(4/7) • VA runs a matching algorithm to determine if these hosts may have interest in VB’s data. – The process ends if such a host if found. VB VA Host 2014/10/29 17
  • 18. Protocol overview(5/7) • Produces a peak-load on the channel and can reduce communication performance • Before forwarding a BSM, a host waits an amount of time randomly selected between 0 and the transmission rate of BSMs. 2014/10/29 18
  • 19. Protocol overview(6/7) • Filtering and forwarding. – Using a context-based technique. • Traffic Postulates – P1: The vehicles in close proximity have important data. Their number is limited – P2: Vehicles in front and behind traveling on the same road and in the same direction have data of interest. – P3: Vehicles coming from an opposite direction can constitute a danger on undivided roads. – P4: Vehicles can collide if they arrive at an intersection at the same time. 2014/10/29 19
  • 20. Protocol overview(7/7) • Inclusion rule – (I1) The Euclidean distance between sender and receiver is less than SAT ± ΔD. (ΔD is a hysterezis threshold) • Regular rules – (R1)The sender and the receiver are traveling on the same road AND have similar heading. – (R2) The sender and the receiver are on the same undivided road AND have different headings AND the sender is ahead of the receiver. – (R3) The sender and the receiver are traveling on different roads AND a route contention is detected. 2014/10/29 20
  • 21. Outline • Introduction – Challenge • Related work • Protocol overview • Basic safety messages dissemination • Evaluation • Concluding remarks 2014/10/29 21
  • 22. Basic safety messages dissemination(1/3) • Providing vehicles with up-to-date traffic information in a regular manner can be performed using two approaches. • First – The constant rate approach, where BSMs are sent at fixed regular intervals. – The analysis indicated a rate of 10 BSMs/second as appropriate 2014/10/29 22
  • 23. Basic safety messages dissemination(2/3) • Second – Adaptive approach – General enough as to accommodate a large diversity of situations. – Velocities of the vehicles and the traffic density. 2014/10/29 23
  • 24. Basic safety messages dissemination(3/3) • vehicles velocity – Residential areas, 30 to 50 km/h – On country roads, 70 to 100 km/h – Highway, 100 to 150 km/h 2014/10/29 24
  • 25. Evaluation(1/10) • GloMoSim v2.3 • Evaluation – BSMs delivery delay – packet collisions – send errors 2014/10/29 25
  • 27. Evaluation(3/10) • BSMs delivery delay – The efficiency of information filtering was measured by the information filtering rate. – the ratio between accepted BSMs and received BSMs. • packet collisions – The collisions were normalized with the number of BSMs correctly received. • send errors – Number of BSMs issued by a host. 2014/10/29 27
  • 28. Evaluation(4/10) • System bandwidth,10 - 2000 kbps. • Communication service area or cluster size, 50 - 600 m. • Network load, 6 – 20 vehicles/km/lane. • Vehicles mobility, 10 - 40 m/s. 2014/10/29 28
  • 29. Evaluation(5/10) Propagation model Two-ray Channel AWGN and Rician fading Radio model Based on IEEE 802.11 Frequency 2.4GHz and 5.9 GHz MAC scheme Non-persistent CSMA Transmission Power 12 dBm (i.e. ~317m range) BSM size 112 bytes 2014/10/29 29
  • 30. Evaluation(6/10) • BSMs delay as a function of load density 2014/10/29 30
  • 31. Evaluation(7/10) • Packet collisions as a function of mobility 2014/10/29 31
  • 32. Evaluation(8/10) • Information filtering rate under mobility 2014/10/29 32
  • 33. Evaluation(9/10) • Send errors as a function of load density 2014/10/29 33
  • 34. Evaluation(10/10) • The extended version of the protocol considerably outperformed the basic version in most of the tests. • Areas of improvements – Efficient information filtering. – Forwarding techniques. – Better MAC schemes. 2014/10/29 34
  • 35. Concluding remarks(1/2) • Propose a protocol that makes use of contextual information for controlling the vehicular communication. • Future work will focus on improvements of the protocol. 2014/10/29 35
  • 36. Concluding remarks(2/2) • The development of a prototype system using on-market devices (e.g. 802.11 WLAN cards or DSRC transceivers when these will be available) is intended. 2014/10/29 36

Notas del editor

  1. 交通環境中有特定的情況和環境、而且在安全應用上也有一些嚴格的要求。 車輛傳送他們的資料,但是該資料可能不是接收者所需要的資料。
  2. 這協定使用了對照前後狀況信息的方式去維持車間通信並且適應當前的交通狀況
  3. Group membership in vehicular networks : 組織各個車輛間形成網路並管理之. Medium access control(MAC) schemes : 協調各個車輛間的存取通道 Traffic data dissemination : 提供車輛所需要的資訊
  4. Ad-hoc: 無線臨時網路,這種網路系統是臨時形成,由節點與節點間的動態連結所形成。它不需要依賴一個既存的網路架構,像是有線系統的路由器,或是無線系統的無線網路基地台。相反的,它每一個節點,都有能力轉送網路封包給其他節點(這稱為路由)。 這種方式比較少應用在交安的溝通上,因為還是要建立一個溝通路徑到特定的目標上。
  5. 大多數的車輛都是用被動式的方法,當車輛檢測到危害交通時發送通知,而本文所提出的協定可以主動的定期發送相關的交通資訊,而發送時間、方式、距離在方法之中。 改善交通安全系統,因為可以利用預測的方式去確認。 少數特定狀況,例如緊急剎車。(但如果能夠結合DSRC或大範圍偵測,又可以用回這系統)
  6. 指定MAC, Link, radio三個層次作為車間安全的溝通系統。 該論文指出他的方法可以增加DSRC的功能,使之可以提供安全的功能
  7. 協定產生,勢必是以前有些問題無法根治與解決。 大量的溝通端需要去交換信息、對於溝通的通道產生了很重的負荷使之在傳送介質中不易存取甚至封包碰撞,以下應用兩個技術去控制安全信息廣播並且解決上述問題。
  8. 1. 因為車輛間的信息無法廣泛受益,所以即使數量多、範圍廣,但是實際重要的信息可能只有少數,如果多了可能會導致信息暴增而來不及處理。 2. 300公尺的車集是從交通安全角度來看最為合適的數字。
  9. 車集的大小對於溝通表現的影響,研究後最大的成員上限大約是20人。如果所擁有的資料重要,則保持在隊內的資格,如果這資料不重要,那麼該車輛就會被移除在本群組之內。
  10. 匿名廣播的方式,將交通的內容散布出去。接收者如果收到的資料是預期的則必須要確認。 而內文的過濾方式,則是有相關於碰撞分析的研究結果,甚至可以用此方法作為安全系統的開發。
  11. Vehicle positions: 要連續兩個連續的跡象表明位置 道路標示、道路狀態(封鎖、維修)、路面狀況、速限 其餘狀態包含燈亮、剎車等
  12. send error: BSM都是在固定的時間週期中發送,所以如果在傳送中發生了一些問題,新的信息將會取代舊的信息之後再次發送。 Forwarded: 相同群組之內的資料不能夠直接發送,因為如果是無意的資料會使得封包碰撞、被屏蔽或是媒體存取的麻煩,所以可能需要經由過濾方可行。
  13. 信息轉發一定會造成通道的堵塞因而影響了溝通的效率,所以如果在轉發BSM之前,host可以等待隨機的時間,而選擇的方法則是從0到BSM傳送速率的時間中。
  14. P1比較偏向於交通安全的研究、P2則是介紹有關於衝撞安全的警告來源、P3和P4則是正面或是交叉點的碰撞 P1,鄰近的車輛擁有著重要的資料,但是這些數量有限。P2,前後的車輛駛於相同道路、相同方向之上,而且對著相同的車輛皆有興趣得知該車輛的信息。P3,車輛行駛於未分道的道路上,而且正有車持著相反的方向而來,可能會造成危險。P4,如果車輛在相通的時間經過交岔道則會造成碰撞。
  15. Euclidean distance: 歐式距離,就是直角坐標距離。 如果接收端小於主機端給予的信息距離,則可以得到這則新消息。或者是發送者比主機端更靠近接收者。 Heading: 在此指方向 如果行駛在相同方向、相反且危險的方向、路線的內容需要檢測
  16. 安全信息廣播提供了車輛可以用定期更新的方式去更新它的交通信息,而此處也提供了兩個方法可以達到這樣子的目的。 第一項: 為了實施多樣的安全關鍵應用需求,所以可能在短時間內就會發送一些信號,但是也因此會導致太過飽和。目前分析出來大約每秒十個信號是最佳。
  17. 第二項所需要考慮到自我適應的方式,例如車少速快、車多速慢的行為,如果車輛行駛速度比較慢的時候,BSM給予信號的頻率即可降低,但是如果當速度增快的時候,發送的頻率就會上升,希望可以保持在頻率之類但是卻又不會太過壅塞。在此也需要考慮到密度的問題。
  18. Residential areas: 住宅區 T max=最大時間區間 Vveh=車子當前速度 如果是最大時間區間,則代表車速極小 如果是中間,則照等比例去計算,並且可以確定目前速度小於門檻值velocity threshold 最小時,則代表車速過快
  19. GlomoSim v2.3 , Global Mobile Information System Simulator, 由加州大學洛杉磯分校開發的網路模擬器,可以運用在大型無線無動網路中的模擬。 此工具可以用來建構模型和場景,並且分步執行、停止等方式來確立自己的環境和方法的最後數據。在UI的介面可以得到相對應的模擬顯像信息。
  20. 所評估的條件包含了BSM的多種Delay狀況、封包的碰撞、傳送錯誤等三項評估條件。在BSMs的多種Delay狀況之下,所評估的就是信息的過濾效率(i.e. 接收和同意的比例)。而封包碰撞的狀況下,正確的接收到信息尤為重要。而傳送錯誤的評估則是從主端發送許多的BSMs來確認。
  21. 目前評估的環境下, 設定系統頻段從10~2000kbps(bps=bit per second) 溝通服務區域或是群組的SIZE大約是50~600公尺 網路承載負荷約6~20(每個地區每公里的車輛數) 交通的流動速率約10~40m/s.
  22. 傳播的模型為雙向道、通道使用AWGN和Rician fading、傳輸協定則是於IEEE 802.11上、頻率則是2.4GHz或是5.9GHz(無線電或是DSRC)、MAC機制挑選非持久型的CSMA、傳送功率則是12dBm(約317公尺)、BSM的資料信息大小是112byte.
  23. 改善的原因即是因為調整以及更有效的連結(更少的信息被傳送和轉發) 也可得知從前的MAC機制不能夠提供較為有效的品質。 若有高低速的規定的話,流動率密度對於DELAY的影響較小(因為不會有突然因車多而暴增的信息)
  24. 封包碰撞的改善則可以改善一些在車輛較少時所發生的問題,但是當車速過快時,還是無法解決硬體本身的問題。
  25. 過濾信息的頻率也是在車流量較少時有較為顯著的效果
  26. 這張圖表示負荷的密度,新版本的碰撞和傳送錯誤皆會低於舊有的版本。
  27. 特別改善了信息過濾的效能、轉發的技術、更好的MAC機制.
  28. 本篇文章可以利用前後的情境狀況來控制及調整車輛溝通信息的一些條件,以達成在有限的環境中可以有更好的效率和使用,未來將會專注於改善這協定的其它部分。而這協定系統的開發已經在市面上的裝置,如例802.11無線網卡、DSRC的傳輸上。
  29. 因為在當年市面上的DSRC通信產品較少,直到今年2014年美國部分才定義相關的法規條例可以使用。