SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1102
Congestion Control Technique with Safety Transmission of Messages in
Vehicular Ad Hoc Network
Bhagyashri P. Deshpande1, Dr.A.S.Alvi2
1 M.E(CSE) PRMIT&R, Badnera , Amravati
2 Professor ,Dept. of CSE PRMIT&R ,Badnera, Amravati
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Vehicular Ad hoc Network (VANET) is somehow
similar to MANET. As there are mobile nodes present in
MANET in the same way vehicles are present in VANET. If we
compare it with MANET, VANET have dissimilar
characteristics. When the channelsaresaturatedbythenodes,
the congestion occurs in channel. Chances of congestion in the
network increases with the increment in number of collision
occurrence and this is all because of increase in the density of
vehicle. In this paper we proposeRT-MMFalgorithmtocontrol
the congestion in VANET and to deliver safety messages
through nodes, encryption and decryption technique is used.
We are also going to learn the performance of the proposed
algorithm. We are evaluating the result of our proposed
method through simulation using NS2. In this paper we are
also comparing previoustechnique withourproposed method.
Key Words: VANET, MANET, Congestion Control, RT-
MMF, Network Simulator.
1.INTRODUCTION
Vehicular Ad hoc Networks (VANET’s) uses
Intelligent Transport Systems (ITSs) to operate
wireless communications in the vehicular
environments. VANET’s are designed to provide
consistent and safe surroundings for users to reduce
the road accidents, traffic jams, andfuelconsumptions,
and so on. The VANets’ users can be informed of
hazardoussituationsbyvehicularcommunicationsand
exchanging the information about surrounding
environments. VANET’s have some unique
characteristics such as high mobility, high rate of
topology changes, andhigh densityofthenetwork,and
so on. IEEE 802.11p[1] is a protocol that specifies the
features of IEEE 802.11 protocol inPHYandlowerpart
of MAC layers to transfer data in vehicular
environments. This protocol employs an MAC layer
protocol based on Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA)fordisseminatingdata
in VANET.
Vehicular communication includes both Inter-
Vehicle Communication (IVC) and Vehicle to
Infrastructure communication. VANET’s are designed
to improve the road safety and traffic efficiency in the
vehicular environments. Due to the dynamic nature of
the traffic in roads, some gaps may be createdbetween
the vehicles and consequently remote node clusters
can be created in the roads and it leads to accidents.
To avoid this problem the warning messages
must be sent to the vehicles for avoiding further
collision. We have to study the probability of sent
messages from vehicles and the received safety
messages and also the delay that will occur in sending
the message for future recipient.
In high mobility environment DSRC[3] will not
workedproperly.Therefore,anewRelaxationMax-Min
Fairness algorithm (RT-MMF)[4] is introduced to
increase the system’s reliability and probability of
receiving packets and decreasing the delay for
transmission. In rest of the paper we will see related
work, the comparison between the previoustechnique
and the proposed one, evaluation of proposed system.
2. RELATED WORK
Varsha H,, Pradeep , (IJCSIT) International Journal of
ComputerScienceandInformationTechnologies,Vol.5
(2) , 2014, [1] In this paper, performance evaluations
of safety message dissemination inVANETs inVehicle-
to-Vehicle communication (V2V) are considered. The
vehicles which are considered as nodes in VANET
communicate or exchange messages with each other,
which is referred to as V2V or Inter-Vehicle
Communication (IVC). V2V communication is
implemented through Dedicated Short Range
Communication (DSRC)[3] protocol. The main
advantage of the V2V communication with DSRC will
be decreased delay and efficient broadcasting ofsafety
messages to far away nodes as possible.
Meenal Pannase January 2014 [2] In this paper we
suggest priority based congestioncontrol algorithmas
answer to avert congestion in VANETs natural
environment. We also study the production of
proposed priority based congestion control algorithm
for VANET in difference congested scenarios. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1103
effectivenessoftheproposedprioritybasedcongestion
control algorithm is considered through the hardware
and conclusions will be shown on .net. This new
imagination is alleviated congestion in network,
increases the throughput and package consignment
ratio and furthermore minimizes delay.
3.ADAPTIVE AND MOBILITY BASED ALGORITHM
(AMBA)
Basically we are comparing the system using two
methods one is previously used AMBA and the other
one is our proposed system RT-MMF. So first we see
howAMBAtechniqueworks.BasicallyAMBA(Adaptive
And Mobility Based Algorithm) algorithm allows more
vehicle to send their status message within the
network. Here we are showing vehicular ad hoc
network using NS-2[7]so we can consider the vehicles
as a nodes. In AMBA algorithm while transmitting
messages through nodes the collision might be
occurred and hence the number of packets dropped is
high andit affects the efficiency of the network and the
algorithm.
Screenshot-1: Structure of Network in AMBA Algorithm
Screenshot-2 : Message transmission through network
Screenshot-3: Collision occurred while transmitting
messages
In above figure we can see how the vehicles are
travelling and transmitting messagesthroughnetwork
but while transmitting the messages among vehicles
the collision might be occurred as we can see in the
screenshot 3 and the energy required for this
transmission is more as compared toRT-MMFbecause
all the nodes are participating in transmissions. So the
delay might be occurredbutthepacketsdroppedwhile
transmitting through nodes are high. So the efficiency
of this method is low and the security provided for
transmission is also not feasible.
4.RELAXATION MAX-MIN THEORY ALGORITHM
(RT-MMF)
Our system design can be divided into two
main parts, namely Relaxation Theory (RT) and Max-
MinFairness(MMF)[4].Theconceptualviewoforiginal
RT and the flow diagram of our proposed system
design are as illustrated in Fig.1. Both of our proposed
methods are chosen based on their unique
characteristics in dealing with congested networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1104
Fig-1:Relaxation Theory (RT) and Max-Min Fairness
(MMF)
The system is divided into three modules. The firstone
is just showing the active deactive concept of network,
the secondoneisRT-MMFwhichflowdiagramwehave
seen in above fig:1 And the third one is Encryption
decryption algorithm. In the first module we have
shown how we can use active deactive concept to save
energy of the system. As all nodes are not participating
in the transmission. Firstly in WSN[8] multiple nodes
are participating in communication so lots of energy is
lost. So to save this energy and to avoid collision we
have to activate only those nodes which are
responsible in sending packets from source and
destination. In the second module we are applying
congestion control algorithm RT-MMF. For this
purpose we considertheneighboringnodesofasender
and calculate the distance between the node and the
source and whichever node having minimum distance
consider that node as the next one in our route and
then repeat the procedure until we cannot reach our
destination.
To control thecongestionweapplyRT-MMF[4]
algorithm. The RT is chosentocontroltherateatwhich
the packets can be sent from each node. The control
transmission rate is called Engineering Level (EL)(L(f;
_) which is defined as the number of slots based on
available bandwidth, in order to transmittheincoming
packets (potentially after some buffering),withoutany
additional loss or delay. This technique also allocates
fair share of bandwidth to each packet while
minimizing the occurrence of congestion. In this
algorithm EL is the most important factor if it exceeds
the threshold bandwidth, our communication will be
stop and EL will be reset. The algorithm we used is as
follows.
Initialize EL=0.
For(I=0; I<length; I++)
{
Repeat source to destination communication while
loop length.
El++;
If(El==250)
{
Break;
}
}
Prints(“The bandwidth limit exceed resulting El to
zero(0)”);
For the security purpose we are applying encryption
and decryption algorithm. In order to safely broadcast
messages from source to destination we have to
encrypt the message. For this purpose we are using
SHA-256 algorithm. The SHA-256 compression
function operates on a 512-bit message block and a
256-bit intermediate hash value. It is essentiallya256-
bit block cipher algorithm which encrypts the
intermediate hash value using the message block as
key.
5. RESULTS AND DISCUSSIONS
Simulation[9] has been approved using a
powerful Network Simulator-2(NS-2)[7]todetermine
the performance of the proposed method. RT-MMF is
purposely designed to provide high traffic rate during
simultaneous data transmissions in WBSN [5].In this
section firstly weseeourproposedsystemandthenwe
will see the comparison between the previous system
and proposed one through graph and tables. In our
Start
Network Formation
Apply AODV
Result Analysis
1st
Phase
Implementation of RT-MMF
Apply SHA-256
Communication Starts
Result
2nd
Phase
Stop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1105
proposed system as we are using active and
deactivation concept thatsavestheenergyofthenodes
ultimately energy of the system and it reduce the most
important problem that is collision. So the packet
delivery ratio is high as compare to the AMBA
algorithm. So in screenshot 4 we can see the basic
network of our VANET , the active and deactive nodes
which represent the shortest path to deliver packet
from source to destination.
Screenshot-4: Basic view of Proposed System
Screenshot-5 : Packets delivered through source to
destination
In above screenshot 5 we can see how packets are
delivered from source to destination. As we are using
active deactive concept, the packets passed only
through the active nodes and in this way we can save
energy and time required to delivered packets.
Screenshot-6: Minimum value calculation
As shown in screenshot 6 we can see how the
particular nodes are selected for transmission of the
packets. From the root node we consider the
neighboring nodes which are at minimal distance.
Then according to their X and Y axis positionsofboth
the nodes we calculate the distance. This procedure
will be repeated for all the neighboring nodes which
are nearer to the root node. Then after getting the
entire node’s distance, we consider that node only
that has minimum value. And that node will be the
next node in the path of transmission.
In this way we have to calculate the minimum
distances and make route till the destination.
Screenshot-7: Result of Proposed system
Screenshot 7 shows the overall result of our proposed
system. In which we can see the number of generated
packets, received number packets, the ratio of packet
delivery, total number of packets dropped and delay if
any.
Screenshot-8: Result of AMBA Technology
After generatingtheresultdifferentgraphswill
be generated in which we can see the comparison
between two techniques.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1106
Table-1: Comparison between Energy values of RT-MMF
and AMBA Method
AMBA Energy Proposed System
Energy
0 3
0 0
1 3
1 3
2 0
2 0
3 0
3 0
4 0
4 2
5 2
5 0
6 2
6 4
7 4
Chart-1: Comparison of Energy Value
Table-2: Comparison between Jitter Values RT-MMF and
AMBA Method
AMBA Jitter Proposed System
Jitter
0 0
0 0.000424
-0.000939 0.000283
-0.000352 0.000212
-0.000282 0.000074
-0.000027 0.000161
0.001051 -0.000563
0.001078 -0.000504
-0.004156 0.00018
-0.000064 -0.000489
0.000171 0.000326
-0.000764 -0.000291
-0.000828 -0.000435
-0.000671 -0.000143
-0.000822 0.000219
Chart- 2 : Comparison of Jitter Values
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107
Table-3: Comparison between Throughput Values
AMBA Throughput Proposed System
Throughput
8 8
16 17.6
24 27.2
32 36.8
40 46.4
48 56
56 65.6
64 75.2
73.6 84.8
83.2 94.4
92.8 104
102.4 109.6
112 118.4
121.6 126
131.2 131.6
Chart-3: Comparison graph of Throughput Values
Table-4: Comparison Values of delay
AMBA Delay Proposed System
Delay
0 0
0.001408 0.000848
0 0.000848
0.000249 0.000848
0.001016 0.000729
0.000271 0.000848
0.004871 0.000003
0.000283 0.000017
0.001315 0.000724
0.000108 0
0.000948 0.000848
0.000739 0.000205
0.001234 0.000024
0.000925 0.000305
0 0.000683
Chart-4: Comparison of Delay values
As we have seen the entire table and graphs which
shows the comparison between the previous method
AMBA and proposed method. From this graph we can
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1108
say that the AMBA is less efficient than the proposed
system.
6.CONCLUSION
In this project we are discussing about how we
can avoid the problem of congestion and collision. For
evaluation purposes, we have performed simulation
analysis using NS-2[12] and showed that across
multiple nodes scenarios RT-MMF always performs
much better than the previous one. Here we are
comparing the results of two techniques one is
previously invented AMBA and the other one is
proposedRT-MMFtechnique.ByusingRT-MMFwecan
avoid congestion andcollisioninthenetwork.RT-MMF
is able to reduce congestion during simultaneous data
transmission, which is a significant indication of its
efficiency. By using encryption decryption we can
ensure the security of messages that are transmitted
over the network. Energy required for execution will
required less. As we are calculating throughput i.e. the
ratio of packets delivered from source to destinationis
more than the AMBA. From the results we conclude
that our proposed system is more efficient than the
previous one.
7. FUTURE SCOPE
As we have performed this project using
simulation but we can do this project in real time also.
But the cost goes very high. As this project is very
useful in the area where the trafficisthemaincause.So
we can use this project using some hardware
equipments and sensors. We can use this project in
parking areas also as in high traffic area parking of
vehicles is very difficult task so by implementing this
project in future we can solvetheparkingslotproblem.
Future workincludes the thought ofnetworkcodingas
a way to increase routability, improve congestion and
overflow prevention. This technique offers several
advantages including solving complicated routing that
cannot be solved using the traditional approach.
REFERENCES
[1] Varsha H , Pradeep. S,” Enhanced Performance Evaluation for
Broadcasting Safety Messages In VANET”, (IJCSIT)
International Journal of Computer Science and Information
Technologies, Vol. 5 (2) , 2014, 1595-1598
[2] Meenal Pannase Priority Based Congestion Control for VANET:
Review International Journal of Advance Research in
Computer Science and Management Studies Volume2,Issue1,
January 2014.
[3] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, “(CODA):
congestion detection and avoidance in sensor etworks,” in
Proceedings of the 1st international conference on Embedded
networked sensor systems,ser.SenSys’03.NewYork,NY,USA:
ACM, 2003, pp. 266–279.
[4] Naimah Yaakob, Member, IEEE, and Ibrahim Khalil, Senior
Member, IEEE,” A Novel Congestion Avoidance Technique for
Simultaneous Real-Time Medical Data Transmission”,
JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,VOL.
XX, NO. X, FEBRUARY 2015.
[5] Naimah Yaakob, Member, IEEE, and Ibrahim Khalil, Senior
Member, IEEE,” A Novel Congestion Avoidance Technique for
Simultaneous Real-Time Medical Data Transmission”,
JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,VOL.
XX, NO. X, FEBRUARY 2015.
[6] N. Yaakob, I. Khalil, and J. Hu, “On the effectiveness of relaxation
theory for controlling high traffic volumes in body sensor
networks,” in Proceedings of the 2nd International ICST
Conference on Wireless Mobile Communication and
Healthcare Mobihealth. Greece: Springer, 2011, pp. 16–23.
[7] Teerawat Issariyakul , EkramHossain,”IntroductiontoNetwork
Simulator NS2”, ISBN:978-0-387-71759-3e-ISBN:978-0-387-
71760-9 DOI: 10.1007/978-0-387-71760-9 Library of
Congress Control Number: 2008928147 ,2009 Springer
Science Business Media, LLC.
[8] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib
Khan Pathan, and Choong Seon Hong,” Congestion Control
Protocol for Wireless Sensor Networks Handling Prioritized
Heterogeneous Traffic”.
[9] R. E. Shannon, “Introduction to the art and science of
simulation,” in Proc. Of the 30th conference on Winter
simulation (WSC’98), 1989.

More Related Content

PDF
Review on buffer management schemes for packet queues in wired & wireless net...
PDF
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
PDF
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
PDF
Modified rts cts exchange mechanism for manet
PDF
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
PDF
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
PDF
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
PDF
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Review on buffer management schemes for packet queues in wired & wireless net...
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Modified rts cts exchange mechanism for manet
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...

What's hot (18)

PDF
Improving Performance of TCP in Wireless Environment using TCP-P
PDF
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
PDF
D044021420
PDF
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
PDF
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
PDF
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
PPTX
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
PDF
Multi hop wireless-networks
DOCX
Interference Aware Multi-path Routing in Wireless Sensor Networks
PDF
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
PDF
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
PDF
11.signal strength based congestion control in manet
PDF
4..[26 36]signal strength based congestion control in manet
PDF
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
PDF
Two-level scheduling scheme for integrated 4G-WLAN network
PPTX
2014 03-09, ofc workshop, ping pan
PDF
GMPLS (generalized mpls)
PDF
Transmitting urgent data using ANKM method.
Improving Performance of TCP in Wireless Environment using TCP-P
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
D044021420
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Multi hop wireless-networks
Interference Aware Multi-path Routing in Wireless Sensor Networks
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
11.signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
Two-level scheduling scheme for integrated 4G-WLAN network
2014 03-09, ofc workshop, ping pan
GMPLS (generalized mpls)
Transmitting urgent data using ANKM method.
Ad

Similar to Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network (20)

PDF
A Proposed Methodology to Reduce Congestion in Vehicle Ad-hoc Networks by Det...
PDF
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
PDF
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
PDF
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
PPTX
Vehicular adhoc network for communication
PDF
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
PDF
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
PPTX
1102060,1102073,1102083
PDF
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
PDF
Iaetsd enhancing vehicle to vehicle safety message
PDF
Effective Road Model for Congestion Control in VANETS
PPTX
Cooperative Message Authentication Protocol(CMAP) in VANET
PPTX
2014 1029 adaptive dissmination of safety data among vehicles
PDF
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PDF
P26093098
PDF
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
PDF
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
PPT
Final Presentation PPT for final years project
PDF
Modified Congestion Re-Routing Scheme using Centralized Road Side Unit
PDF
Collision Avoidance Protocol for Inter Vehicular Communication
A Proposed Methodology to Reduce Congestion in Vehicle Ad-hoc Networks by Det...
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Vehicular adhoc network for communication
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
1102060,1102073,1102083
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
Iaetsd enhancing vehicle to vehicle safety message
Effective Road Model for Congestion Control in VANETS
Cooperative Message Authentication Protocol(CMAP) in VANET
2014 1029 adaptive dissmination of safety data among vehicles
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
P26093098
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
Final Presentation PPT for final years project
Modified Congestion Re-Routing Scheme using Centralized Road Side Unit
Collision Avoidance Protocol for Inter Vehicular Communication
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
additive manufacturing of ss316l using mig welding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Welding lecture in detail for understanding
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
additive manufacturing of ss316l using mig welding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Lecture Notes Electrical Wiring System Components
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
573137875-Attendance-Management-System-original
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Welding lecture in detail for understanding
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
Embodied AI: Ushering in the Next Era of Intelligent Systems
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Strings in CPP - Strings in C++ are sequences of characters used to store and...

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1102 Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Bhagyashri P. Deshpande1, Dr.A.S.Alvi2 1 M.E(CSE) PRMIT&R, Badnera , Amravati 2 Professor ,Dept. of CSE PRMIT&R ,Badnera, Amravati ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Vehicular Ad hoc Network (VANET) is somehow similar to MANET. As there are mobile nodes present in MANET in the same way vehicles are present in VANET. If we compare it with MANET, VANET have dissimilar characteristics. When the channelsaresaturatedbythenodes, the congestion occurs in channel. Chances of congestion in the network increases with the increment in number of collision occurrence and this is all because of increase in the density of vehicle. In this paper we proposeRT-MMFalgorithmtocontrol the congestion in VANET and to deliver safety messages through nodes, encryption and decryption technique is used. We are also going to learn the performance of the proposed algorithm. We are evaluating the result of our proposed method through simulation using NS2. In this paper we are also comparing previoustechnique withourproposed method. Key Words: VANET, MANET, Congestion Control, RT- MMF, Network Simulator. 1.INTRODUCTION Vehicular Ad hoc Networks (VANET’s) uses Intelligent Transport Systems (ITSs) to operate wireless communications in the vehicular environments. VANET’s are designed to provide consistent and safe surroundings for users to reduce the road accidents, traffic jams, andfuelconsumptions, and so on. The VANets’ users can be informed of hazardoussituationsbyvehicularcommunicationsand exchanging the information about surrounding environments. VANET’s have some unique characteristics such as high mobility, high rate of topology changes, andhigh densityofthenetwork,and so on. IEEE 802.11p[1] is a protocol that specifies the features of IEEE 802.11 protocol inPHYandlowerpart of MAC layers to transfer data in vehicular environments. This protocol employs an MAC layer protocol based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)fordisseminatingdata in VANET. Vehicular communication includes both Inter- Vehicle Communication (IVC) and Vehicle to Infrastructure communication. VANET’s are designed to improve the road safety and traffic efficiency in the vehicular environments. Due to the dynamic nature of the traffic in roads, some gaps may be createdbetween the vehicles and consequently remote node clusters can be created in the roads and it leads to accidents. To avoid this problem the warning messages must be sent to the vehicles for avoiding further collision. We have to study the probability of sent messages from vehicles and the received safety messages and also the delay that will occur in sending the message for future recipient. In high mobility environment DSRC[3] will not workedproperly.Therefore,anewRelaxationMax-Min Fairness algorithm (RT-MMF)[4] is introduced to increase the system’s reliability and probability of receiving packets and decreasing the delay for transmission. In rest of the paper we will see related work, the comparison between the previoustechnique and the proposed one, evaluation of proposed system. 2. RELATED WORK Varsha H,, Pradeep , (IJCSIT) International Journal of ComputerScienceandInformationTechnologies,Vol.5 (2) , 2014, [1] In this paper, performance evaluations of safety message dissemination inVANETs inVehicle- to-Vehicle communication (V2V) are considered. The vehicles which are considered as nodes in VANET communicate or exchange messages with each other, which is referred to as V2V or Inter-Vehicle Communication (IVC). V2V communication is implemented through Dedicated Short Range Communication (DSRC)[3] protocol. The main advantage of the V2V communication with DSRC will be decreased delay and efficient broadcasting ofsafety messages to far away nodes as possible. Meenal Pannase January 2014 [2] In this paper we suggest priority based congestioncontrol algorithmas answer to avert congestion in VANETs natural environment. We also study the production of proposed priority based congestion control algorithm for VANET in difference congested scenarios. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1103 effectivenessoftheproposedprioritybasedcongestion control algorithm is considered through the hardware and conclusions will be shown on .net. This new imagination is alleviated congestion in network, increases the throughput and package consignment ratio and furthermore minimizes delay. 3.ADAPTIVE AND MOBILITY BASED ALGORITHM (AMBA) Basically we are comparing the system using two methods one is previously used AMBA and the other one is our proposed system RT-MMF. So first we see howAMBAtechniqueworks.BasicallyAMBA(Adaptive And Mobility Based Algorithm) algorithm allows more vehicle to send their status message within the network. Here we are showing vehicular ad hoc network using NS-2[7]so we can consider the vehicles as a nodes. In AMBA algorithm while transmitting messages through nodes the collision might be occurred and hence the number of packets dropped is high andit affects the efficiency of the network and the algorithm. Screenshot-1: Structure of Network in AMBA Algorithm Screenshot-2 : Message transmission through network Screenshot-3: Collision occurred while transmitting messages In above figure we can see how the vehicles are travelling and transmitting messagesthroughnetwork but while transmitting the messages among vehicles the collision might be occurred as we can see in the screenshot 3 and the energy required for this transmission is more as compared toRT-MMFbecause all the nodes are participating in transmissions. So the delay might be occurredbutthepacketsdroppedwhile transmitting through nodes are high. So the efficiency of this method is low and the security provided for transmission is also not feasible. 4.RELAXATION MAX-MIN THEORY ALGORITHM (RT-MMF) Our system design can be divided into two main parts, namely Relaxation Theory (RT) and Max- MinFairness(MMF)[4].Theconceptualviewoforiginal RT and the flow diagram of our proposed system design are as illustrated in Fig.1. Both of our proposed methods are chosen based on their unique characteristics in dealing with congested networks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1104 Fig-1:Relaxation Theory (RT) and Max-Min Fairness (MMF) The system is divided into three modules. The firstone is just showing the active deactive concept of network, the secondoneisRT-MMFwhichflowdiagramwehave seen in above fig:1 And the third one is Encryption decryption algorithm. In the first module we have shown how we can use active deactive concept to save energy of the system. As all nodes are not participating in the transmission. Firstly in WSN[8] multiple nodes are participating in communication so lots of energy is lost. So to save this energy and to avoid collision we have to activate only those nodes which are responsible in sending packets from source and destination. In the second module we are applying congestion control algorithm RT-MMF. For this purpose we considertheneighboringnodesofasender and calculate the distance between the node and the source and whichever node having minimum distance consider that node as the next one in our route and then repeat the procedure until we cannot reach our destination. To control thecongestionweapplyRT-MMF[4] algorithm. The RT is chosentocontroltherateatwhich the packets can be sent from each node. The control transmission rate is called Engineering Level (EL)(L(f; _) which is defined as the number of slots based on available bandwidth, in order to transmittheincoming packets (potentially after some buffering),withoutany additional loss or delay. This technique also allocates fair share of bandwidth to each packet while minimizing the occurrence of congestion. In this algorithm EL is the most important factor if it exceeds the threshold bandwidth, our communication will be stop and EL will be reset. The algorithm we used is as follows. Initialize EL=0. For(I=0; I<length; I++) { Repeat source to destination communication while loop length. El++; If(El==250) { Break; } } Prints(“The bandwidth limit exceed resulting El to zero(0)”); For the security purpose we are applying encryption and decryption algorithm. In order to safely broadcast messages from source to destination we have to encrypt the message. For this purpose we are using SHA-256 algorithm. The SHA-256 compression function operates on a 512-bit message block and a 256-bit intermediate hash value. It is essentiallya256- bit block cipher algorithm which encrypts the intermediate hash value using the message block as key. 5. RESULTS AND DISCUSSIONS Simulation[9] has been approved using a powerful Network Simulator-2(NS-2)[7]todetermine the performance of the proposed method. RT-MMF is purposely designed to provide high traffic rate during simultaneous data transmissions in WBSN [5].In this section firstly weseeourproposedsystemandthenwe will see the comparison between the previous system and proposed one through graph and tables. In our Start Network Formation Apply AODV Result Analysis 1st Phase Implementation of RT-MMF Apply SHA-256 Communication Starts Result 2nd Phase Stop
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1105 proposed system as we are using active and deactivation concept thatsavestheenergyofthenodes ultimately energy of the system and it reduce the most important problem that is collision. So the packet delivery ratio is high as compare to the AMBA algorithm. So in screenshot 4 we can see the basic network of our VANET , the active and deactive nodes which represent the shortest path to deliver packet from source to destination. Screenshot-4: Basic view of Proposed System Screenshot-5 : Packets delivered through source to destination In above screenshot 5 we can see how packets are delivered from source to destination. As we are using active deactive concept, the packets passed only through the active nodes and in this way we can save energy and time required to delivered packets. Screenshot-6: Minimum value calculation As shown in screenshot 6 we can see how the particular nodes are selected for transmission of the packets. From the root node we consider the neighboring nodes which are at minimal distance. Then according to their X and Y axis positionsofboth the nodes we calculate the distance. This procedure will be repeated for all the neighboring nodes which are nearer to the root node. Then after getting the entire node’s distance, we consider that node only that has minimum value. And that node will be the next node in the path of transmission. In this way we have to calculate the minimum distances and make route till the destination. Screenshot-7: Result of Proposed system Screenshot 7 shows the overall result of our proposed system. In which we can see the number of generated packets, received number packets, the ratio of packet delivery, total number of packets dropped and delay if any. Screenshot-8: Result of AMBA Technology After generatingtheresultdifferentgraphswill be generated in which we can see the comparison between two techniques.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1106 Table-1: Comparison between Energy values of RT-MMF and AMBA Method AMBA Energy Proposed System Energy 0 3 0 0 1 3 1 3 2 0 2 0 3 0 3 0 4 0 4 2 5 2 5 0 6 2 6 4 7 4 Chart-1: Comparison of Energy Value Table-2: Comparison between Jitter Values RT-MMF and AMBA Method AMBA Jitter Proposed System Jitter 0 0 0 0.000424 -0.000939 0.000283 -0.000352 0.000212 -0.000282 0.000074 -0.000027 0.000161 0.001051 -0.000563 0.001078 -0.000504 -0.004156 0.00018 -0.000064 -0.000489 0.000171 0.000326 -0.000764 -0.000291 -0.000828 -0.000435 -0.000671 -0.000143 -0.000822 0.000219 Chart- 2 : Comparison of Jitter Values
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107 Table-3: Comparison between Throughput Values AMBA Throughput Proposed System Throughput 8 8 16 17.6 24 27.2 32 36.8 40 46.4 48 56 56 65.6 64 75.2 73.6 84.8 83.2 94.4 92.8 104 102.4 109.6 112 118.4 121.6 126 131.2 131.6 Chart-3: Comparison graph of Throughput Values Table-4: Comparison Values of delay AMBA Delay Proposed System Delay 0 0 0.001408 0.000848 0 0.000848 0.000249 0.000848 0.001016 0.000729 0.000271 0.000848 0.004871 0.000003 0.000283 0.000017 0.001315 0.000724 0.000108 0 0.000948 0.000848 0.000739 0.000205 0.001234 0.000024 0.000925 0.000305 0 0.000683 Chart-4: Comparison of Delay values As we have seen the entire table and graphs which shows the comparison between the previous method AMBA and proposed method. From this graph we can
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1108 say that the AMBA is less efficient than the proposed system. 6.CONCLUSION In this project we are discussing about how we can avoid the problem of congestion and collision. For evaluation purposes, we have performed simulation analysis using NS-2[12] and showed that across multiple nodes scenarios RT-MMF always performs much better than the previous one. Here we are comparing the results of two techniques one is previously invented AMBA and the other one is proposedRT-MMFtechnique.ByusingRT-MMFwecan avoid congestion andcollisioninthenetwork.RT-MMF is able to reduce congestion during simultaneous data transmission, which is a significant indication of its efficiency. By using encryption decryption we can ensure the security of messages that are transmitted over the network. Energy required for execution will required less. As we are calculating throughput i.e. the ratio of packets delivered from source to destinationis more than the AMBA. From the results we conclude that our proposed system is more efficient than the previous one. 7. FUTURE SCOPE As we have performed this project using simulation but we can do this project in real time also. But the cost goes very high. As this project is very useful in the area where the trafficisthemaincause.So we can use this project using some hardware equipments and sensors. We can use this project in parking areas also as in high traffic area parking of vehicles is very difficult task so by implementing this project in future we can solvetheparkingslotproblem. Future workincludes the thought ofnetworkcodingas a way to increase routability, improve congestion and overflow prevention. This technique offers several advantages including solving complicated routing that cannot be solved using the traditional approach. REFERENCES [1] Varsha H , Pradeep. S,” Enhanced Performance Evaluation for Broadcasting Safety Messages In VANET”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1595-1598 [2] Meenal Pannase Priority Based Congestion Control for VANET: Review International Journal of Advance Research in Computer Science and Management Studies Volume2,Issue1, January 2014. [3] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, “(CODA): congestion detection and avoidance in sensor etworks,” in Proceedings of the 1st international conference on Embedded networked sensor systems,ser.SenSys’03.NewYork,NY,USA: ACM, 2003, pp. 266–279. [4] Naimah Yaakob, Member, IEEE, and Ibrahim Khalil, Senior Member, IEEE,” A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission”, JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,VOL. XX, NO. X, FEBRUARY 2015. [5] Naimah Yaakob, Member, IEEE, and Ibrahim Khalil, Senior Member, IEEE,” A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission”, JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,VOL. XX, NO. X, FEBRUARY 2015. [6] N. Yaakob, I. Khalil, and J. Hu, “On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks,” in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare Mobihealth. Greece: Springer, 2011, pp. 16–23. [7] Teerawat Issariyakul , EkramHossain,”IntroductiontoNetwork Simulator NS2”, ISBN:978-0-387-71759-3e-ISBN:978-0-387- 71760-9 DOI: 10.1007/978-0-387-71760-9 Library of Congress Control Number: 2008928147 ,2009 Springer Science Business Media, LLC. [8] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong,” Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic”. [9] R. E. Shannon, “Introduction to the art and science of simulation,” in Proc. Of the 30th conference on Winter simulation (WSC’98), 1989.