SlideShare a Scribd company logo
Impromptu Idea in Respect
of Robotics
Communication
By Harshit Srivastava
A Historic Idea
• In star wars “The phantom of menace” we learned
one thing,
• The bad robots had centralized failure, and whole
army was useless when main controlling computer
was destroyed.
Solution
• So, for controlling of future robot a distributed
communication approach should be followed.
• The distributed approach requires a complex
management system, but gives robustness.
• But, the environment is unpredictable and can be
unplanned so, a cooperative mechanism is needed.
• One feature of store command and use it when
needed( Can be used for high latency)
• Prioritization.
• The next key thing is “Prediction.”
Note:
• Still, I believe the centralized and distributed
communication if can be combined where the
centralized system can be changed dynamically.
• Then, probability of failure will decrease
enormously.
Lets say!
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
Lets say!(A more predictable)
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
• So, in previous slide an approach towards creating a
temporary centralized network through distributed
system.
• Now, the problems are,
• How to determine super node(centralized node)
• If previous super node has failed how to create new or
find new super node.
Now we again look into the model
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
Greedy Node
Greedy Node
Greedy Node
Greedy Node
• So, we can go through network science and say that if
the greedy node is present in a network the graph will
grow as scale free network.
• This scale free network has a can be said small-world
network. This network where the average shortest path
length between its nodes is very small compared to the
total number of nodes in the network.
• Average shortest path length which grows
proportionally to the logarithm of the number of nodes
of the network.
𝐿(𝑁) ∝ log(𝑁)
Prediction Approach
• So, for prediction approach two methods I think we can look into
• Through Jaccard Coefficient where the set of similarities is measured to
predict node.
• Another, method is through Hidden Markov Model(Markov process and
Markov chain).
• Since, for HMM state at discrete moment of timein basically
unknown, only physical event is observed, where the observation is
a probabilistic function of hidden state and can be characterized as,
• N, number of states in the model. The individual states can be denoted as
𝑠 = (𝑠1, 𝑠2 , 𝑠3 … . . , 𝑠 𝑁 )
• M, the number of distinct observation symbols. The individual symbols can
be denoted as O= {𝑜1, 𝑜2 , 𝑜3 … , 𝑜 𝑀 }
• The state transition probability matrix 𝐴 𝑁𝑋𝑀 = {𝑎𝑖𝑗}(1 ≤ 𝑗 ≤ 𝑁)
• The observation symbol probability matrix
𝐵 𝑁𝑋𝑀 = 𝑏𝑗𝑘 𝑤ℎ𝑒𝑟𝑒 𝑏𝑗𝑘 = 𝑃 𝑂 𝑘 𝑎𝑡 𝑡 𝑆𝑡 = 𝑠𝑗 , 𝑡 = 1,2. .
• The initial state distribution vector 𝜋 = {𝜋𝑖} where:
𝜋𝑖 = 𝑃 𝑆1 𝑠𝑖 , 1 ≤ 𝑖 ≤ 𝑁
• Where 𝑆𝑡 denotes the state space at 𝑡 time.
References
• Shahzad A.Malik,Madad Ali Shah, Shahid A.Khan,M.Jahanzeb, Umar Farooq and Adnan,
Performance Evaluation of IEEE 802.11p MAC Protocol for VANETs; Khan. Australian
Journal of Basic and Applied Sciences, 4(8): 4089-4098, 2010.
• Mir, Zeeshan Hameed, and Fethi Filali. "LTE and IEEE 802.11 p for vehicular networking: a
performance evaluation." EURASIP Journal on Wireless Communications and
Networking 2014.1 (2014): 1-15.
• Robert Gallager, “Stochastic Process and its application”
• Zhigang Wang, Lichuan LIU, “Protocols and applications of Ad-hoc robot wireless
communication networks: Overview”, International Journal of Intelligent Control and
Systems.
Thank you
• Let’ say we have any one of finite or countable
infinite states(𝑠1, 𝑠2, 𝑠3 … 𝑠 𝑛) and 𝜏 denote set of
states and is a state space of system for time=1,2,..T
• 𝑆𝑡 denotes the state space at 𝑡 time. Then first
order Markov chain prob. of the system 𝑆𝑡 at time 𝑡
and depends only on the previous state of 𝑡 − 1 as,
• Type equation here.
Drones Drones
Controlling Nodes
Controlling Nodes
Introduction through VANETS
• A vehicular Ad-Hoc Network (VANET) is a technology that
uses moving vehicles as nodes in a network to create a
mobile network.
• VANET turns every participating vehicle into a wireless
router or node, and in turn create a network with a wide
range.
Goal: Provide Road Safety
Challenges in V2V:
1.Relative speed
2.Anonymity
3.Changes in position
Case Study: As More vehicles and range increase in VANET
lead to reduce access prob. by 35%.[1]
Ideas that were floated
Future
Research
Scope
Vehicula
r Cloud
Mac
Layer
Protocol
Mobility
Model
Image
Processing
Fault
ToleranceVehicular
Cloud
Mac
Layer
Protocol
Mobility
Model
Routing
Algorithm
Design
So what we can choose?
• We can easily analyse that information hopping should be fast, so if
node is lost then next super node should be found for information
hopping, and that node should depend on prediction.
• So, what we can do, for prediction in network, Jaccard Coefficient for
predicting next super node.(jaccard algo can also be sued to refine data
and predicting the best node)
𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 =
𝑠𝑒𝑡 𝑥 ∩ 𝑠𝑒𝑡 𝑦
𝑠𝑒𝑡 𝑥 ∪ 𝑠𝑒𝑡 𝑦
Or , 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑙=1
∞
𝛽 𝑙
|𝑝𝑎𝑡ℎ𝑠 𝑥,𝑦
𝑙
|
• In which similarity of nodes are found.
• If we look this network in new aspect, we should try to model it as a
scale free network.
• Now, if there is a network and nodes, lets take a look in respect of
network science.
• In this the connectivity can easily be defined according to scale free
property.
• So, there should be a feature that can store
protocol commands and can restore when needed.
Is scale free relevant?
• Since we know, A small-world network is a network
where the average shortest path length between its
nodes is very small compared to the total number
of nodes in the network.
• Average shortest path length which grows
proportionally to the logarithm of the number of
nodes of the network.
𝐿(𝑁) ∝ log(𝑁)
Scale free has a special property, in which structure
of network remains same regardless of scale of
observation.
A(v,a) B(v’,a) C(v’’,a)
Now after t time B changes acceleration
• Since last slide shows the network connection of
different vehicles.
• To comprehend that, we have data grabber
nodes(cloud), super node.
• The problem here lies, if super node is dropped or
changed, which one to choose to hop information.
• Many, algorithms can be tried like short path and link
state, but all requires destination node and they
determine first path before sending the data.
• So, what we can choose?
• We know scale free have fault tolerant behaviour,
like if failure occurs in random and vast majority of
nodes have small degree, then most probably hub
will be safe.
• Another property of clustering coefficient which
decreases as node degree increases
What can this give?
• Can help us to define fast routing protocols in
which node changes quickly.
• This allows a vehicle to determine whether it is the
vehicle with the higher number of neighbours in
the network.
• Then this node vehicle can be utilized for
information hoping.
Future Delivery System.
• Last year Amazon has tested their drones to deliver
parcels.
• But, still, drone delivery system is at preliminary stage,
as still I believe proper ground is not prepared for there
control.
• For, me the main problem is like how to control these
drones when to deliver good for larger distance.
• So, I think this vehicular communication can indirectly
solve this in respect of virtual cloud control, in
delivering command with low latency.
One Future communication
• Brain to machine communication
• Brain machine interface can be said as neural
interface with computer.
• Brain machine communication can be used as
command , control and communicate with the
integrated systems
Lte for Vehicular Communication
Issues
• Coverage and mobility: This will rely only on nodes
organised by network infrastructure.
• Centralized architecture: It can not natively support
V2V, but require passing through infrastructure
nodes that should intercept and distribute.
• Channel and transport modes have problem.

More Related Content

PDF
Simulation of Wireless Sensor Networks
PDF
Big data and machine learning for network research problems
PPT
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
PPTX
WSN Routing Protocols
PDF
Wireless sensor networks routing protocols
PDF
C04511822
PDF
Q026201030106
PPTX
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
Simulation of Wireless Sensor Networks
Big data and machine learning for network research problems
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
WSN Routing Protocols
Wireless sensor networks routing protocols
C04511822
Q026201030106
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...

What's hot (19)

PDF
Implementation of Spanning Tree Protocol using ns-3
PDF
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
PDF
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
PPTX
PDF
International Refereed Journal of Engineering and Science (IRJES)
PPTX
3D routing algorithm for sensor network in e-health
PDF
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
PDF
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
PDF
Entanglement Distribution
PDF
Distributed Approach for Clock Synchronization in Wireless Sensor Network
PPTX
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
PPTX
Hierarchical Temporal Memory for Real-time Anomaly Detection
PDF
Distribution of maximal clique size under
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PPTX
Resource management
PPTX
A Survey of Convolutional Neural Networks
PDF
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Implementation of Spanning Tree Protocol using ns-3
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
International Refereed Journal of Engineering and Science (IRJES)
3D routing algorithm for sensor network in e-health
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Entanglement Distribution
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Hierarchical Temporal Memory for Real-time Anomaly Detection
Distribution of maximal clique size under
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
Resource management
A Survey of Convolutional Neural Networks
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Ad

Viewers also liked (6)

PDF
Introduction to intel galileo board gen2
PPT
Baseband processor final rev
PPT
Stepper Motor
PPTX
Synchronous motor drive
PPT
Stepper motor
PPTX
Communication ppt
Introduction to intel galileo board gen2
Baseband processor final rev
Stepper Motor
Synchronous motor drive
Stepper motor
Communication ppt
Ad

Similar to Impromptu ideas in respect of v2 v and other (20)

PDF
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
DOCX
Efficient algorithms for neighbor discovery in wireless networks
PDF
An efficient vertical handoff mechanism for future mobile network
PPTX
System Fundamentals was explained perfectly
PDF
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
PDF
Design and Development of Intelligent Navigation Control Systems for Autonomo...
PDF
Aa04404164169
DOCX
A framework for routing performance analysis in delay tolerant networks with ...
PPTX
Network Layer
DOCX
Efficient algorithms for neighbor discovery in wireless networks
PPTX
Performance and traffic management for WSNs
DOCX
JPD1428 Multicast Capacity in MANET with Infrastructure Support
ODP
From Simulation to Online Gaming: the need for adaptive solutions
PDF
Introduction to Deep learning Models.pdf
PPTX
Deep learning
PDF
Computer Networks Lecture Notes
PDF
Lecture Notes for computer networks subject
PPTX
Transfer reliability and congestion control strategies in opportunistic netwo...
PDF
Producer consumer-problems
PPTX
under wireless communication prediction using deeplearning water PPT.pptx
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Efficient algorithms for neighbor discovery in wireless networks
An efficient vertical handoff mechanism for future mobile network
System Fundamentals was explained perfectly
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Design and Development of Intelligent Navigation Control Systems for Autonomo...
Aa04404164169
A framework for routing performance analysis in delay tolerant networks with ...
Network Layer
Efficient algorithms for neighbor discovery in wireless networks
Performance and traffic management for WSNs
JPD1428 Multicast Capacity in MANET with Infrastructure Support
From Simulation to Online Gaming: the need for adaptive solutions
Introduction to Deep learning Models.pdf
Deep learning
Computer Networks Lecture Notes
Lecture Notes for computer networks subject
Transfer reliability and congestion control strategies in opportunistic netwo...
Producer consumer-problems
under wireless communication prediction using deeplearning water PPT.pptx

More from Harshit Srivastava (20)

PPTX
Prediction approach in predicting next user choice
PPTX
Introduction to equalization
PDF
Scale free network Visualiuzation
PPT
PPTX
Emic Effects on controlling automobile safety
PPTX
Emic effects in radio frequency instruments
PPT
Vacuum circuit breaker
PPT
Roboticsin army
PPT
Quark particles
PPT
Power system contingencies
PPT
Power plant technology
PPT
Optical tweezers
PPT
Nuclear technology
PPT
E waste management in india
PPT
Carbon nanotubes
PPT
Anti collision technology of crashless cars
PPTX
Areva "Manufacturing of transformer, uses & it’s accessories"
ODP
Operating Systems As a Product
PPTX
Sora- A High Performance Baseband DSP Processor
Prediction approach in predicting next user choice
Introduction to equalization
Scale free network Visualiuzation
Emic Effects on controlling automobile safety
Emic effects in radio frequency instruments
Vacuum circuit breaker
Roboticsin army
Quark particles
Power system contingencies
Power plant technology
Optical tweezers
Nuclear technology
E waste management in india
Carbon nanotubes
Anti collision technology of crashless cars
Areva "Manufacturing of transformer, uses & it’s accessories"
Operating Systems As a Product
Sora- A High Performance Baseband DSP Processor

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Welding lecture in detail for understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
573137875-Attendance-Management-System-original
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Welding lecture in detail for understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
573137875-Attendance-Management-System-original
Arduino robotics embedded978-1-4302-3184-4.pdf
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Digital Logic Computer Design lecture notes
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Foundation to blockchain - A guide to Blockchain Tech
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx

Impromptu ideas in respect of v2 v and other

  • 1. Impromptu Idea in Respect of Robotics Communication By Harshit Srivastava
  • 2. A Historic Idea • In star wars “The phantom of menace” we learned one thing, • The bad robots had centralized failure, and whole army was useless when main controlling computer was destroyed.
  • 3. Solution • So, for controlling of future robot a distributed communication approach should be followed. • The distributed approach requires a complex management system, but gives robustness. • But, the environment is unpredictable and can be unplanned so, a cooperative mechanism is needed. • One feature of store command and use it when needed( Can be used for high latency) • Prioritization. • The next key thing is “Prediction.”
  • 4. Note: • Still, I believe the centralized and distributed communication if can be combined where the centralized system can be changed dynamically. • Then, probability of failure will decrease enormously.
  • 5. Lets say! RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted
  • 6. Lets say!(A more predictable) RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted
  • 7. • So, in previous slide an approach towards creating a temporary centralized network through distributed system. • Now, the problems are, • How to determine super node(centralized node) • If previous super node has failed how to create new or find new super node.
  • 8. Now we again look into the model RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted Greedy Node Greedy Node Greedy Node Greedy Node
  • 9. • So, we can go through network science and say that if the greedy node is present in a network the graph will grow as scale free network. • This scale free network has a can be said small-world network. This network where the average shortest path length between its nodes is very small compared to the total number of nodes in the network. • Average shortest path length which grows proportionally to the logarithm of the number of nodes of the network. 𝐿(𝑁) ∝ log(𝑁)
  • 10. Prediction Approach • So, for prediction approach two methods I think we can look into • Through Jaccard Coefficient where the set of similarities is measured to predict node. • Another, method is through Hidden Markov Model(Markov process and Markov chain). • Since, for HMM state at discrete moment of timein basically unknown, only physical event is observed, where the observation is a probabilistic function of hidden state and can be characterized as, • N, number of states in the model. The individual states can be denoted as 𝑠 = (𝑠1, 𝑠2 , 𝑠3 … . . , 𝑠 𝑁 ) • M, the number of distinct observation symbols. The individual symbols can be denoted as O= {𝑜1, 𝑜2 , 𝑜3 … , 𝑜 𝑀 } • The state transition probability matrix 𝐴 𝑁𝑋𝑀 = {𝑎𝑖𝑗}(1 ≤ 𝑗 ≤ 𝑁) • The observation symbol probability matrix 𝐵 𝑁𝑋𝑀 = 𝑏𝑗𝑘 𝑤ℎ𝑒𝑟𝑒 𝑏𝑗𝑘 = 𝑃 𝑂 𝑘 𝑎𝑡 𝑡 𝑆𝑡 = 𝑠𝑗 , 𝑡 = 1,2. . • The initial state distribution vector 𝜋 = {𝜋𝑖} where: 𝜋𝑖 = 𝑃 𝑆1 𝑠𝑖 , 1 ≤ 𝑖 ≤ 𝑁 • Where 𝑆𝑡 denotes the state space at 𝑡 time.
  • 11. References • Shahzad A.Malik,Madad Ali Shah, Shahid A.Khan,M.Jahanzeb, Umar Farooq and Adnan, Performance Evaluation of IEEE 802.11p MAC Protocol for VANETs; Khan. Australian Journal of Basic and Applied Sciences, 4(8): 4089-4098, 2010. • Mir, Zeeshan Hameed, and Fethi Filali. "LTE and IEEE 802.11 p for vehicular networking: a performance evaluation." EURASIP Journal on Wireless Communications and Networking 2014.1 (2014): 1-15. • Robert Gallager, “Stochastic Process and its application” • Zhigang Wang, Lichuan LIU, “Protocols and applications of Ad-hoc robot wireless communication networks: Overview”, International Journal of Intelligent Control and Systems.
  • 13. • Let’ say we have any one of finite or countable infinite states(𝑠1, 𝑠2, 𝑠3 … 𝑠 𝑛) and 𝜏 denote set of states and is a state space of system for time=1,2,..T • 𝑆𝑡 denotes the state space at 𝑡 time. Then first order Markov chain prob. of the system 𝑆𝑡 at time 𝑡 and depends only on the previous state of 𝑡 − 1 as, • Type equation here.
  • 15. Introduction through VANETS • A vehicular Ad-Hoc Network (VANET) is a technology that uses moving vehicles as nodes in a network to create a mobile network. • VANET turns every participating vehicle into a wireless router or node, and in turn create a network with a wide range. Goal: Provide Road Safety Challenges in V2V: 1.Relative speed 2.Anonymity 3.Changes in position Case Study: As More vehicles and range increase in VANET lead to reduce access prob. by 35%.[1]
  • 16. Ideas that were floated Future Research Scope Vehicula r Cloud Mac Layer Protocol Mobility Model Image Processing Fault ToleranceVehicular Cloud Mac Layer Protocol Mobility Model Routing Algorithm Design
  • 17. So what we can choose? • We can easily analyse that information hopping should be fast, so if node is lost then next super node should be found for information hopping, and that node should depend on prediction. • So, what we can do, for prediction in network, Jaccard Coefficient for predicting next super node.(jaccard algo can also be sued to refine data and predicting the best node) 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑠𝑒𝑡 𝑥 ∩ 𝑠𝑒𝑡 𝑦 𝑠𝑒𝑡 𝑥 ∪ 𝑠𝑒𝑡 𝑦 Or , 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑙=1 ∞ 𝛽 𝑙 |𝑝𝑎𝑡ℎ𝑠 𝑥,𝑦 𝑙 | • In which similarity of nodes are found. • If we look this network in new aspect, we should try to model it as a scale free network. • Now, if there is a network and nodes, lets take a look in respect of network science. • In this the connectivity can easily be defined according to scale free property.
  • 18. • So, there should be a feature that can store protocol commands and can restore when needed.
  • 19. Is scale free relevant? • Since we know, A small-world network is a network where the average shortest path length between its nodes is very small compared to the total number of nodes in the network. • Average shortest path length which grows proportionally to the logarithm of the number of nodes of the network. 𝐿(𝑁) ∝ log(𝑁) Scale free has a special property, in which structure of network remains same regardless of scale of observation.
  • 20. A(v,a) B(v’,a) C(v’’,a) Now after t time B changes acceleration
  • 21. • Since last slide shows the network connection of different vehicles. • To comprehend that, we have data grabber nodes(cloud), super node. • The problem here lies, if super node is dropped or changed, which one to choose to hop information. • Many, algorithms can be tried like short path and link state, but all requires destination node and they determine first path before sending the data. • So, what we can choose?
  • 22. • We know scale free have fault tolerant behaviour, like if failure occurs in random and vast majority of nodes have small degree, then most probably hub will be safe. • Another property of clustering coefficient which decreases as node degree increases
  • 23. What can this give? • Can help us to define fast routing protocols in which node changes quickly. • This allows a vehicle to determine whether it is the vehicle with the higher number of neighbours in the network. • Then this node vehicle can be utilized for information hoping.
  • 24. Future Delivery System. • Last year Amazon has tested their drones to deliver parcels. • But, still, drone delivery system is at preliminary stage, as still I believe proper ground is not prepared for there control. • For, me the main problem is like how to control these drones when to deliver good for larger distance. • So, I think this vehicular communication can indirectly solve this in respect of virtual cloud control, in delivering command with low latency.
  • 25. One Future communication • Brain to machine communication • Brain machine interface can be said as neural interface with computer. • Brain machine communication can be used as command , control and communicate with the integrated systems
  • 26. Lte for Vehicular Communication
  • 27. Issues • Coverage and mobility: This will rely only on nodes organised by network infrastructure. • Centralized architecture: It can not natively support V2V, but require passing through infrastructure nodes that should intercept and distribute. • Channel and transport modes have problem.

Editor's Notes

  • #11: Given present state past history does not affect conditional prob. of events defined in the future and markov chain are discrete parameter of markov process whse state space is finite or infinite.