๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Vehicular Networks


Publisher
Wiley-ISTE
Year
2013
Tongue
English
Leaves
294
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Over the last few years vehicular networks have been receiving a lot of attention from academia, industry, standardization bodies, and the various transportation agencies and departments of many governments around the world. It is envisaged in the next decade that the Intelligent Transportation System (ITS) will become an essential part of our daily life.
This book describes models and/or algorithms designed to investigate evolutionary solutions to overcome important issues such as congestion control, routing, clustering, inter-connection with long-term evolution (LTE) and LTE advanced cellular networks, traffic signal control and analysis of performances through simulation tools and the generation of vehicular mobility traces for network simulations.
It provides an up-to-date progress report on the most significant contributions carried out by the specialized research community in the various fields concerned, in terms of models and algorithms. The proposals and new directions explored by the authors are highly original, and a rather descriptive method has been chosen, which aims at drawing up complete states of the art as well as providing an overall presentation of the personal contributions brought by the authors and clearly illustrating the advantages and limitations as well as issues for future work.

Contents

1. Introduction
2. Congestion Control for Safety Vehicular Ad-Hoc Networks
3. Inter-Vehicle Communication for the Next Generation of Intelligent Transport System: Trends in Geographic Ad Hoc Routing Techniques
4. CONVOY: A New Cluster-Based Routing Protocol for Vehicular Networks
5. Complementarity between Vehicular Networks and LTE Networks
6. Gateway Selection Algorithms in a Hybrid VANET-LTE Advanced Network
7. Synthetic Mobility Traces for Vehicular Networking
8. Traffic Signal Control Systems and Car-to-Car Communications

Content:
Chapter 1 Congestion Control for Safety Vehicular Ad Hoc Networks (pages 1โ€“38): Razvan Stanica, Emmanuel Chaput and Andre?Luc Beylot
Chapter 2 Inter?Vehicle Communication for the Next Generation of Intelligent Transport Systems: Trends in Geographic Ad Hoc Routing Techniques (pages 39โ€“89): Xunxing Diao, Kun?Mean Mou, Jian?Jin Li and Haiying Zhou
Chapter 3 CONVOY: A New Cluster?Based Routing Protocol for Vehicular Networks (pages 91โ€“129): Veronique Veque, Florent Kaisser, Colette Johnen and Anthony Busson
Chapter 4 Complementarity between Vehicular Networks and LTE Networks (pages 131โ€“170): Guillaume Remy, Sidi?Mohammed Senouci, Francois Jan and Yvon Gourhant
Chapter 5 Gateway Selection Algorithms in Vehicular Networks (pages 171โ€“208): Ghayet el ouna Zhioua, Houda Labiod, Nabil Tabbane and Sami Tabbane
Chapter 6 Synthetic Mobility Traces for Vehicular Networking (pages 209โ€“245): Sandesh Uppoor, Marco Fiore and Jerome Harri
Chapter 7 Traffic Signal Control Systems and Car?to?Car Communications (pages 247โ€“277): Mounir Boussedjra, Nitin Maslekar, Joseph Mouzna and Houda Labiod

โœฆ Table of Contents


Title Page
......Page 2
Copyright
......Page 3
Contents
......Page 4
Introduction......Page 9
1.1. Introduction......Page 15
1.2. Beaconing frequency......Page 19
1.3. Data rate......Page 21
1.4. Transmission power......Page 24
1.5. Minimum contention window......Page 26
1.6. Physical carrier sense......Page 39
1.7. Conclusion......Page 45
1.8. Bibliography......Page 46
2.1. Introduction......Page 53
2.2. IVC-relating ITS projects......Page 56
2.3.1. WLAN and WPAN up to 300 m......Page 59
2.3.2. Dedicated short-range communication up to 1 km......Page 61
2.3.3. Cellular networks more than 1 km......Page 63
2.3.4.Comparison......Page 64
2.4.1. Features of VANET......Page 66
2.4.2. Localization......Page 68
2.4.2.1. Flooding-based localization......Page 70
2.4.2.2. Update and query localization......Page 71
2.4.2.3. Summary......Page 75
2.4.3.1. Basic forwarding strategies......Page 76
2.4.3.2. Void area recovery......Page 80
2.4.3.3. Other than recovery......Page 85
2.4.4.1. Restricted directional flooding......Page 86
2.4.4.2. Flooding-based geocast for VANETs......Page 88
2.4.5.1. Last encounter routing......Page 89
2.4.5.2. Carry-and-forward routing......Page 91
2.5. Conclusion and open issues......Page 93
2.7. Bibliography......Page 95
3.1. Introduction......Page 104
3.2.1. General remarks on the partitioning of mobilead hoc networks......Page 107
3.2.2. Controlling the number of hops......Page 109
3.2.3. Controlling the number of nodes......Page 110
3.3. Mobility-based clustering in ad hoc vehicular networks......Page 111
3.3.1. The dynamics of vehicular traffic in VANETs......Page 112
3.3.4. Clustering depending on the direction of the movement movement-based......Page 114
3.3.5. Clustering depending on the radio link quality......Page 115
3.3.6. Clustering depending on speed and relative speed......Page 116
3.3.7. Clustering depending on the position, speed and direction......Page 117
3.4.1. Cluster-based MAC protocol......Page 118
3.4.2. Clustering for transport applications......Page 119
3.5. CONVOY: a vehicle convoy formation protocol......Page 121
3.5.2. Convoy formation algorithm......Page 123
3.5.2.1. Convoy merger......Page 124
3.5.2.2. Division of the convoys......Page 128
3.6. Assessment of the convoy formation protocol......Page 130
3.6.1.1. Maximum length of a convoy......Page 132
3.6.2. Distribution of the length of convoys......Page 133
3.6.3. Convoy stability......Page 134
3.7. Conclusion......Page 136
3.8. Bibliography......Page 137
4.1. Introduction......Page 143
4.2. State of the art......Page 147
4.3.1. Network organization mechanisms for areas completely covered by LTE......Page 151
4.3.2. Network organization mechanisms for areas that are not completely covered by LTE......Page 152
4.4. Detailed description of the LTE4V2X-C protocol......Page 153
4.4.1. Initialization phase......Page 155
4.4.2.2. Departure of a node......Page 157
4.4.2.3 Periodical operations......Page 158
4.4.2.4. Collection and aggregation phase......Page 160
4.4.3. Extension for the areas not covered by the LTE......Page 161
4.5. A detailed description of the LTE4V2X-D protocol......Page 163
4.6.1.Hypotheses......Page 165
4.6.2.The results of the simulation and their analysis......Page 168
4.6.3.Analysis of the impact of the handover......Page 176
4.6.3.1. Impact of the handover on the LTE4V2X-C protocol......Page 177
4.6.3.2. Impact of the handover on the DCP protocol......Page 178
4.7. Conclusion......Page 180
4.8. Bibliography......Page 181
5.1. Introduction......Page 183
5.2.1.1. Problem statement......Page 185
5.2.1.2. State of the art......Page 186
5.2.2. Gateway selection in a clustered/non-clustered VANET architecture......Page 189
5.2.2.2. Related works......Page 190
5.2.3. Conclusions......Page 193
5.3.1. Problem statement......Page 194
5.3.2. LTE-advanced standard......Page 195
5.3.3.1. System model......Page 199
5.3.3.2 QoS-balancing gateway selection algorithm......Page 201
5.3.3.3 Performances evaluation......Page 211
5.3.4. Conclusions......Page 216
5.4. Conclusion......Page 217
5.5. Bibliography......Page 218
6.1. Introduction......Page 221
6.2.1. Road topology database......Page 224
6.2.2. Microscopic traffic flow description......Page 227
6.2.3. Macroscopic road traffic description......Page 230
6.3.1. Microscopic traffic simulators......Page 232
6.3.2. Mesoscopic traffic simulators......Page 233
6.3.3. Macroscopic traffic simulators......Page 234
6.3.4.1. Calibrating simulators......Page 235
6.3.4.2. Interaction between simulators for vehicular networking......Page 236
6.4. Mobility traces......Page 238
6.4.1. Perception......Page 239
6.4.2. Small-scale measurements......Page 242
6.4.3. Road traffic imagery......Page 243
6.4.4. Roadside detectors......Page 244
6.4.5. Sociodemographic surveys......Page 245
6.4.6. Discussion......Page 249
6.5. Bibliography......Page 252
7.1. Introduction......Page 258
7.2. Classification of traffic signal control systems......Page 260
7.2.1. Static systems......Page 261
7.2.2. Dynamic systems......Page 262
7.2.2.1. Actuated signal control......Page 263
7.2.2.2. Responsive signal control......Page 264
7.2.2.3. Adaptive signal control......Page 269
7.4. Summary and conclusion......Page 280
7.5. Bibliography......Page 284
List of Authors......Page 289
Index......Page 291


๐Ÿ“œ SIMILAR VOLUMES


Vehicular Networks
โœ Hassnaa Moustafa, Yan Zhang ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Auerbach Publications ๐ŸŒ English

As Vehicular Networks technology enters a critical phase in its evolution, academic institutions, industry, and governments worldwide are investing significant resources into large-scale deployment of such networks in order to leverage its benefits to communication, road safety, and improved traffic

Heterogeneous Vehicular Networks
โœ Kan Zheng, Lin Zhang, Wei Xiang, Wenbo Wang (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This brief examines recent developments in the Heterogeneous Vehicular NETworks (HETVNETs), integrating cellular networks with Dedicated Short-Range Communication (DSRC) for meeting the communications requirements of the Intelligent Transport System (ITS)services. Along with a review of recent

Vehicular social networks
โœ Anna Maria Vegni, Valeria Loscrรฌ, Athanasios V. Vasilakos ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› CRC Press ๐ŸŒ English

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehi

Security Assessment in Vehicular Network
โœ Suguo Du, Haojin Zhu (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p>This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based method