traditional MANET routing protocol cannot be used insparse MANETs. A key challenge is to find a route thatcan provide good delivery performance and low endto‐enddelay in a disconnected graph where nodesmay move freely.To overcome this issue, node mobility is exploited tophysically carry messages between disconnected partsof network. The scheme that exploits the nodemobility, referred to as mobility assisted routing thatemploys the store‐carry‐and‐forward model is used.Mobility assisted routing consists of each nodeindependently making forwarding decisions that takeplace when two nodes meet.In VANET, when few vehicles are equipped withwireless transceivers, network will be sparse; delaytolerant routing algorithms are needed. The proposedMotion Vector Algorithm (MOVE) [8] for V2R VANETconsiders sparse network where prior prediction mustbe made for rare opportunistic routing. It is assumedthat every node has knowledge of its own positionand heading, where destination is a fixed globallyknown location. From this current vehicular nodefinds closest distance between vehicle and messagedestination along its trajectory. Current vehicularnode periodically sends HELLO message. Neighbouringnodes sends RESPONSE message to make itself knownto current vehicular node. Given the direction ofwhere neighbouring node is heading; current nodedetermines the shortest distance to destination alongthe trajectory of neighbouring node. The current nodethen makes decision to forward the message whiledetermining the each vehicle’s current distance fromdestination. This algorithm where data delivery rate ishigher for sparse network, compared to greedy,position based routing and uses less system bufferspace. With resulted performance evaluation, authorshave noted that if routes are consistent and uniform,greedy position based routing performs better thanMOVE.In line with MOVE algorithm another algorithm calledScalable Knowledge based Vehicular Routing (SKVR)[1], also makes the usage of the predictable routes andvehicle schedules. It divides the network in interdomainand intra‐domain. In inter‐domain routingsource and destination belong to different routeswhereas in intra‐domain source and destinationbelong to same route. In inter‐domain algorithm,message is forwarded to a vehicle travelling indestination domain and once destination domain isreached intra‐domain message delivery procedure willbe followed. In intra‐domain messages are sent inforward or reverse directions, depending on theentires of contact list. If the sending vehicle contactlist does not contain any vehicle in the destination’sdomain, then messages are delivered to the otherACTA TECHNICA CORVINIENSIS – Bulletin of Engineeringvehicles in contact list. When vehicles along the sameroute encounter one another, a node carrying amessage must decide whether to continue bufferingthe message, or to forward it, based on the directioninformation of the vehicle.Using strategy called ‘carry‐and‐forward’ VehicleAssisted Data Delivery (VADD) [17] algorithm allowspackets to be carried by vehicles in sparse networkand eventually relaying it to appropriate node when itenters in broadcasting range. Each node in VADDknows its own position and also requires externalstreet map that includes traffic statistics. Selection ofthe candidate node, to which message need to beforwarded, is encountered through different selectioncriteria. However such criteria are either not scalableor consumes more bandwidth through duplication ofpackets. Authors have observed while using VADD,network becomes unstable as vehicle densitydecreased, because optimal paths were not availableand because algorithm relies upon probabilistic trafficdensity information.Unlike VADD, Static Node Assisted Adaptive Vehicularrouting (SADV) [6] where static node has capability tostore a message until it can forward the message to anode travelling on the optimal path. Algorithm alsodynamically adapts to varying traffic densities innetwork, so that every node can measure the amountof time required to deliver message. However like any‘store‐and‐forward’ this algorithm requires theefficient buffer management. By using ‘Least DelayIncrease’ strategy, where static node checks whichpaths are currently available and eliminates packetswhich will not significantly increase their deliverydelay.Routing called Geographical Opportunistic (GeOpps)[9] routing in delay tolerant network is usingopportunistic routing with carry‐and‐forwardapproach to route messages. Algorithm assumes thatvehicle is using GPS and Navigation system that helpsto route and locate static road site unit.D. Quality of Service (QoS)QoS routing strategy is not followed by any traditionalMANET routing protocols. However there are researchattempt to integrate such strategies within MANETrouting protocols.Multi‐hop Routing Protocols for Urban VANET (MURU)[13], estimates quality factors of a route based onvehicle position, speed and trajectories. Based on thisquality factors MURU introduces new metric called‘Expected Disconnection Degree’ (EDD). Hence MURUnodes need to know its own position and haveexternal street map including presence of efficientlocation service. This new metric value considered tobe low as EDD, is an estimation of probability thatdetermines the breakability of route during given time1042012. Fascicule 3 [July–September]
ACTA TECHNICA CORVINIENSIS – Bulletin of Engineeringperiod. Based on destination location and street map,source node calculates the shortest trajectory to thedestination to find route to destination. This shortesttrajectory detail is stored in the packet and is used as adirectional guideline for Route Request (RREQ)message. Node receiving RREQ message calculatesEDD of the link between two subsequent nodes.MURU uses pruning method to improve the scalabilityof RREQ message, where node receiving RREQmessage will wait for backoff delay that is directlyproportional to the EDD between the previousforwarder of RREQ and current one. During thisbackoff interval the node determines whether to dropthe RREQ message or rebroadcast it. Nevertheless, byusing pruning method broadcasting area iterativelybecomes smaller to receive RREQ broadcast.Eventually when destination receives the RREQmessage from different routes, it selects the routewith smallest EDD. This smaller broadcasting area isproblematic if the next hop node is located outside ofbroadcasting range. However with low overhead anddelay, MURU provide quality route with highpercentage of throughput.Another algorithm called Prediction Based Routing(PBR) [14], focussed on providing Internetconnectivity to vehicles. This algorithm assumes thateach vehicle has knowledge of its own position. Thealgorithm takes advantage of the less erratic vehiclemovement patterns on road to predict the durationand expiry of a route from a client vehicle to a mobilegateway vehicle. Just before route failure is predicted,PBR pre‐emptively seeks new route to avoid loss ofservice. However, it is unclear that how gateway willshare bandwidth demand with number of vehicles.E. Clustering based routingClustering is a process that divides the network intointerconnected substructures, called structures. Agroup of nodes identifies themselves to be a part ofcluster and a node designated as cluster head (CH) willbroadcast the packet to cluster. The stability of nodeis the key to create the stable cluster infrastructure.There have been attempts to study cluster‐basedrouting protocols in MANET. VANETs behave in adifferent way than the model that predominate inMANET’s research, are due to driver behaviour,constraints on mobility and high speeds.In MANET, Weighted Clustering Algorithm (WCA) [21]based on the use of weight metric that include severalsystem parameters like the node‐degree, distancewith all its neighbours, node speed and time spent as aCH. Each node obtains the weight value of other nodesand CHs through re‐broadcasting. As a result itinduces overhead. If node moves into region which isnot covered by CH, then once again cluster set‐upprocess gets invoked. Such procedure is timeconsuming as it introduces more overhead to process.The performance of WCA is enhanced by algorithmcalled Distributed Weighted clustering Algorithm(DWCA) [22], which localizes the configuration andreconfiguration of cluster and restricts the powerrequirement on CHs.In VANET, a reactive Location Routing Algorithm withCluster Based Flooding (LORA‐CBF) [23], where eachnode can be CH, gateway or cluster member. For eachcluster there is CH, a node that connects two clusterscalled gateway. The packets are forwarded byprotocol similar to greedy routing. If location ofdestination is not available then source will sentlocation request. This is similar to route request inAODV, but only CH and gateways can disseminates thelocation request and location reply. Performanceresults show the network mobility and size of thenetwork affects the performance of AODV and DSR[2], more significantly than LORA‐CBF.Another VANET routing algorithm called Clustering forOpen IVC Networks (COIN) [24], where CH is based onvehicular dynamics and driver intensions. Performanceshows that COIN represents more stable clusteringstructure of VANET, at the cost of little overhead.CONCLUSIONS AND OPEN ISSUESIn this paper attempt is made to provide comparativeand qualitative analysis of MANET and VANET routingprotocols by categorizing them within five differentdesign factors.Although foundation of MANET and VANET routingprotocols is well established; it is essential to makecomprehensive performance evaluation of variousalgorithms, by implementing them in real‐timescenario.The performance of routing protocols MANET andVANET depends significantly on the mobility modelsand the density of nodes. Therefore it is essential todesign routing protocols specific to given mobilitymodels.REFERENCES[1.] S. Ahmed, S.S. Kanere, “SKVR: Scalable KnowledgebasedRouting Architecture for Public TransportNetworks”, Proceedings of the 3rd InternationalWorkshop on Vehicular Ad hoc Networks (VANET'06),ACM, New York, NY, USA, 2006, pp. 92‐93.[2.] R. Bai, M. Singhal, “DOA: DSR over AODV routing formobile ad hoc networks”, IEEE Transactions on MobileComputing, vol.5, no.10, Oct. 2006, pp.1403‐1416.[3.] E. Fonseca, A. Festag, “A survey of existing approachesfor secure ad hoc routing and their applicability toVANETS”, NEC network laboratories, 28 pages,Version 1.1, March‐ 2006, pp. 1‐28.[4.] Z. J. Haas, M. R. Pearlman, P. Samar, “The ZoneRouting Protocol (ZRP) for Ad hoc Networks”, IETFInternet Draft, July 2002. http://tools.ietf.org/id/draftietf‐manet‐zone‐zrp‐04.txt[5.] J. Bernsen, D. Manivannan, “Unicast Routing Protocolsfor vehicular Ad Hoc Networks: A critical comparison2012. Fascicule 3 [July–September] 105
- Page 2 and 3:
ACTA TECHNICA CORVINIENSIS- BULLETI
- Page 4 and 5:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 6 and 7:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 8 and 9:
Regional Editors from MALAYSIAAbdel
- Page 10 and 11:
Imre TIMÁRUniversity of Pannonia,
- Page 12 and 13:
Ioan MILOŞANTransilvania Universit
- Page 14 and 15:
Member from GREECENicolaos VAXEVANI
- Page 16 and 17:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 18 and 19:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 20 and 21:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 22 and 23:
two decades are seismically deficie
- Page 24 and 25:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 26 and 27:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 28 and 29:
The Euler ecuation about the condit
- Page 30 and 31:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 32 and 33:
examination centre of the Hungarian
- Page 34 and 35:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 36 and 37:
elieve that they are communicating
- Page 38 and 39:
converting the data also increases
- Page 40 and 41:
REFERENCES[1.] Bhavyesh Divecha, Aj
- Page 42 and 43:
In addition, API (Application Progr
- Page 44 and 45:
The new protocol has to be implemen
- Page 46 and 47:
compressor, the now hot and highly
- Page 48 and 49:
Figure 7. Pressure ratio of evapora
- Page 50 and 51:
Physical data model (MFD) is obtain
- Page 52 and 53:
The new project which now includes
- Page 54 and 55: Figure 3. Materials evolutionThe pr
- Page 56 and 57: (GPa) and weight used in the textil
- Page 58 and 59: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 60 and 61: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 62 and 63: A machine vision‐guided plant sen
- Page 64 and 65: During the experiment, non‐unifor
- Page 66 and 67: espectively velocities hodograph (v
- Page 68 and 69: generation and thermal‐diffusion
- Page 70 and 71: 70(Pr−1)=bGm( R −cPr)( − M+c
- Page 72 and 73: 72Figure 12: Sherwood Number for di
- Page 74 and 75: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 76 and 77: The hardware components offer the p
- Page 78 and 79: Markers 1 (t=‐60 ms) and 2 (t=‐
- Page 80 and 81: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 82 and 83: compensation, apply dynamic control
- Page 84 and 85: A. Impact on transmission line prot
- Page 86 and 87: [12.] W.H. Zhang, S.J. Lee, M.S. Ch
- Page 88 and 89: Substituting equations (2), (3), (4
- Page 90 and 91: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 92 and 93: the tribological experiment to simu
- Page 94 and 95: It is difficult to determine temper
- Page 96 and 97: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 98 and 99: where: “ν ” represents the con
- Page 100 and 101: Figure 10. The velocity field in a
- Page 102 and 103: made on demand. In this type of pro
- Page 106 and 107: and classification,” In Journal o
- Page 108 and 109: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 110 and 111: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 112 and 113: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 114 and 115: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 116 and 117: equipped with tube made from stainl
- Page 118 and 119: Fig. 10 ‐ The die, the blank hold
- Page 120 and 121: desktop, it must be based on runtim
- Page 122 and 123: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 124 and 125: database, which makes it possible t
- Page 126 and 127: technology - „Applied logistics
- Page 128 and 129: increase in one of the factors lead
- Page 130 and 131: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 132 and 133: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 134 and 135: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 136 and 137: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 138 and 139: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 140 and 141: ACTA TECHNICA CORVINIENSIS - Bullet