Professional Documents
Culture Documents
Unit III Mobile Ip
Unit III Mobile Ip
“CS8601-MOBILE COMPUTING ”
Outline
• Mobile IP
• DHCP
• AdHoc
• Proactive protocol-DSDV,
• Reactive Routing Protocols – DSR, AODV
• Hybrid routing –ZRP, Multicast Routing-
ODMRP
• Vehicular Ad Hoc networks ( VANET)
• MANET Vs VANET
• Security
IP Overview
• What is IP Address
• An IP address is a unique global address for a network interface
• An IP address:
• is a 32 bit long identifier
• encodes a network number(network prefix) and a host number
CS8601 – Mobile Computing
IP Addresses
CS8601 – Mobile Computing
• Example:
10000000 10001111 10001001 10010000
1st Byte 2nd Byte 3rd Byte 4th Byte
= 128 = 143 = 137 = 144
128.143.137.144
CS8601 – Mobile Computing
Example
Example: kpriet.ac.in
• IP address is 208.91.199.121
• Is that enough??? -> No, need netmask or prefix
• Using Prefix notation IP address is: 208.91.199.121/16
• Network prefix is 16 bits long
Subnetting
• Problem: Organizations have
multiple groups/entities within their
organization which are independently
managed. Each would prefer to KPR Network
manage their own IT facilities, i.e.,
own network ENGINEERING MILL -ARASUR
• Solution 1: Allocate to each entity
their own IP network/domain
• Organization must own
multiple IP address domains MILL-CBE
• Expensive (each IP domain
costs money) and
cumbersome to manage
• Solution 2: Add another level of
hierarchy to the existing IP Subnetting
addressing structure
CS8601 – Mobile Computing
• Then:
• Subnets can be freely assigned within the organization
• Internally, subnets are treated as separate networks
• Subnet structure is not visible outside the organization
CS8601 – Mobile Computing
140 15 1 0
Subnet 1
Class B Network
140 15 2 0
140 15 0 0
Subnet 2
140 15 3 0
Subnet 3
Third octet is now used for subnet IDs
CS8601 – Mobile Computing
Subnet Configuration
Subnet ID
140 15 1 0
Routing of Traffic
140.15.1.0 1
140.15.0.0 Routing
140.15.2.0 2
Outside world
140.15.3.0 3
Subnets
CS8601 – Mobile Computing
Advantages of Subnetting
• With subnetting, IP addresses use a N-layer hierarchy. E.g., a 3 layer hierarchy
would be:
• Network (IP domain)
• Subnet
• Host
• Reduces router complexity. Since external routers do not know about subnetting,
the complexity of routing tables at external routers is reduced.
• Note: Length of the subnet mask need not be identical at all subnetworks.
CS8601 – Mobile Computing
Subnetting Example
CS8601 – Mobile Computing
Subnetting Example
• An organization with 4 departments has the following IP
address space: 10.2.22.0/23. As the systems manager, you
are required to create subnets to accommodate the IT
needs of 4 departments. The subnets have to support to
200, 61, 55, and 41 hosts respectively. What are the 4
subnet network numbers?
• Solution:
• 10.2.22.0/24 (256 addresses > 200)
• 10.2.23.0/26 (64 addresses >61)
• 10.2.23.64/26 (64 addresses > 55)
• 10.2.23.128/26 (64 addresses > 41)
CS8601 – Mobile Computing
Overview of Mobile IP
• Routing q based on IP destination address, q network prefix (e.g.
129.13.42) determines physical subnet q change of physical subnet =>
change of IP address to have a topological correct address (standard
IP) Solution: Temporarily change routing table entries for mobile host
q Problem: does not scale if many mobile hosts or frequent location
changes Solution: Change mobile host IP-address q adjust the host IP
address depending on the current location q DNS updates take to long
time q Old TCP connections break
CS8601 – Mobile Computing
Overview of Mobile IP
• IP Routing:
• Network prefix is used for routing. Routing tables are used to look up next hop and the
interface on the router that is to be used.
• If two subnet masks/prefixes fit the address, the one with the largest
prefix is chosen for routing. E.g., a router with the following 3 entries in
its table: 7.7.7.99/32 (p=32 host specific) and 7.7.7.0/24 (0<p<32 network
prefix) and 0.0.0.0/0 (p=0 default) will use entry 2 for an IP packet with
destination 7.7.7.1 and entry 3 for destination 192.33.14.12.
CS8601 – Mobile Computing
Cntd…
• Domain Name System (DNS): used to translate a host name to an IP
address. A host sends a query to a server to obtain the IP address of a
destination of which it only has the host name.
Requirements to Mobile IP
• Transparency
• mobile end-systems keep their IP address
• continuation of communication after interruption of link possible
• point of connection to the fixed network can be changed
• Compatibility
• support of the same layer 2 protocols as IP
• no changes to current end-systems and routers required
• mobile end-systems can communicate with fixed systems
• Security
• authentication of all registration messages
• Efficiency and scalability
• only little additional messages to the mobile system required (connection typically via a low
bandwidth radio link)
• world-wide support of a large number of mobile systems in the whole Internet
CS8601 – Mobile Computing
Mobile IP Terminology
• Mobile Node (MN)
• system (node) that can change the point of connection to the network without changing its IP address
• Home Agent (HA)
• system in the home network of the MN, typically a router
• registers the location of the MN, tunnels IP datagrams to the COA
• Foreign Agent (FA)
• system in the current foreign network of the MN, typically a router
• forwards the tunneled datagrams to the MN, typically also the default router for the MN
• Care-of Address (COA)
• address of the current tunnel end-point for the MN (at FA or MN)
• actual location of the MN from an IP point of view
• can be chosen, e.g., via DHCP
• Correspondent Node (CN)
• communication partner
CS8601 – Mobile Computing
Properties of COA
• A care-of address is an IP address associated with mobile node that is visiting a
foreign link:
• A care-of address is specific to the foreign link currently being visited by a mobile node
• Generally changes every time the mobile node moves from one foreign link to another
• Is used as the exit-point of a tunnel from the home agent toward the mobile
node
• Is never returned by DNS when another node looks up the mobile node’s hostname
CS8601 – Mobile Computing
COA
CS8601 – Mobile Computing
Types of COA
• A foreign agent care-of address is an IP address of a foreign agent
which has an interface on the foreign link being visited by a mobile
node. Can be shared by many mobile nodes simultaneously
Features of Mobile IP
• Allows a host to be reachable at the same address, even as it
changes its location
• makes it seem as one network extends over the entire Internet
• continuous connectivity, seamless roaming even while network
applications are running
• fully transparent to the user
CS8601 – Mobile Computing
Example network
CS8601 – Mobile Computing
• Mobile Nodes listen to these Agent Advertisements and examine their contents
to determine whether they are connected to their home link or a foreign link
• The mobile IP Registers the care-of address acquired previously with its
home agent, using a message-exchange defined by Mobile IP. It asks for
service from a Foreign agent, if one is present on the link. In order to
prevent Denial-of-Service attacks, the registration messages are required to be
authenticated
• The Home Agent or some other router on the home link advertises
reachability to the network-prefix of the Mobile Node’s home address, thus
attracting packets that are destined to the Mobile Node’s home address. The
Home Agent intercepts these packets, and tunnels them to the care-of address
that the mobile node registered previously
CS8601 – Mobile Computing
Cntd…
• At the care-of address – at either the Foreign Agent or one of
the interfaces of the mobile node itself – the original packet is
extracted from the tunnel and then delivered to the Mobile Node
Route Optimization
• Triangle Routing: tunneling in its simplest form has all packets go to
home network (HA) and then sent to MN via a tunnel.
• This involves two IP routes that need to be set-up, one original and the second the
tunnel route.
• Causes unnecessary network overhead and adds to the latency.
•
• Route optimization: allows the correspondent node to learn the current
location of the MN and tunnel its own packets directly. Problems arise
with
• mobility: correspondent node has to update/maintain its cache.
• authentication: HA has to communicate with the correspondent node to do
authentication, i.e., security association is with HA not with MN.
CS8601 – Mobile Computing
Reverse tunneling
CS8601 – Mobile Computing
DHCPOF FER
FE R DHCPOF
Client selects
DHCP REQ.
Collects repliesDHCP REQ. configuration;
Also broadcast
in DCHP REQ
CK
DHCPA it accepts one
server’s offer
Initialization Complete (server identifier
option)
release
and implicitly
DHCPRELEASE reject rest
Discard context
CS8601 – Mobile Computing
Some Statistics
January 4, 2024 Ref: Jochen Schiller, ―Mobile Communications‖, PHI, Second Edition, 45
2003.
CS8601 – Mobile Computing
Reactive Protocols
• higher latency since the routes have to be
discovered when the source node initiates a
route request
• lower overhead since routes are maintained only
on-demand basis
CS8601 – Mobile Computing
Example
u v
1
¥ ¥
10
2 3 9
s 0 4 6
7
5
¥ 2 ¥
x y
CS8601 – Mobile Computing
Example
u v
10 1 ¥
10
9
2 3
s 0 4 6
7
5
5 ¥
2
x y
CS8601 – Mobile Computing
Example
u v
1
8 14
10
2 3 9
s 0 4 6
7
5
5 7
2
x y
CS8601 – Mobile Computing
Example
u v
8
1 13
10
2 3 9
s 0 4 6
7
5
5 7
2
x y
CS8601 – Mobile Computing
Example
u v
1
8 9
10
2 3 9
s 0 4 6
7
5
5 7
2
x y
CS8601 – Mobile Computing
Example
u v
1
8 9
10
2 3 9
s 0 4 6
7
5
5 7
2
x y
CS8601 – Mobile Computing
Dijkstra algorithm
Ref: Wikipedia
CS8601 – Mobile Computing
• Route table entry for destination contains metric which is distance from node to the
destination and also the next-hop (vector) towards destination
CS8601 – Mobile Computing
Bellman-Ford Algorithm
Example
t 5 x
-2
6 ¥ ¥
-3
s 8
0 -4 7
2
7
¥ 9 ¥
y z
CS8601 – Mobile Computing
Bellman-Ford Algorithm
Example
t 5 x
-2
6 6 ¥
-3
s 8
0 -4 7
2
7
7 9 ¥
y z
CS8601 – Mobile Computing
Bellman-Ford Algorithm
Example
t 5 x
-2
6 6 4
-3
s 8
0 -4 7
2
7
7 9 2
y z
CS8601 – Mobile Computing
Bellman-Ford Algorithm
Example
t 5 x
-2
6 2 4
-3
s 8
0 -4 7
2
7
7 9 2
y z
CS8601 – Mobile Computing
Bellman-Ford Algorithm
Example
t 5 x
-2
6 2 4
-3
s 8
0 -4 7
2
7
7 9 -2
y z
CS8601 – Mobile Computing
1 2
A B C
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
A A 0 A A 1 A B 3
B B 1 B B 0 B B 2
C B 3 C C 2 C C 0
CS8601 – Mobile Computing
Routing table
is updated (A, 1) (A, 1)
(B, 0) (B, 0)
(C, 1) (C, 1)
1 1
A B C
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
A A 0 A A 1 A B 3 2
B B 1 B B 0 B B 1
C B 3 2 C C 1 C C 0
CS8601 – Mobile Computing
(A, 1) (A, 2)
(B, 0) (B, 1)
(C, 1) (C, 0)
(D, 2) (D, 1) (D, 0)
1 1 1
A B C D
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
A A 0 A A 1 A B 2
B B 1 B B 0 B B 1
C B 2 C C 1 C C 0
D B 3 D C 2 D D 1
CS8601 – Mobile Computing
1 1 1
A B C D
Dest. Next Metric … Dest.c Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3 D C 2 D B
D 1
CS8601 – Mobile Computing
(D, 2) (D, 2)
1 1 1
A B C D
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3 D C 2 D B 3
CS8601 – Mobile Computing
(D,5)
(D,4) (D,4)
(D,3)
(D,2) (D,2)
1 1 1
A B C D
Dest. Next Metric … Dest.c Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3, 5, … D C 2, 4, 6… D B 3, 5, …
CS8601 – Mobile Computing
Distance Vector
• DV not suited for ad-hoc networks!
• Loops
• Count to Infinity
DSDV Protocol
• Keep the simplicity of Distance Vector
• Install Time when entry was made (used to delete stale entries
from table)
DSDV (Tables)
• Update information is compared to own routing table
– 1. Select route with higher destination sequence
number (This ensure to use always newest
information from destination)
– 2. Select the route with better metric when
sequence numbers are equal.
A 1 B 2 C
Dest. Next Metric Seq Dest. Next Metric Seq Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 1 A-550
B B 1 B-100 B B 0 B-100 B B 2 B-100
C B 3 C-586 C C 2 C-588 C C 0 C-588
CS8601 – Mobile Computing
A 1 B 1 C
Dest. Next Metric Seq Dest. Next Metric Seq Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-102 B B 0 B-102 B B 1 B-102
C B 2 C-588 C C 1 C-588 C C 0 C-588
CS8601 – Mobile Computing
• Full/Incremental Update:
• Full Update: Send all routing information from own table.
(D, 0, D-000)
A B C D
Dest. Next Metric Seq. Dest. Next Metric Seq. Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-104 B B 0 B-104 B B 1 B-104
C B 2 C-590 C C 1 C-590 C C 0 C-590
D D 1 D-000
CS8601 – Mobile Computing
A B C D
Dest. Next Metric Seq. Dest. Next Metric Seq. Dest. Next Metric Seq.
A A 0 A-550 A A 1 A-550 A B 2 A-550
B B 1 B-104 B B 0 B-102 B B 1 B-102
C B 2 C-590 C C 1 C-592 C C 0 C-592
D C 2 D-000 D D 1 D-000
CS8601 – Mobile Computing
A B C D
Dest. Next Metric Seq. Dest.c Next Metric Seq. Dest. Next Metric Seq.
… … … … … … … … …
D B 3 D-100 D C 2 D-100 D D D-101
CS8601 – Mobile Computing
A B C D
Dest. Next Metric Seq. Dest.c Next Metric Seq. Dest. Next Metric Seq.
… … … ... … … … ... … … …
D B 4
3 D-100 D C 3
2 D-100 D B
D 1 D-100
D B D-101 D C D-101 D D D-101
CS8601 – Mobile Computing
• When node S wants to send a packet to node D, but does not know a
route to D, node S initiates a route discovery
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
• If unidirectional (asymmetric) links are allowed, then RREP may need a route
discovery for S from node D
• Unless node D already knows a route to node S
• If a route discovery is initiated by D for a route to S,
then the Route Reply is piggybacked on the Route
Request from D.
• If IEEE 802.11 MAC is used to send data, then links have to be bi-directional
(since Ack is used)
CS8601 – Mobile Computing
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
• When node S wants to send data to node D, but does not know a
valid route node D
CS8601 – Mobile Computing
• When node S learns that a route to node D is broken, it uses another route
from its local cache, if such a route to D exists in its cache. Otherwise, node S
initiates route discovery by sending a route request
• Node X on receiving a Route Request for some node D can send a Route
Reply if node X knows a route to node D
RERR [J-D] Z
S E
F
B
C M L
J
A G
H D
K
I N
J sends a route error to S along route J-F-E-S when its attempt to forward the
data packet S (with route SEFJD) on J-D fails
Nodes hearing RERR update their route cache to remove link J-D
CS8601 – Mobile Computing
• With passage of time and host mobility, cached routes may become
invalid
• A sender host may try several stale routes (obtained from local cache,
or replied from cache by other nodes), before finding a good route
CS8601 – Mobile Computing
• Flood of route requests may potentially reach all nodes in the network
• Increased contention if too many route replies come back due to nodes replying using
their local cache
• Route Reply Storm problem
• Reply storm may be eased by preventing a node from sending
RREP if it hears another RREP with a shorter route
CS8601 – Mobile Computing
AODV : Concept
Perkins 2001
• Reactive routing
• Pure on-demand route acquisition system
• The routes are created when needed, so called “on-demand”
• A broadcast route discovery mechanism
• RREQ (Route Request packet) broadcasting to find a route
• RREP (Route Reply packet) is used to set up forward path
• Dynamic establishment of route table entries
• Nodes lie on active paths only maintain routing information
• Destination sequence number
• Prevention of routing loops
• Avoidance of old and broken routes
• Maintenance of timer-based states
• A routing table entry is expired if not used recently
CS8601 – Mobile Computing
AODV : Mechanism
• Path discovery
Every node maintains two separate counters
• Sequence number
• Broadcast-id (increments whenever the suorce issues a new RREQ)
• The source requests using RREQ broadcasting
• <source_addr, source_sequence#, broadcast_id, dest_addr,
dest_sequence#, hop_cnt>
• Destination number of RREQ is the last known number to the source
• The destination replies using RREP (Route Reply) unicasting
• <source_addr, dest_addr, dest_sequence#, hop_cnt, lifetime>
• The sequence number is first incremented if it is equal to the number in
the request
• RREP contains the current sequence number, hop count = 0, full lifetime
• Intermediate nodes
• Discard duplicate requests
• Replies if it has an active route with higher destination sequence number
• Otherwise broadcasts the request on all interfaces
CS8601 – Mobile Computing
AODV : Mechanism
• Path discovery
• Intermediate nodes
• Setup reverse path
• A node records the address of the neighbor who send RREQ
• Keep track of some information
• Destination IP address, Source Ip address, Broadcast_id, Expiration
time for reverse path route entry, Source node’s sequence number
• Setup forward path
• Unicast RREP (Route reply) back to the reverse path
• Each node along the path sets up a forward pointer to the node from
which the RREP came
• Update its routing table entry
• Propagate the first RREP or the RREP if contains a greater destination
sequence# or the same sequence# with a smaller hop count then
contained in RREQ
• Nodes that are not along the path determined by the RREP will
timeout and will delete the reverse pointers
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
RREQ
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
Reverse
Path Setup
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
RREP
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
Forward
path setup
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
CS8601 – Mobile Computing
Example
A L
Y
F
J
B K
D
G P
S C
E
H I T
Z
CS8601 – Mobile Computing
AODV
• Route table management
• Soft-state associated with the entry (useful information stored in route table
management):
• Route request expiration time (purpose of this timer is to erase reverse path routing
entries from those nodes that do not lie on the path)
• Route caching timeout (or the time after which the route is considered to be invalid)
• Active route timeout (this information is maintained so that all active source nodes can
be notified when a link breaks)
• A neighbor is considered active if it originates or relays at least one packet to the
destination
CS8601 – Mobile Computing
AODV
• Path maintenance
• Neighboring nodes with active routes periodically exchange hello messages
• If a next hop link in the routing table fails, the active neighbors are informed
• The RERR (unsolicited RREP) indicates the unreachable destinations
• <source_addr, dest_addr, current sequence# + 1, infinity, lifetime>
• The source performs a new route request when it receives a RERR
CS8601 – Mobile Computing
Routing Zones
• Each node S in the network has a routing zone. This is the proactive
zone for S as S collects information about its routing zone in the
manner of the DSDV protocol.
• If the radius of the routing zone is k, each node in the zone can be
reached within k hops from S.
A Routing Zone
K L
A
B
I
G
S
C E
D
• In other words, the neighbours of a node are the nodes which are one
hop away.
• For S, if the radius of the routing zone is k, the zone includes all the
nodes which are k-hops away.
CS8601 – Mobile Computing
S
CS8601 – Mobile Computing
Intrazone Routing
• Each node collects information about all the nodes in its routing zone
proactively. This strategy is similar to a proactive protocol like DSDV.
• Each node maintains a routing table for its routing zone, so that it can
find a route to any node in the routing zone from this table.
CS8601 – Mobile Computing
Intrazone Routing
• In the original ZRP proposal, intrazone routing is done by maintaining
a link state table at each node.
• A zone notification mesage dies after k hops, i.e., after reaching the
node´s neighbours at a distance of k hops.
• Each node receiving this message decreases the hop count of the
message by 1 and forwards the message to its neighbours.
CS8601 – Mobile Computing
• Each node P keeps track of its neighbour Q from whom it received the
message through an entry in its link state table.
• P can keep track of all the nodes in its routing zone through its link
state table.
CS8601 – Mobile Computing
B
S
A C
D
E
F
B
S
A C
D
E
F
B
S
A C
D
E
F
Interzone Routing
• The interzone routing discovers routes to the destination reactively.
Bordercasting
• The bordercasting to peripheral nodes can be done mainly in two
ways :
• By maintaining a multicast tree for the peripheral nodes. S is the root of this
tree.
• Otherwise, S maintains complete routing table for its zone and routes the
packet to the peripheral nodes by consulting this routing table.
CS8601 – Mobile Computing
S C
B
D H
CS8601 – Mobile Computing
• Each node appends its address to the RREQ message during the route
request phase. This is similar to route request phase in DSR.
• This accumulated address can be used to send the route reply (RREP)
back to the source node S.
CS8601 – Mobile Computing
• A RREQ usually results in more than one RREP and ZRP keeps track of
more than one path between S and D. An alternative path is chosen in
case one path is broken.
CS8601 – Mobile Computing
What is Multicast?
• “Point-to-multipoint" or "multipoint-to-multipoint“
• Different from broadcast and unicast
Advantages of Multicast
• Delivery to destinations simultaneously
• Deliver the messages over each link of the network only once
• only create copies when the links to the destinations split
CS8601 – Mobile Computing
VANET
• Definition:
MANET Vs VANET
• Like MANETs:
• They self-organize over an evolving topology
• They may rely on multi-hop communications
• They can work without the support of a fixed infrastructure
• Unlike MANETs:
• They have been conceived for a different set of applications
• They move at higher speeds (0-40 m/s)
• They do not have battery and storage constraints
CS8601 – Mobile Computing
VANETs
• Communication modes:
• Vehicle-to-Vehicle (V2V) among vehicles
• Vehicle-to-Infrastructure (V2I), between vehicles and Road-
Side Units (RSUs)
• Vehicle-to-X (V2X), mixed V2V-V2I approach
V2V
RSU
V2I V2I
V2V
RSU
CS8601 – Mobile Computing
What is a VANET
(Vehicular Ad hoc NETwork)?
Roadside
base station
Emergency
event
Inter-vehicle
communications
Vehicle-to-roadside
communications
CS8601 – Mobile Computing
• Efficiency
• Traffic jams waste time and fuel
• In 2003, US drivers lost a total of 3.5 billion hours and 5.7 billion gallons of
fuel to traffic congestion
• Profit
• Safety features and high-tech devices have become product differentiators
CS8601 – Mobile Computing
VANETs
• Applications:
• Active Road-Safety Applications
• To avoid the risk of car accidents: e.g., cooperative collision warning,
pre-crash sensing, lane change, traffic violation warning
• Traffic efficiency and management applications
• To optimize flows of vehicles: e.g., enhanced route
guidance/navigation, traffic light optimal scheduling, lane merging
assistance
• Comfort and Infotainment applications
• To provide the driver with information support and entertainment:
e.g., point of interest notification, media downloading, map download
and update, parking access, media streaming, voice over IP, multiplayer
gaming, web browsing, social networking
CS8601 – Mobile Computing
Examples
CS8601 – Mobile Computing
A Modern Vehicle
Event data recorder (EDR)
Communication
facility
Rear radar
Applications (details)
• Congestion detection • Border clearance
• Road conditions warning • Adaptive cruise control
• Collision alert • Drive-through payment
• Stoplight assistant • Merge assistance
• Emergency vehicle
• warning
• Deceleration warning
• Toll collection
CS8601 – Mobile Computing
Congestion Detection
• Vehicles detect congestion when:
• # Vehicles > Threshold 1
• Speed < Threshold 2
• Relay congestion information
• Hop-by-hop message forwarding
• Other vehicles can choose alternate routes
CS8601 – Mobile Computing
Congestion Detection
CS8601 – Mobile Computing
Deceleration Warning
• Prevent pile-ups when a vehicle decelerates rapidly
CS8601 – Mobile Computing
Contact info
vishnudms@gmail.com
Thank you