Modules

3
1. Network node Creation to sharing of data. Network Node will be created for communication between two or more inter-connected network structure, data will be transmitted among the network structure. Vehicular Network communication is traditionally one of two kinds: either direct point-to-point links from source node to destination node and intermediate node communication applications, each network nodes contains the information about traffic information and file details the vehicle would like to share the data’s. 2. Message Exchange In this Module, message exchanges among sensor nodes for the case where there are three super nodes available to assist the ordinary node perform time synchronization. A single run of the message exchanged between the ordinary node and each super node. The synchronization procedure starts when an ordinary node initializes the synchronization process by broadcasting the synchronization request message SR to its neighboring super nodes. SR contains the sending time-stamp T1 obtained at the MAC layer, immediately before it departs from the ordinary node. Upon receiving SR, super nodes mark their local time. 3. Network Design For DA synchronization

description

modules

Transcript of Modules

Page 1: Modules

1. Network node Creation to sharing of data.

Network Node will be created for communication between two or more inter-connected

network structure, data will be transmitted among the network structure. Vehicular Network

communication is traditionally one of two kinds: either direct point-to-point links from source

node to destination node and intermediate node communication applications, each network nodes

contains the information about traffic information and file details the vehicle would like to share

the data’s.

2. Message Exchange

In this Module, message exchanges among sensor nodes for the case where there are

three super nodes available to assist the ordinary node perform time synchronization. A single

run of the message exchanged between the ordinary node and each super node.

The synchronization procedure starts when an ordinary node initializes the

synchronization process by broadcasting the synchronization request message SR to its

neighboring super nodes. SR contains the sending time-stamp T1 obtained at the MAC layer,

immediately before it departs from the ordinary node. Upon receiving SR, super nodes mark

their local time.

3. Network Design For DA synchronization

In this Module, we consider Two node underwater sensor network architecture.

a. Super nodes

Super nodes are powerful sensor nodes, working as reference clocks, as they

always maintain synchronization with surface buoys. Moreover, super nodes can perform

moving speed estimation as they can directly communicate.

b. Ordinary nodes

Ordinary nodes are the sensor nodes aiming to become synchronized. They are

inexpensive and have low complexity, cannot make direct contact with surface buoys and

can only communicate with their neighboring ordinary nodes or super nodes.

Page 2: Modules

4.End to End Data Transfer

This End – end communication between vehicular networks perform the data

transmission from source to destination. Here the data transmission happens vehicle to vehicle

that is gathered information has been transmitted from vehicle into corresponding vehicle or

infrastructure to use these data. Two type of data transfer one is Vehicle to Vehicle data sharing

and Vehicle to Infrastructure data sharing will be performed.

In this model we present, node communication to transfer data from source to

destination. Initially Source Node communicating the available to reach its destination to exact

place. It shows that how that node carrying and forwarding data from source to destination node.

Data will be displayed on intermediate and forwarded into destination paths.

4. Energy Efficient Synchronization

One approach especially applicable to flat node to feedback maliciousness and energy

status of its neighbor nodes to the sender node (e.g., the source or sink node)m who can then

utilize the knowledge to route packets to avoid nodes with unacceptable maliciousness or energy

status. by pre coding and be used for either transmitting multiple data streams or increasing the

reliability (in terms of bit error rate).