Metaheuristics For Optimal Transfer of P2P Information in Vanets
Metaheuristics For Optimal Transfer of P2P Information in Vanets
Metaheuristics For Optimal Transfer of P2P Information in Vanets
Communication
Author
Jamal Toutouh El Alamin
Supervisor
Pascal Bouvry
UNIVERSITY OF LUXEMBOURG
Acknowledgements
My sincere thanks to my advisor, Dr. Pascal Bouvry, for his support and guidance
throughout the Master Thesis work; the Computer Science and Communications
research unit colleges, for sharing their knowledge with me; and the University of
Luxembourg, for offering me the opportunity of presenting this Master Thesis.
I also would like to make a special reference to my family; my parents Sakina
and Ahmed, and my brothers Abdeslam, Mohamed, and Said; for working with me
to make our dreams come true.
I am deeply indebted to my girlfriend, Rosa, who has borne up the whole process
which finishes with this Master Thesis.
I cannot go without mentioning Networking and Emerging Optimization research
unit at University of Málaga, specially its head Dr. Enrique Alba, for introducing
me to the wonderful world of scientific research.
Moreover, I have to thank to my friends for the great times that we have spent
together and their support, specially to the Neudorfers.
3
Metaheuristics for Optimal Transfer of
P2P Information in VANETs
Master in Information and Computer Sciences
June 8, 2010
2
Contents
1 Introduction 9
2 VANET Networks 13
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 VANET Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.3 Wireless Access Technologies . . . . . . . . . . . . . . . . . . . . . . . 17
2.3.1 Ad-hoc Network Technologies . . . . . . . . . . . . . . . . . . 17
2.3.2 Cellular Technoligies . . . . . . . . . . . . . . . . . . . . . . . 21
2.4 Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4.1 Communication Patterns . . . . . . . . . . . . . . . . . . . . . 23
2.4.2 Routing Protocols Classification . . . . . . . . . . . . . . . . . 23
2.4.3 Routing Protocols for VANETs . . . . . . . . . . . . . . . . . 25
2.5 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.5.1 Safety-related Applications . . . . . . . . . . . . . . . . . . . . 31
2.5.2 Transportation Efficiency Applications . . . . . . . . . . . . . 32
2.5.3 Information and Entertainment Applications . . . . . . . . . . 33
2.6 Simulation of VANETs . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.6.1 VANET Simulation Alternatives . . . . . . . . . . . . . . . . . 34
2.6.2 VanetMobiSim/Ns-2 Simulator . . . . . . . . . . . . . . . . . 35
2.7 Research Challenges in VANETs . . . . . . . . . . . . . . . . . . . . . 36
3 Metaheuristics 39
3.1 Definition of Metaheuristic . . . . . . . . . . . . . . . . . . . . . . . . 39
3.2 Metaheuristics Classification . . . . . . . . . . . . . . . . . . . . . . . 43
3.2.1 Trajectory-based Metaheurístics . . . . . . . . . . . . . . . . . 44
3.2.2 Population-based Metaheurístics . . . . . . . . . . . . . . . . . 47
3.3 Algorithms used in this Work . . . . . . . . . . . . . . . . . . . . . . 49
3.3.1 Simulated Annealing (SA) . . . . . . . . . . . . . . . . . . . . 50
3.3.2 Genetic Algorithm (GA) . . . . . . . . . . . . . . . . . . . . . 52
3
CONTENTS
5 Experiments 73
5.1 Optimization Framework . . . . . . . . . . . . . . . . . . . . . . . . . 73
5.1.1 Instances: VANET Scenarios . . . . . . . . . . . . . . . . . . . 74
5.1.2 Algorithms Parameter Settings . . . . . . . . . . . . . . . . . 77
5.2 Software and Hardware Tools . . . . . . . . . . . . . . . . . . . . . . 78
5.2.1 MALLBA Library . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.2.2 Optimizing VDTP by using VanetMobiSim/Ns-2 . . . . . . . 79
5.2.3 Parallel Executions by using Condor . . . . . . . . . . . . . . 81
5.3 Used Metrics to compare Results . . . . . . . . . . . . . . . . . . . . 83
6 Results 85
6.1 Global Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
6.2 Algorithms Performance Study . . . . . . . . . . . . . . . . . . . . . 88
6.3 VANET QoS Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Bibliografy 109
4
List of Tables
6.1 Final fitness values for both VANET scenarios and the five optimiza-
tion algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
6.2 KS-test results for the five algorithms and two scenarios. . . . . . . . 87
6.3 Friedman Rank test with confidence level 95% . . . . . . . . . . . . . 88
6.4 Mean execution time (seconds) per independent run of each algorithm
for both, urban and highway, scenarios. . . . . . . . . . . . . . . . . . 90
6.5 Optimal configurations achieved in the median execution and the
CARLINK experts one for VDTP protocol and simulation values in
urban scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
6.6 Optimal configurations achieved in the median execution and the
CARLINK experts one for VDTP protocol and simulation values in
highway scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5
LIST OF TABLES
6
List of Figures
7
LIST OF FIGURES
8
Chapter 1
Introduction
For people living in developed countries the sheer volume of road traffic can be a
daily nuisance. In addition, the road traffic conditions affect the safety of the popu-
lation since 1.2 million people worldwide are estimated to be killed each year on the
roads1 . For this reason, nowadays the automotive industry and governments invest
many resources to increase road safety and traffic efficiency, as well as to reduce the
impact of transportation on the environment. The application of communications
and information technologies for this purpose has opened a new range of possibili-
ties. One of the most promising areas of research is the study of the communications
among vehicles and road-side units, or more specifically the Vehicular Ad-hoc Net-
works (VANET) [58]. This kind of networks are self-configuring networks composed
of a collection of vehicles and elements of roadside infrastructure connected with
each other without requiring an underlying infrastructure, sending and receiving
information and warnings about the current traffic situation (see Figure 1.1).
Nowadays, WiFi (IEEE 802.11 based ) technologies are the most commonly used
for deploying VANETs. The vehicles are equipped with wireless network interfaces
which use either IEEE 802.11b or IEEE 802.11g standards for access media. How-
ever, these are general purpose standards and they do not fit properly the require-
ments of high dynamic networks such as VANETs. Currently, DSRC (Dedicated
Short-Range Communicatio) [108] has been proposed as the communications stan-
dard specifically for VANETs, it is a short medium range communications service
that offers very low latency and high data rate. DSRC is based upon the standards
IEEE 802.11p and IEEE 1609 family.
1
According to "Global Road Safety Fact File" of FIA Foundation
9
CHAPTER 1. INTRODUCTION
The use of IEEE 802.11 (not cellular ) standards implies that vehicles commu-
nicate within a limited range while moving, thus exhibiting a topology that may
change quickly and in unpredictable ways. In such kind of networks, previous to its
deployment, it is crucial to provide the user with an optimal configuration of the
communication protocols in order to increase the effective data packet exchange, as
well as to reduce the transmission time and the network usage (with their implica-
tions on higher bandwidth and lower energy consumption). This is specially true
in certain VANET scenarios in which buildings and distances discontinue communi-
cation channels frequently, and where the available time for connecting to vehicles
could be really short.
The efficient protocol configuration for VANETs without using automatic in-
telligent design tools is practically impossible because of the enormous number of
possibilities (NP-problems). It is especially difficult (e.g., for a network designer)
when considering multiple design issues, such as highly dynamic topologies and re-
duced coverage. All this motivates the use of metaheuristic techniques [15] which
arises as well-suited tools to solve this kind of problems. Unfortunately, few related
approaches can be found in the specialized literature. In Alba et al. (2006) [5], a
specialized Cellular Multi-Objective Genetic Algorithm (cMOGA) was used for find-
ing an optimal broadcasting strategy in urban Mobile Ah Hoc Networks (MANETs).
Chiang et al. (2007) [33] developed an Ant Colony based model for resource man-
agement in VANETs. More recently, in Dorronsoro et al. (2008) [40], six versions
of GAs (panmictic and descentralized) were evaluated and used in the design of ad
hoc injection networks.
10
In the present Thesis, we face the Optimal File Transfer protocol Configura-
tion (OFTC) problem in VANETs, which deals with the optimization of VDTP
(Vehicular Data Transport Protocol ) [23], by means of five different state-of-the-
art optimization techniques (metaheuristic algorithms). This problem lies in the
core of any VANET application, and thus optimal configuration is a major con-
cern. Also, we face many optimization algorithms because this is a new field, and
their relative advantages are still unclear. These algorithms are two swarm intel-
ligence techniques: Particle Swarm Optimization (PSO) [70] and Differential Evo-
lution (DE) [128]; two evolutionary algorithms: Genetic Algorithm (GA) [15] and
Evolutionary Strategy (ES) [120]; and a trajectory search technique, Simulated An-
nealing (SA) [73]. For our tests, two typical car-to-car environment instances have
been defined: urban and highway scenarioss. We rely on a flexible simulation struc-
ture using VanetMobiSim/Ns-2 [8] (realistic VANET simulator) for optimizing the
transmission time, the number of lost packets, and the amount of data transferred.
One additional contribution of this work is to provide the specialist with a useful
platform, embedded within ns-2, to configure network protocols and hence obtaining
a fair QoS control in VANETs.
• Finally, Chapter 7 draws the conclusions and the future work from all the
achievements mentioned in this Thesis.
11
CHAPTER 1. INTRODUCTION
• Appendix A shows the tables of numerical results obtained during the opti-
mization process.
12
Chapter 2
VANET Networks
This chapter provides an overview about state of the art in Vehicular Ad-hoc
Networks (VANETs) since we have optimized Vehicular Data Transport Protocol
(VDTP) used in this kind of networks. This chapter is organized as follows: First,
Section 2.1 introduces the idea of VANET. Following, Section 2.2 presents the main
characteristics of such networks. In turn, sections 2.3 and 2.4 summarizes the main
wireless access technologies and routing protocols used in VANETs. Section 2.5 list
a representative set of proposed applications to exploit, and both, the main research
groups and consortia, that work or have worked designing this kind of networks.
Section 2.6 presents the problem of simulating VANETs and the proposed solutions.
Finally, Section 2.7 provides an outline of challenges and future works that arise in
the networks that are presented in this chapter.
2.1 Introduction
Equipping vehicles with wireless communication devices is a subject that has inter-
ested the research community and the automotive industry since 80’s [58]. Advances
in wireless networking technologies rise to the emergence of Mobile Ad-hoc Networks
(MANETs). A MANET is a self-configuring network composed of a collection of in-
dependent mobile wireless nodes connected with each other without requiring an
underlying infrastructure. Each node in a MANET is free to move independently in
any direction, and therefore change their links frequently. Normally the nodes are
personal computers or small mobile devices as personal digital assistants (PDAs),
sensors, cell phones, etc. (see Figure 2.1).
13
CHAPTER 2. VANET NETWORKS
The main attraction with the MANET is its immediate and direct application
to the real world, offering the possibility of accessing to a communication network
where for different reasons an infrastructure can not be installed. A very promising
and interesting example of such applications is the use of PDAs and MANET tech-
nologies in emergency and rescue [117, 112], as it can be an area after an earthquake
or a major fire, where the communications infrastructure may have been damaged
and unusable.
Soon, the research community and the automotive industry studied the appli-
cation of MANET technologies to deploy networks among vehicles equipped with
certain mobile devices as GPS navigators or smart phones. From this work two dif-
ferent technologies appeared: IVC (Inter-Vehicle Communications) and RVC (Road-
Vehicle Communications). The first one enables vehicles to communicate with each
other and it is also known as communication V2V (Vehicle-to-Vehicle). RVC pro-
vides communications between vehicles and the roadside units (RSU) that gather
and broadcast information, this kind of communication is also known as commu-
nication V2I (Vehicle-to-Infrastructure). The union of IVC and RVC germinated
in what we understand today as Vehicular Ad-hoc Networks or VANETs (see Fig-
ure 2.2).
Using this technology vehicles can communicate with each other to transmit
different kinds of information. The interchange of real time traffic information con-
ditions among vehicles can make driving safer and more efficient, for this reason the
research community is mainly working to develop such applications. For example,
warning about the existence of an accident is useful for the drivers because they
can be able to reduce the speed and look for alternative routes before reaching the
accident area (see Figure 2.2).
14
2.1. INTRODUCTION
The roadside elements such as road traffic signs or traffic lights typically just
provide visual information and usually with an unchanging pattern. However, with
the application of VANET technologies the roadside elements actings as RSU could
be more active in informing users with personalized real-time information. For
example, a dangerous curve sign could warn the driver of a vehicle traveling at
excessive speed before reaching it. Another example would be a men at work signal
which may broadcast information about of the existence of road works, so that
drivers would know their existence in advance (see Figure 2.3).
The term VANET was originally adopted to reflect the ad-hoc nature of these
highly dynamic networks. However, because the term ad-hoc network was associated
widely with unicast routing-related research, there is currently a debate among the
pioneers of this field about redefining the acronym VANET to de-emphasize ad-hoc
networking [58]. Because this discussion has not yet reached consensus, VANET is
the term used to refer to vehicle-to-vehicle and vehicle-to-roadside communications
based on wireless local area networking technology.
15
CHAPTER 2. VANET NETWORKS
• Such networks have small effective network diameter. We mainly due to the
speed, the high number of obstacles, and the height of the used antennae. For
this reason links between nodes can be broken frequently.
• The devices used to deploy these networks have not significant power con-
straints, unlike sensor and other types of mobile devices used in other kind of
MANETs where limited battery life is a major concern.
16
2.3. WIRELESS ACCESS TECHNOLOGIES
• The topology of the network could be affected by the response of the drivers
after receiving messages. This means that the content of messages can change
the network topology.
Following, we present briefly several connection technologies that have been con-
sidered to be used to deploy vehicular networks. We have defined two different
groups: ad-hoc network (without any infrastructure) and cellular technologies.
WiFi (Wireless Fidelity): Generally, WiFi refers to any type of IEEE 802.11
wireless protocol. More specifically, WiFi is the industry standard for products de-
fined by the WiFi Alliance 1 and conforming to IEEE 802.11 standard [63]. WiFi
standard defines over-the-air protocols necessary to support networking in a local
area and it specifies physical (PHY) and medium access control (MAC) layers.
There are several specifications in the IEEE 802.11 family which extends the orig-
inal one (IEEE 802.11) that supports 1 or 2 Mbps transmission in the 2.4 GHz band.
1
WiFi Alliance - http://www.wifialliance.org
17
CHAPTER 2. VANET NETWORKS
The most extended ones are the standards IEEE 802.11b and IEEE 802.11g, that
provide 11 Mbps and 54 Mbps transmission in 2.4 GHz band with a maximum range
of 500 m, respectively. Most of mobile devices, as PDAs, smart phones or laptops, are
equipped with the necessary hardware to use these two standards. IEEE 802.11a is
an extension to 802.11 that provides up to 54 Mbps in the 5GHz band using OFDM
(Orthogonal Frequency Division Multiplexing) [135] encoding scheme. Transfer rates
increased with IEEE 802.11n standard with a bandwidth up to 500 Mbps. In ad-
dition, there are a number of other 802.11 WG activities that define inter access
point protocol (IEEE 802.11f ), MAC enhancements for security (IEEE 802.11i),
MAC enhancements for QoS (IEEE 802.11e), etc.
The main research groups have opted for the use of IEEE 802.11b for its strong
presence in the market. The results, which are being achieved by both simulations
and real tests, are quite encouraging [53].
18
2.3. WIRELESS ACCESS TECHNOLOGIES
are three different classes of bluetooth according to their coverage and power (see
Table 2.1), getting transfer rates up to 3 Mbps and ranges up to 100 meters. These
networks operate on a free frequency band using sufficiently robust security mecha-
nisms.
Table 2.1: Current bluetooth classes
UWB (Ultra Wide Band): The UWB can be seen as an evolution of the blue-
tooth that comes with the IEEE 802.15.3 standard. UWB is a radio technology
that can be used at very low power levels for short-range (10 m) high-bandwidth
(> 500 MHz) communications by using a large portion of the radio spectrum. It
offers transmission bitrates up to 480 Mbps [34]. One of the most important feature
of UWB is the low power consumption.
ZigBee: ZigBee is based on the IEEE 802.15.4 standard [78] and it is the tech-
nology used in ad-hoc WSN (Wireless Sensor Networks). It presents a fairly limited
bandwidth (250 Kbps) and a coverage up to 75 m. This technology is used mostly in
systems where little information is transferred to very small distances. The greatest
quality of ZigBee is that the power consumption is extremely low.
19
CHAPTER 2. VANET NETWORKS
in the Vehicular Environment (WAVE). WAVE mode of operation allows data ex-
change between vehicular devices in rapidly changing communication environments,
where mobile nodes may move up to 200 Km/h and the distances between them are
between 100 and 500 meters. In order to cope with very low latency VANET ap-
plications, very short-duration communications exchanges are required. Regarding
the physical layer, 802.11p is very similar to 802.11a, 802.11p is also OFDM-based,
with more emphasis on a reduced channel spacing (10 MHz instead of 20 MHz)
to cope with the higher multi-path effect of urban environments. The data rates
ranges are from 3 to 27 Mbps for each channel, because lower rates are preferred
in order to obtain robust communication. The DSRC spectrum is structured into
seven channels (see Figure 2.4). Channel 178 is the control channel (CCH), which is
restricted to safety communications. The two channels at the ends of the spectrum
band are reserved for special uses. The rest are service channels (SCH) available for
both safety and non-safety usage.
At MAC layer level, DSRC is based on access control provided by the CSMA/CA
(Carrier Sense Multiple Access, Collision Avoidance), but modified to avoid the hid-
den terminal problem. In order to achieve that, it implements the message exchanges
RTS/CTS (Request-to-Send/Clear-to-send) [31]. This mechanism avoids collisions
but introduces overload and delay transmissions. For this reason, it does not imple-
ment RTS/CTS in the CCH channel.
Table 2.2 presents the main features of the wireless ad-hoc network technologies
presented previously.
20
2.3. WIRELESS ACCESS TECHNOLOGIES
21
CHAPTER 2. VANET NETWORKS
Because of the fact that it may be necessary to send a packet through several vehi-
cles to reach a determinate node a routing protocol is needed. Designing an efficient
and reliable routing strategy is one of the most challenging problem in the field of
VANETs. As these are wireless ad-hoc networks, all nodes behave as routers and
take part in discovery and maintenance of routes to other nodes in the network. An
adaptable routing strategy is required since network conditions change continuously
such as: network topology, traffic density, and network partitioning. Additionally,
the routing protocol may need to provide different levels of QoS to different types
of applications and services. The first solution has been the application of MANET
routing protocols directly or modifying them, however these protocols are unsuitable
due to VANETs and MANETs have critical differences (see Section 2.2). In parallel
with this, some VANET specific protocols are also proposed.
In this section we present different approaches trying to solve the routing problem
in VANETs. But previously, we describe the different communication patterns, that
is, the problem of which nodes will be the receivers of the transmitted information.
This is another problem related to routing strategy.
22
2.4. ROUTING PROTOCOLS
The easiest multicasting strategy is to generate a separate copy for each destina-
tion and transmit them separately. However, this is the most costly approach since
it does not use information about the path the packets follow and the routes between
the source and destinations may follow the same path up to a certain node (when
multi-hop communication is carried out). Although this is a challenging issue, there
are solutions in the literature [38]. There are different multicasting approaches, the
most used ones are: broadcasting, anycasting, and geocasting.
23
CHAPTER 2. VANET NETWORKS
a) Unicasting b) Multicasting
c) Broadcasting d) Anycasting
e) Geocasting
Each node maintains one or more tables containing routing information to ev-
ery other node in the network when proactive routing protocols are used. When
the network topology changes nodes propagate messages throughout the network in
order to maintain a consistent and up-to-date routing information about the whole
network. These routing protocols differ in the method by which the topology change
information is distributed across the network and the number of necessary routing-
related tables.
24
2.4. ROUTING PROTOCOLS
The strategy followed by on-demand routing protocols is different, since the route
is established just when is required for a network connection. When a source node
S needs to connect to a destination node D, S invokes a routing discovery process
to find a route between them. After route establishment, nodes S and D as well as
intermediate nodes store the information regarding the route from S to D in their
routing tables. The route is maintained until the destination is unreachable or the
route is no longer needed.
On the one hand, proactive routing protocols have the advantage of reduced end-
to-end delay, since, upon generation of a network connection request, the route is
already established. However, their disadvantage is the fact that routing information
is disseminated to all network nodes increasing the traffic and power consumption.
Thus, bandwidth for user traffic is reduced and the operating time of the battery-
powered mobile nodes is limited. On the other hand, reactive routing protocols have
a lower power consumption and demand less control signaling. However, end-to-end
connection delay is higher, since upon generation of a connection request between
two nodes, the connection needs to wait some time for the link between the nodes
to be established [97].
Finally, some works have studied the possibility of applying the actual Mobile
IP protocol [109] over vehicular networks [81] and [30]; however this protocol cannot
fulfill the requirements for routing in which not only the hosts but also the backbone
is mobile and multi-hop wireless connections composed of many links with varying
QoS are allowed. Therefore, more adaptive network layer protocols are required.
Proactive or reactive approaches can be followed when designing a routing algorithm
for ad-hoc networks [97].
There are a high number of routing protocols that can be applied over vehicular
ad-hoc networks in the literature offering different QoS, mostly MANET routing
protocols; therefore this section will give a brief overview of a representation of
them. Some of these protocols are shown in Table 2.3. Following, we present the
main features of the most significant routing protocols.
25
CHAPTER 2. VANET NETWORKS
26
2.4. ROUTING PROTOCOLS
reduces the network traffic; however, the computation of the minimum connected
dominating set over a given graph is in general an NP-Complete problem [83],
thus approximations must be employed in practice.
Figure 2.8: CDS protocol representation with dominant nodes in black and passive
nodes in white.
Dynamic Source Routing (DSR): DSR [69] is a reactive unicast routing pro-
tocol. The main idea is discovering the best cost route for the destination node
(discovery procedure). When a node has a packet to send and it does not know
the route for the destination, it sends out a route request packet (see Figure 2.9.a).
While this packet is being transferred through the network, all the nodes traversed
are recorded in the packet header. A node that knows the route to the destination
does not forward the packet further, but appends the route to the route information
already accumulated in the packet and returns a route reply packet to the source
node (see Figure 2.9.b). Using this information the source node updates its routing
cache and delivers the packet to the destination node through the discovered route.
If the discovered route fails, the source node receives a route error packet and the
discovery procedure is invoked again.
27
CHAPTER 2. VANET NETWORKS
Zone Routing Protocol (ZRP): ZRP [55] was introduced in 1997 as the first
hybrid routing protocol with both a proactive and a reactive routing components.
ZRP defines a zone around each node consisting of its k-neighbourhood called routing
28
2.4. ROUTING PROTOCOLS
Optimized Link State Routing (OLSR): OLSR [66] is one of the most popular
MANET proactive unicast protocols. It finds an alternative route when a link failure
takes place. Every node broadcasts periodically Hello-messages with information
to specific nodes in the network to exchange neighbourhood information. Sending
these messages the size of the data to exchange to generate routes is lesser since
it does not interchange the routing tables. After receiving this information a node
builds an individual routing table. After, the node is able to calculate with shortest
path algorithm the route to every destination node.
29
CHAPTER 2. VANET NETWORKS
2.5 Applications
Previously, we presented the technologies that have been taken into account to de-
ploy VANETs by the research community and industry.In recent years, an extensive
list of potential applications and services addressed to be applied over such networks
have been proposed. The main factors that have led to this development are:
• and the gamble of governments and institutions because they understand that
it can improve the daily lives of citizens.
This is reflected in the large number of projects and consortia that are currently
working on developing VANET networks. Nowadays, the main research foci are in
Europe, USA, and Japan. The following is a non-exhaustive list of some of the
projects/consortia grouped by their geographical areas:
• USA: PATH (California Parthners for Advanced Transit and Highways) (1986),
IVI (Intelligent Vehicle Initiative) (1998-2004), WAVE (Wireless Access in Ve-
hicular Environments) (2004), VII (Vehicle Infrastructure Integration (2004-
2006), and VSC (Vehicle Safety Communications Consortium) (2002-2009).
Additionally, there are some projects which are not specifically proposed to tackle
problems for vehicular ad-hoc networks as DIRICOM (Diseño Inteligente de Redes
Inalámbricas de Comunicación) 6 at University of Málaga. However, they address
several design VANET problems offering different results.
4
CARLINK Website - http://carlink.lcc.uma.es
5
WiSafeCar Website - http://wisafecar.gforge.uni.lu
6
DIRICOM Website - http://diricom.lcc.uma.es
30
2.5. APPLICATIONS
31
CHAPTER 2. VANET NETWORKS
For this second group, the transportation efficiency applications, CARLINK consor-
tium presented an innovative user guidance approach able to offer optimal routes
which may involve different transportation modes, this approach is called optimal
multimodal transport service [9]. Applying this concept the user is able to take
the optimal trip taken into account that he can walk, drive a car, take the public
transport, etc.
32
2.6. SIMULATION OF VANETS
33
CHAPTER 2. VANET NETWORKS
However, due to the complexity of the real world, a lot of the events related
to the signal propagation that plays an important role in the performance of the
outdoor experiments are missed in the simulations: passing by obstacles, reflection
problems, signal interferences, etc. Thus, simulation also presents an important
drawback: the fidelity of the generated results.
The first approach used for simulating VANETs lies in using road traffic simula-
tors capable of generating mobility traces, which are later evaluated by an existing
specific MANET simulator. The public availability of many of these MANET sim-
ulators is the main motivation for the success of this approach. However, it has a
major drawback: the majority of VANET applications implies that vehicles react
to the network events and this behavior is difficult to be modeled with this scheme.
The most research community adopt Ns-2 (network simulator) [98] for MANET
simulating, even there are more network simulators as OMNet [103], Ns-3 [99] or
OPNET [105].
The number of road traffic simulators which generate Ns-2 format traces is large:
the most comprehensive ones are VanetMobiSim and SUMO, however we can also
find Videlio, RoadSim, CARISMA, VISSIM, and MMTS. There are also traffic sim-
ulators that generate traces for other MANET simulators as CORSIM/TSIS, SJ04,
SSM/TSM, and STRAW. Finally, TraNS and MOVE are simulators which combine
the SUMO mobility model generator and Ns-2 simulator in a unique tool [8].
34
2.6. SIMULATION OF VANETS
Finally, there are some frameworks as JANE [54], a Java-based middleware plat-
form for MANET applications programming. It allows the developer to test the
applications in a simulation environment and, also, over real mobile devices.
Ns-2 is an open source network simulator, so it is freely available and the user
is able to modify the source code (C++ and OTcl) [131]. It provides a packet level
simulation over a lot of protocols, supporting several transport protocols, several
forms of multicast, wired networking, several ad-hoc routing protocols and propa-
gation models, data broadcasting, satellite, etc. It incorporates different network
flow generators as web, telnet, CBR (constant bit rate generator), etc. for using
35
CHAPTER 2. VANET NETWORKS
them in the simulations. In addition, Ns-2 has the possibility of using mobile nodes.
The mobility of these nodes may be specified either directly in the simulation file
or by using a mobility trace file. In this case, the trace file is generated by Vanet-
MobiSim. Finally, other important feature is that it incorporates several add-ons as
the visualization tools NAM [96] (Network Animator) and TraceGraph [67].
36
2.7. RESEARCH CHALLENGES IN VANETS
• Spectrum issues: The use of IEEE 802.11 based technologies for VANET
communications needs to allocate these communications at the free spectrum.
In the US the FCC has already allocated 75 MHz of spectrum at 5.9 GHz (from
5.850 to 5.950 GHz) for V2V and V2I communications [141]. However, in Eu-
rope there are not a continuos free spectrum band of 75 MHz in DSRC. Hence
Car-2-Car consortium has proposed a derivative of the US approach, allocating
2 × 10 MHz for primary use of safety critical applications at 5.9 GHz [108].
These three approaches may be used mixing them developing hybrid solutions.
• Security and privacy: The potential of the proposed applications for such
networks and the information they may manage could cause some malicious
entity make use of them. Different kind of threats could exist, like fake mes-
sages broadcasting which could cause disruption of traffic or even danger.
Thus, security is an issue that needs to be carefully addressed in the design
of VANETs. Privacy and anonymity must be preserved avoiding identification
or vehicle tracking for non-trusted parties.
37
CHAPTER 2. VANET NETWORKS
As it can be seen from the presented list of challenges, the study of vehicu-
lar ad-hoc networks is an open problem that involves different areas of knowledge.
It involves communication technologies, metaheuristics for optimization problems,
cryptography and intrusion detection for security [18], sociological studies and math-
ematical modeling of driver behavior [87], and so on.
38
Chapter 3
Metaheuristics
39
CHAPTER 3. METAHEURISTICS
route to take to get from one place to another, how to organize our schedule, etc.
As these problems have small dimension, we can process them easily by using our
brain. However, when the optimization problems become larger and more complex
it appears the necessity of using specialized tools and the computational power of
computers
This section is intended to define different concepts that will be used throughout
the chapter and whole memory. Begining with the formal definition of optimization.
Assuming, without loss of generality, in the case of minimization, we can define an
optimization problem as:
f : S −→ R (3.1)
The search space S is given by a set of variables X = {x1 , x2 , ..., xn } and their
domains that are respectively D1 , D2 , ..., Dn . Thus, solving an optimization problem
consist in finding a solution x∗i ∈ S such that
The importance of the existing optimization problems has prompted the develop-
ment of multiple methods to solve them along the history of Information Technology.
A brief classification of these techniques is shown in Figure 3.1. The more general
classification which divides these techniques into exact and approximate. The exact
40
3.1. DEFINITION OF METAHEURISTIC
methods, which are based on the mathematical extraction of the optimal solution,
or an exhaustive search until the optimum is found, guarantee the optimality of the
solution obtained. These techniques present some drawbacks, however. The time
they require, though bounded, is generally very large, especially for NP-complex
problems. Furthermore, it is not always possible to find such an exact technique
for every problem. This makes exact techniques not to be the right choice in many
occasions, since both their time and memory requirements can become unreasonably
high for large problems. Therefore, approximate methods have been often used
by the research community in the last few decades. These methods sacrifice the
guarantee of finding the optimum in favor of providing some satisfactory solution
within reasonable time.
Among approximate algorithms, one can find two types: ad hoc heuristics and
metaheuristics. We focus this chapter on the latter. Ad hoc heuristics can in turn
be divided between constructive heuristics and local search methods.
Constructive heuristics are usually the swiftest methods. They construct a solu-
tion from scratch by iteratively incorporating components until a complete solution
is obtained, which is returned as the algorithm output. Finding some constructive
heuristic can be easy in many cases, but the obtained solutions are of low quality.
In fact, designing one such method that actually produces high quality solutions is
a nontrivial task, since it mainly depends on the problem, and requires thorough
understanding of it. For example, in problems with many constraints it could hap-
pen that many partial solutions do not lead to any feasible solution.
41
CHAPTER 3. METAHEURISTICS
N : S −→ S (3.4)
Finally, three decades ago came a new stream research within the approximate
algorithms. It basically tries to combine basic heuristic methods in higher level
frameworks aimed at efficiently and effectively exploring a search space. These
methods are called metaheuristics, but they were often called modern heuristics.
To this type of algorithms belong the tabu search (TS), genetic algorithms (GA),
differential evolution (DE), and simulated annealing (SA), among others. Since its
emergence the term metaheuristic has been defined in different ways. Osman and
Laporte proposed a widely used definition in 1996 [106], which is presented following:
42
3.2. METAHEURISTICS CLASSIFICATION
• Metaheuristics are higher level strategies that gide the search process.
• The goal is to efficiently explore the search space in order to find (quasi-)
optimal solutions.
43
CHAPTER 3. METAHEURISTICS
• Population-based vs. single point search (trajectory): In this case, the charac-
teristic used for the classification is the number of solutions used at the same
time. On the one hand, single point search algorithms work on a single solution
describing a trajectory in the search space during the search process. They en-
compass local search-based metaheuristics, like Variable Neighborhood Search
(VNS), Tabu Search (TS), and Iterated Local Search (ILS). On the other hand,
population-based methods work on a set of solutions (points) called popula-
tion. Figure 3.1 shows graphically some examples of this taxonomy.
• Static vs. dynamic objective function: The algorithms which keep the objective
function given in the problem during the whole process are called metaheuris-
tics with static objective function. However, there are other algorithms with
dynamic objective function, like Guided Local Search (GLS), which modify the
fitness function during the search, incorporating information collected during
the search process to escape from local optimum.
• The Simulated Annealing (SA) is probably the first algorithm that applies an
explicit strategy to escape from local minimum. It was described in 1983 [73],
its origins lie in a statistical mechanism called metropolis [89]. The name and
inspiration come from annealing in metallurgy, a technique involving heating
and controlled cooling of a material to increase the size of its crystals and
reduce their defects. The heat causes the atoms to become unstuck from their
44
3.2. METAHEURISTICS CLASSIFICATION
initial positions (a local minimum of the internal energy) and wander randomly
through states of higher energy; the slow cooling gives them more chances of
finding configurations with lower internal energy than the initial one. To avoid
local minimum, the algorithm allows to choose a solution with worse fitness
than the current solution. Over successive iterations of the algorithm is chosen,
from the current solution s, a solution s0 in the neighborhood N (s). If s0 has
better quality than s, then s is replaced by s0 as the current solution. However,
if s0 is worse, then it is accepted with a certain probability that depends on
the current temperature T and the difference between the two fitness solutions
(f (s) − f (s0 )), in the case of minimization.
• Tabu Search (TS) is known as one of metaheuristics that have been applied
with greater success in solving classical and real optimization problems. The
fundamentals of this method were introduced in [49], and both, technique and
components, were specified in [50]. It uses flexible structures of memory, which
permit exploit the search information more thoroughly than by rigid memory
or memory-less systems, conditions for strategically constraining and freeing
the search process (emboided in tabu restrictions and aspiration criteria), and
memory functions of varying time spans for intensifying and diversifying the
search (reinforcing attributes historically found good and driving the search
into new regions).
45
CHAPTER 3. METAHEURISTICS
• Iterated Local Search (ILS) [130] is a metaheuristic which involves the repeated
application of a local search algorithm applied to the candidate solutions found
by a broader search process that involves a biased random walk through the
search space. ILS is based on a simple but effective idea. The algorithm
works by first selecting a starting point for the search either randomly or
via a domain specific construction heuristic. Then, the starting position is
optimized using a local search strategy. The algorithm loop involves three
steps: a perturbation of the current solution, the application of the local search
to the perturbation, and an acceptance decision of whether or not the locally
optimizing candidate solution should replace the current working solution for
the search. The acceptance of new solutions depending on the search history
and characteristics of the new local minimum.
46
3.2. METAHEURISTICS CLASSIFICATION
47
CHAPTER 3. METAHEURISTICS
Finally, note that it is currently receiving much attention from the research
community [79].
48
3.3. ALGORITHMS USED IN THIS WORK
We select these five algorithms because they are able to work on continuos (real
valued) search spaces. Also, these techniques were selected with the aim of ex-
perimenting with different population structures, as well as different reproduction
mechanisms.
49
CHAPTER 3. METAHEURISTICS
2
prob(T, s, s0 ) = f (s0 )−f (s)
(3.6)
1+e T
50
3.3. ALGORITHMS USED IN THIS WORK
The selection of a suitable cooling strategy is crucial for the behavior of the
algorithm. The cooling strategy Q defines the temperature T for each moment k,
Tk+1 = Q(Tk , k). The most used one is Tk+1 = α × Tk , where α ∈ (0, 1). The cooling
strategy and the initial temperature must be adapted to problems because the cost
51
CHAPTER 3. METAHEURISTICS
of escaping a local optimum depends on the structure of the search space. There
are many ways leading to different variants of SA as: Fast SA (FSA), Very Fast SA
(VFSA) or Adaptative SA (ASA) [17]. Ingber [64] proposed an empircal solution
which starts with an initial random sampling of search space and T0 is calculated
from the average and the standard deviation of the values of the objective function.
52
3.3. ALGORITHMS USED IN THIS WORK
The genes are encoded in a string of symbols (numbers or letters). There are
various representations (see Figure 3.3) such as the use of binary numbers in BCD
or Gray codes, the use of real or integer, etc. Most of the time, a correct coding is
the key to a good resolution of the problem. Typically, codification is static, but in
cases of numerical optimization, the number of bits dedicated to encode a parameter
can vary.
53
CHAPTER 3. METAHEURISTICS
fi
pi = PN (3.7)
j=1 fj
54
3.3. ALGORITHMS USED IN THIS WORK
After selecting the parents, their chromosomes are combined, using recombina-
tion and mutation operators.
a) Single-point Crossover
b) Two-point Crossover
55
CHAPTER 3. METAHEURISTICS
used, and it is used just in a portion of the chromosome. In bitstrings (and in general,
in linear strings) mutation is done by randomly substituting the symbol contained
at a certain position by a different symbol. Figure 3.6 shows the mutation of the
fifth gene of the chromosome.
After the evaluation of the offspring (Line 7), the replacement step is carried out
to keep the population size constant. To do so, some individuals from the popula-
tion have to be substituted by some of the individuals created during reproduction
(offspring). This can be done in several ways [102]:
There are two ways to do this task which define two different genetic algorithms:
steady state GA (ssGA) and generational GA (genGA). In the first one, every indi-
vidual asynchronously replaced after generation. genGA defines the replacement of
generations, that is, all individuals are updated at once at the end of each generation.
GAs have been thoroughly used in many domains obtaining satisfactory results.
For example, GAs have been applied to solve problems such as the scheduling and
timetabling [116], the software project management [7], the ARN structures predic-
tion [140], etc. GAs have been applied to the field of MANET/VANET networks to
solve problems such as the location of base stations [85], the energy consumption of
routing protocols [142] or the optimization of broadcasting protocols [6].
56
3.3. ALGORITHMS USED IN THIS WORK
The first purposed ES selected just one individual (parent) to create one new
(individual) offspring (see Figure 3.7). This strategy is denoted (1 + 1) − ES. The
new population accepts the best individuals (parent or offspring) according to the
Equation 3.10. Thus, less fit individuals have zero chance of survival. In (1+1)−ES,
the new individual is generated by the next equation:
However, the mutation by itself does not have the ability to combine the genetic
information of the best individuals, so it is also necessary to introduce crossover
operators. Thus, the first type of a multimembered ES was proposed, the (µ+1)−ES
or steady-state ES. There are µ parents at a time. Two of them are chosen at random
57
CHAPTER 3. METAHEURISTICS
and recombined to give life to an offspring, which also underlies mutation. The
selection resembles extinction of the worst, may it be the offspring or one of the
parents, thus keeping constant the population size.
• in the (µ, λ)−ES, the selection takes place among the λ offspring only, whereas
their parents are forgotten no matter how good or bad their fitness was com-
pared to that of the new generation. Obviously, this strategy relies on a birth
surplus, i.e., on λ > µ in a strict Darwinian sense of natural selection.
Since the GAs described in Section 3.3.2, the ESs belong to EAs. Although
they belong to the same family of algorithms there are some important differences
between them [123]:
• ESs are applied to real parametric optimization problems, but GAs are mostly
applied to optimization of attributes.
• The key operator of the GA is the recombination, however the most important
operator in ES is the mutation.
58
3.3. ALGORITHMS USED IN THIS WORK
• GAs are global search mechanisms, that is, they have trouble on fine adjust-
ment, just the opposite happens with ES.
• xi = hxi1 , xi2 , ..., xin i and pBesti = hpi1 , pi2 , ..., pin i store its current position
and the best solution of the particle, respectively.
• v i = hvi1 , vi2 , ..., vin i is the gradient vector (direction) which defines the next
movement of the particle pi .
• The two fitness values are the current one (f itness_xi ) and the value of the
best local solution found so far (f itness_pBest).
59
CHAPTER 3. METAHEURISTICS
i
where factor vg+1 is the velocity of the particle and is given by
i
vg+1 ← w · vgi + ϕ1 · (pig − xig ) + ϕ2 · (bg − xig ) (3.12)
In this formula, pig is the best solution that the particle i has stored so far, bg is
the best particle (also known as the leader) that the entire swarm has ever created,
and w is the inertia weight of the particle (it controls the trade-off between global
and local experience). Finally, ϕ1 (cognitive component) and ϕ2 (social component)
are specific parameters which control the relative effect of the personal and global
best particles (ϕ1 = ϕ2 = 2 · U N (0, 1)).
The particles movement is showed in Figure 3.8. Where the dotted arrows repre-
sent the direction of the current velocity vectors: vgpBest (velocity of the best position
taken by the particle), vgk (velocity of the best particle found in the neighborhood),
and vgi (current velocity of the particle). The arrow line represents the direction
taken by the particle to move from point xig to point xg+1 i . The change in direction
of the arrow is due to the influence of other directions (gradient) involved in the
movement.
60
3.3. ALGORITHMS USED IN THIS WORK
Figure 3.8: Particle movement from point xig to point xig+1 in the search space (PSO).
PSO may be configured in different ways defining different variants of this algo-
rithm. Kennedy in [71] defined four main variants depending on the influence of the
values of the cognitive and social components (ϕ1 and ϕ2 ). They are the following
ones:
According to [72] the sum of the values of the cognitive and social components of
PSO (ϕ1 and ϕ2 ) should be about 4.0, and common usage is to set them 2.05 each.
61
CHAPTER 3. METAHEURISTICS
Differential Evolutions is the youngest technique used to carry out the work pre-
sented here. It appears in 1994 when Kenneth Price tried to solve the Chebyshev
polynomials [32]. Then, Price came up with the idea of using vector differences for
perturbing the vector population. Since this seminal idea a lively discussion between
Ken Price and Rainer Storm and endless ruminations and computer simulations on
both parts yielded many substantial improvements which make DE the versatile and
robust tool it is today [128].
In order to increase even more the diversity in the population, each mutated
individual undergoes a crossover operation with the target individual vgi , by means
of which a trial individual uig+1 is generated. A randomly chosen position is taken
from the mutant individual to prevent that the trial individual replicates the target
individual.
w i if r(j) ≤ Cr or j = jr ,
g+1 (j)
uig+1 (j) ← (3.14)
v i (j) otherwise.
g
62
3.3. ALGORITHMS USED IN THIS WORK
Algorithm 5 Pseudocode of DE
1: initializePopulation()
2: while g < maxGenerations or stopCondition() do
3: for each individual vgi do
4: choose mutually different(r1 , r2 , r3 )
i
5: wg+1 ← mutation(vgr1 , vgr2 , vgr3 , µ)
6: uig+1 ← crossover(vgi , wg+1
i
, cp)
i
7: evaluate(ug+1 )
i
8: vg+1 ← selection(vgi , uig+1 )
9: end for
10: end while
63
CHAPTER 3. METAHEURISTICS
64
Chapter 4
VANET networks are composed of a set of nodes (vehicles and roadside infrastruc-
ture elements) that are connected by technologies based on IEEE 802.11 standards.
This means that nodes can only communicate within a limited space and time. Fur-
thermore, the continuous movement of vehicles at high speeds causes highly variable
topologies. It is therefore crucial to find the optimal configuration settings of the
protocols that they use to maximize the transfer of information and the bandwidth
of such networks.
In Section 4.1, we present the file transfer service which is one of the most
frequently used in networks. For this reason, offering an optimal configuration is
critical in VANETs. Section 4.2 introduces the VDTP file transfer protocol used in
VANET networks. The principal objective of this Thesis is to solve the problem of
optimizing the VDTP protocol presented in Section 4.3.
65
CHAPTER 4. VDTP PROTOCOL OPTIMIZATION PROBLEM
• Due to the changing network topology, the sender location may change during
a file transfer. Therefore, it is essential to keep the complete control over the
transfer on the receiver side.
• For the transfer, files should be split into several blocks. Therefore, receiver
may temporally stops the transfer because of the likely disconnections with the
sender. A mechanism for avoiding indefinited waiting for lost packets should
be also provided.
However, even the file transfer protocol meets the requirements presented above,
it does not ensure a correct and complete information transfers. Hence, there is the
need to optimize these protocols to achieve the best performance of these protocols.
66
4.2. VDTP PROTOCOL
The first phase of the file transfer begins when the file petitioner node sends a
FIRQ (File Information Request) packet to the file owner node that stores the file
to be downloaded. The file owner node reply with a FIRP (File Information Reply)
packet, that encapsulates metadata about the file (see Figure 4.1). The metadata
contains information including the size of the file and the size of data blocks (chunks)
the file will be split in.
The petitioner is now waiting for the file information coming from the owner. The
file information will be hopefully received in a FIRP packet starting data requesting
phase. Then, the file petitioner calculates the number of segments in which the file
will be split, dividing the file size by the block size, and it also decides the next
data segment to download. The petitioner requests this data segment i by sending a
DRQ(i) (Data Request) packet to the file owner. Then the node, which stores the
file, encapsulates the requested data block i in a DRP(i) (Data Reply) packet and
it sends it to the file petitioner node. The exchange of DRQ(i) and DRP(i) packets
is repeated until the file petitioner node receives the last chunk of the requested file
(see Figure 4.2). Note that each data segment is requested individually, and the
next data segment is not requested until the current one is already received. The
whole process finishes when all data segments are downloaded.
67
CHAPTER 4. VDTP PROTOCOL OPTIMIZATION PROBLEM
Figure 4.2: General operation during data requesting phase of VDTP protocol.
Packet delivery is likely to fail due to the hostile communication medium. There-
fore, VDTP provides a set of timers and counters in charge of solving problems
concerning packet or connection lost. The timers control the timeout for receiving
data after sending a request packet (FIRQ or DRQ). After this timeout, the request
packet is resent (see Figure 4.3) to the file owner. In turn, the counters are used
to control the number of times a packet has been retransmitted. The counters are
initialized to the maximum value assigned to them and they decrease every time
the petitioner node retransmits the same packet. If the counter falls to zero, it is
considered that the download failed because the connection is lost with file owner
and the whole process is aborted (see Figure 4.3.b).
68
4.2. VDTP PROTOCOL
The packets used by this protocol have the format showed in Figure 4.4. The
packet header fields are discussed below:
The packet data field (DATA) is used to transfer the string of bits that is part of
a particular data block or the information that is sent in FIRQ and FIRP packets.
The size of the data blocks or chunk size is the number of bytes data located in
the packet and it is between 128 and 524,288 bytes (524,288 bytes = 512 Kbytes).
This parameter affects the number of data packets (DRQ(i) and DRP(i)) needed
to transfer files. Since when the chunk size decreases, the number of data packets
exchanged to transfer a file increases and therefore reducing the effective bandwidth
of the network. However, by increasing the block size the possibility of packet
loss during data transfer increases. Because more time is needed to transfer data
packets completely, which means that the link between vehicles must exist longer,
something critical in networks that do not have any infrastructure and with highly
variant topology as VANETs.
69
CHAPTER 4. VDTP PROTOCOL OPTIMIZATION PROBLEM
The timeout between retransmissions is between one and ten seconds, because
a data block of a few Kbytes do not need longer to be transferred. When this time
increases the file requester node needs longer to detect that a packet is lost and
thereby to resend the request packets, increasing the total time required for file
transfers, and thus decreasing the effective bandwidth of the network. However, if
time is not long enough, some packets may be considered as lost when they simply
need a longer time than expected to reach the file requester node, so that unneces-
sary data (request packets) will flow through network, overloading it.
The selection of values that are given to the VDTP configuration parameters
must be carried out carefully, since these parameters, as explained above, directly
influence the performance and quality of service provided by the protocol.
70
4.3. OFTC PROBLEM DEFINITION
Since we are interested in finding the best possible VDTP configuration, we have
focused on the three aforementioned parameters: chunk_size, retransmission_time,
and number of max_attempts. Therefore, a given configuration (representing a
solution of the problem) is a vector of three values Ci = (chunk_size, total_attempts,
retransmission_time). The range of each parameter is:
• total_attempts: N+ ∈ [1 · · · 250]
• retransmission_time: R+ ∈ [1 · · · 10]
The problem consist on finding a valid configuration Ci that satisfies the following
inequality:
f (Ci ) ≤ f (Cj ), ∀Cj ∈ C (4.2)
2
A multi-objective evaluation [37] was not taken into account since objectives are not necessarily
opposed in this work.
71
CHAPTER 4. VDTP PROTOCOL OPTIMIZATION PROBLEM
That is, the OFTC problem is a minimization problem where we want to minimize
the fitness function defined by Equation 4.1 subject to the restrictions of the search
space C.
As file transfers are very dependent on the scenario in which vehicles are located,
we have decided that the evaluation of a given configuration is made on a number
(N ) different transfers using this configuration. Therefore, the fitness function to
be minimized to obtain the optimal configuration of VDTP protocol is given by the
following expression:
N N
1 X 1 X transmission_timei + lost_packetsi
f= fi = (4.3)
N N log(data_transf erredi + K)
i=1 i=1
In order to obtain the metrics that are necessary for the evaluation of the fN
function we have used a VanetMobiSim/Ns-2 VANET network simulator (see
Section 2.6.2).
In this chapter we have defined the basis of the problem of optimizing the peer-
to-peer file transfer protocol in VANETs. In subsequent chapters we present both
the experiments using metaheuristic techniques and the results obtained.
72
Chapter 5
Experiments
This chapter presents the methodology used to solve the problem of optimizing the
peer-to-peer information transfer in VANET networks by using VDTP protocol. The
aim of this chapter is to provide all information necessary to enable the repetition
of the experiments carried out in this Thesis. The chapter is organized as follows:
Section 5.1 gives an overview about the experiments. Then, Section 5.2 shows the
software and hardware tools used for both, the development and the executions.
Finally, Section 5.3 presents the metrics used to compare the performance of the
different algorithms.
73
CHAPTER 5. EXPERIMENTS
the transmission time required for transferring files, the number of lost packets gen-
erated during the simulation, and the amount of data exchanged between vehicles.
This information is used to compute the fitness function presented in Section 4.3.
Figure 5.1: Optimization framework for VDTP configuration in VANETs, where the
algorithms invoke the ns-2 simulator for each solution evaluation.
In order to obtain results close to the real world, we have defined two simulation
VANET scenarios (instances) from real areas of Málaga in Spain (see Figure 5.2),
creating an urban and a highway scenarios. We have defined this two distinct sce-
narios since the characteristics of the movement of vehicles for these two scenarios
are different enough to affect the transfer of files. For example, in urban areas the
vehicles density is higher and these vehicles travel at lower speeds than in interurban
environments, increasing the likelihood that the transfers are carried out successfully
in urban than in the highways. Therefore, we can analyze in both scenarios the be-
havior and performance of the compared algorithms, as well as the differences in the
resulting VDTP configurations in terms of communication efficiency. Furthermore,
we can compare these automatically generated configurations against the ones used
in the real experiments by human experts of CARLINK Consortium [26, 25].
74
5.1. OPTIMIZATION FRAMEWORK
The urban instance covers an area of 120,000 m2 (Figure 5.2.a) including build-
ings and semaphores. Whereas that the highway scenario covers a stretch of 1 km
with two directions (Figure 5.2.b) without buildings and semaphores. In both sce-
narios there are 30 vehicles moving through the roads, ten of those are trying to
download a file that is stored in other ten vehicles, which is equivalent to simulate
ten different transfers on the same scenario. Vehicles on the urban scenario travel
at speeds between 30 km/h and 50 km/h. However, vehicles on highway roads do
so at speeds ranging from 80 km/h and 110 km/h (see Figure 5.3).
The vehicles try to transfer 1 Mbyte (1,024 Kbytes) files. However, the transfer
may be of less data, if the communication is rejected (see Section 4.2.1). The
communications between the vehicles is conditioned by the use of IEEE 802.11b
standard network interfaces [53]. To obtain more realistic results, we have used the
real characteristics of the PCMCIA PROXIM ORiNOCO - Classic Gold 1 network
interface which has been connected to an omnidirectional antenna with a gain of 7
dBi. Other features of the protocols used to deploy the VANET are summarized in
Table 5.1.
1
ORiNOCO Classic Gold PC Card: http://www.proxim.com/products/wifi/client/goldpccard/
75
CHAPTER 5. EXPERIMENTS
Figure 5.3: Málaga areas representation by using VanetMobiSim for their simulation.
Parameter Value
Number of vehicles 30
Number of file transfers 10
Link Layer: Network Interface PROXIM ORiNOCO - Classic Gold (802.11b)
Link Layer: antenna gain 7 dBi (Omnidirectional)
Routing Protocol DSR Protocol [69]
Transport Protocol DSR Protocol [69]
Application Protocol VDTP Protocol [23]
Using a simulator for the task of evaluating solutions introduces a new issue to
keep in mind, the algorithm runtime. The simulation requires a high computation
time, increasing the execution time of algorithms critically. In order to resolve this
problem we have executed the algorithms using a cluster to parallelize the different
independent runs (see Section 5.2).
76
5.1. OPTIMIZATION FRAMEWORK
In order to compare the performance of the five studied algorithms solving OFTC
problem we have executed them on an equal footing. For this reason in our exper-
iments, they have the same Stop Condition: 1,000 solution evaluations (VANET
simulations) per run. Therefore, the population based algorithms (PSO, DE, GA,
and ES) were configured with 20 individuals, performing 50 generational steps
(20 individuals × 50 generations = 1, 000 evaluations); and SA performs 1,000
generations. In turn, the comparison is done from 30 independent runs performed
of each of the algorithms to compare more representative results.
The parameterization of the SA and PSO algorithms used to solve the OFTC
problem are presented in tables 5.2 and 5.3, respectively.
77
CHAPTER 5. EXPERIMENTS
• Required Classes present the specific behavior and information of the prob-
lem. The interface of these classes is unique and pre-established to allow
interaction with the provided classes. This part of the skeleton has to be
implemented from the problem objective.
Although the skeleton may vary according to the algorithm, all the skeletons
coincide with a core set of classes. The UML diagram (Figure 5.4) presents the
Class Diagram of the core of MALLBA.
78
5.2. SOFTWARE AND HARDWARE TOOLS
Requi
redCl
asses
In this Thesis we have developed all classes needed to use the optimization
algorithms presented before, however we have not implemented Solver_Lan and
Solver_Wan since we have not solved this problems using parallel implementations.
79
CHAPTER 5. EXPERIMENTS
• VDTPappClass: It is the interface between the Tcl simulation and the protocol
definition.
• VDTPDataS: It defines the whole VDTP packet and the interaction between
the upper and lower levels of this protocol.
• AskPacketTimer: Necessary to get the times and timers used to send FIRP
and DRP packets (see Section 4.2.1).
• AckTimer: Necessary to get the times and timers used to send FIRQ and DRQ
packets (see Section 4.2.1).
80
5.2. SOFTWARE AND HARDWARE TOOLS
As the execution of each each algorithm separately require in average 36,08 hours,
we have used a High-Throughput Computing (HTC) environment. Years ago, su-
percomputers were used to address the problems that required a lot of resources for
a long time. Such systems are capable of dealing with problems that require high
computation power. However, just the institutions with high budgets might use this
systems because they had very high prices. Nowadays, a collection of interconnected
heterogeneous nodes (machines) can be used to execute tasks in distributed manner.
These nodes represent resources, which can be simple personal computers. There-
fore, in place of supercomputers, we can use multiple cheap PCs, interconnected via
a network, and simply installing a software that is responsible for distributing the
jobs between the different computers.
81
CHAPTER 5. EXPERIMENTS
In this Thesis we have chosen Condor [132] to create the HTC environment.
Condor is a freely available project at the University of Wisconsin-Madison, it is de-
signed to encapsulate and run large collections of distributed computing resources
with the ultimate aim of providing more access to available computing power. Con-
dor specializes in giving users the ability to run huge numbers of tasks over long
periods of time. When users submit jobs, Condor searches for and finds the available
machines on the entire network and executes the work on these machines. Condor
has the ability to detect whether a machine that was running a job becomes unavail-
able for a while. In addition, the users can set a checkpoint and migrate their work
tasks to different machines that are idle or available. The main features of Condor
are [16]:
• Starting with version 6.9.5, Condor is released with the Apache License ver-
sion 2.0.
• Users of Condor may be assured that their jobs will eventually complete.
• Measures have been taken to assure owners of workstations that their filesys-
tems will not be touched by remotely executing jobs.
• Condor does its work completely outside the kernel, and is compatible with
Berkeley 4.2 and 4.3 UNIX kernels and many of their derivatives. Users do
not have to run a custom operating system to get the benefits of Condor.
82
5.3. USED METRICS TO COMPARE RESULTS
We analyze the obtained results separately in the two previously defined sce-
narios (urban and highway). The metrics used to compare the performance of the
different algorithms are based on the study of the final values of the objective func-
tion for each of the 30 independent runs. For our work we have used the mean,
standard deviation, median, minimum, and maximum values obtained for
the different algorithms. As a minimization problem, the configuration that obtains
the minimum fitness value (see Section 4.3) is the optimal. Also, we have used the
Friedman test for a comparison of algorithms with statistical significance.
83
CHAPTER 5. EXPERIMENTS
84
Chapter 6
Results
This chapter presents the results obtained by applying five metaheuristic algorithms
to the optimization problem of the peer-to-peer transfer of information in VANET
networks using VDTP (OFTC problem). In such networks, the information trans-
fers varie critically depending on the scenario where vehicles are moving, so we have
defined two different scenarios, an urban and a highway, over which it has solved
the proposed optimization problem.
Table 6.1 shows the resulting fitness values regarding the urban and highway
VANET scenarios. The third column contains the mean and standard deviation of
the values returned by the objective function in the 30 independent executions. In
turn, it shows minimum (best fitness), maximum (worst fitness), and median values
for each of the algorithms and scenarios.
85
CHAPTER 6. RESULTS
Table 6.1: Final fitness values for both VANET scenarios and the five optimization
algorithms.
For the urban instance, we can observe in Table 6.1 that PSO obtained the best
result in terms of the mean fitness (1.6346 ± 0.2899). This smallest mean value leads
us to believe that using PSO the resulting VDTP configuration ends in an efficient
communication which is fast and accurate between vehicles. In addition, the best
median and maximum values were also obtained by PSO, although the best mini-
mum, i.e., the best VDTP configuration found for urban scenario, was reached by
DE (0.7389). This is an expected value, since DE generally shows a pronounced ex-
ploitative behavior (using a parametrization close to the standard one) [113], while
PSO tends to have an explorative performance using a high inertia (as in this study
w = 0.5) [1].
In the highway scenario the results are similar, PSO obtained also the best mean
fitness value (4.1761 ± 0.2556). Besides, PSO presents the lowest value of standard
deviation. This implies a considerable advantage, since it provides our model with
a high robustness, which is a crucial issue when designing VANETs. In terms of
the minimum fitness, GA (2.5345) obtained the best VDTP configuration for this
scenario.
86
6.1. GLOBAL RESULTS
Table 6.2 shows the results of applying Kolmogorov-Smirnov test to the results
of the five metaheuristic algorithms for boths scenarios. We have performed this test
with confidence level of 95% (p − value = 0.05). As we can see in the second column
of Table 6.2 (the asymptote) there are samples that do not satisfies the test (DE in
urban scenario and SA and PSO in highway scenario). Finally, we have applied a
non-parametric test because the distributions violate the condition of normality.
Table 6.2: KS-test results for the five algorithms and two scenarios.
1
SPSS (Statistical Package for the Social Sciences) - http://www.spss.com/
87
CHAPTER 6. RESULTS
A general comparison can be made using the Friedman [124] statistical test
by means of which the algorithms are sorted in a ranked list. Table 6.3 shows the
Friedman ranking of the compared algorithms in urban and highway instances. In
this table, the best ranked algorithm is located in the top. For urban instance, PSO
and DE are the best ranked algorithms, showing SA the last position. Nevertheless,
for highway scenario, SA obtains the best rank, whereas PSO is located in the third
position.
Urban Highway
Algorithm Rank Algorithm Rank
PSO 1.27 SA 1.83
DE 1.83 GA 1.97
GA 3.07 PSO 2.17
ES 4.33 DE 3.67
SA 4.50 ES 4.97
Theses statistical results lead us to think that, in spite of the global best be-
havior of PSO, the different requirements implicit to both instances implies that
each algorithm can show quite different results depending on the VANET scenario
on which it operates. For example, DE shows a competitive performance in urban
scenario whereas it is the second worst in highway. The opposite example can be
observed in GA and SA which show weak results in urban but highly competitive
ones in highway. Therefore, the VANET designer can select the optimization model
more suited to his/her requirements, and choose the best option for each studied
VANET scenario.
Figures 6.1 and 6.2 illustrate the graphics of the best fitness values obtained
through the median execution in urban and highway scenarios, respectively.
88
6.2. ALGORITHMS PERFORMANCE STUDY
89
CHAPTER 6. RESULTS
Concerning to the execution times that each algorithm spent in the experiments
carried out in this work, Table 6.4 presents both, the mean time in which the best
solution was found (Tbest ) and the global mean run time (Trun ). The detailed exe-
cution time for each independent run of each algorithm are included in Appendices
(see Section A.2).
Table 6.4: Mean execution time (seconds) per independent run of each algorithm
for both, urban and highway, scenarios.
SA has spent shortest times to find its best solution and to finish the execution.
PSO and DE spent close execution times for the two VANET scenarios because they
perform similar internal operations. Finally, the two evolutionary algorithms (GA
and ES) consume also closed times.
In short, the algorithms require a time between 4.76E+03 and 9.00E+03 seconds
(80 and 150 minutes, respectively) to solve the problem in the urban scenario and
a time between 8.45E+02 and 2.19E+03 seconds (23 and 60 minutes, respectively)
to solve the same on highway instance. This is a relative high computational effort.
However it is justifcable since the benefits of finding an optimal configuration for
the VDTP protocol are considerable and during the life of the network.
90
6.3. VANET QOS ANALYSIS
We have simulated file transfers in the VANET scenarios defined in Section 5.1.1.
In these two scenarios (urban and highway) eleven 1 Mbyte (1,024 Kbytes) file trans-
fers are performed among the vehicles.
Tables 6.5 and 6.6 show the optimal parameter settings for the VDTP protocol
automatically obtained by the proposed algorithms and the average values of the
metrics used to analyze the QoS for both VANET scenarios. They also include the
parameter setting that has been used by experts of CARLINK followed by the results
of simulations (last row). The first three columns contain the different parameter
settings of the VDTP protocol, in this order: the chunk size, the timeout, and
the maximum number of retransmissions of a request packet. The following three
columns are the metrics obtained from the simulations in this order: the transmis-
sion time, the total number of packets lost during transmission, and the amount of
data downloaded correctly. The results are available in more detail in Section A.1
of the Appendicces.
Table 6.5: Optimal configurations achieved in the median execution and the CAR-
LINK experts one for VDTP protocol and simulation values in urban scenario.
91
CHAPTER 6. RESULTS
Table 6.6: Optimal configurations achieved in the median execution and the CAR-
LINK experts one for VDTP protocol and simulation values in highway scenario.
For the urban VANET scenario, the VDTP configuration obtained by PSO
(chunk size=41,358 bytes, retransmission time=10 secs, and max. attempts=3 )
achieves the best performance in terms of transmission time (3.41 secs) and mean
number of lost packets (0.27). Specifically, in comparison with the human experts
parameter configuration of CARLINK, PSO reduces the transmission time in 0.83
secs (19.5%) registering also a lower number of lost packets.
Something similar happens with the results obtained in the highway scenario, the
configuration obtained by PSO (chunk size=29,257 bytes, retransmission time=6.42
secs, and max. attempts=9 ) transfers the files faster than the others, regarding the
human experts configuration from 33.08 to 24.67 secs (25%). We must notice that,
in spite of achieving the PSO a higher reduction in the transmission time than SA
and GA, the fact of losing more packets (3.18 in PSO, 2.71 in GA, and 2.54 in SA)
in the global transference leads SA and GA to calculate a better fitness value.
Figure 6.3: Effective transmission data rates (throughput) in Kbps achieved during
the simulations of the final VDTP configurations in comparison with values given
by human expert configurations of CARLINK consortium.
92
6.3. VANET QOS ANALYSIS
According to figures 6.3.a and 6.3.b, the effective transmission data rate ob-
tained by practically all algorithms in the two VANET scenarios are higher than the
CARLINK experts configuration, except in the case of the parameter configuration
returned by ES in highway scenario.
Specifically, PSO achieves the highest effective data rate (2402.32 Kbps in urban
and 332 Kbps in highway scenarios). We again remind that the actual reduction
of effective data rates among vehicles are in the order of hundreds of Kbps, so our
savings (470.32 Kbps in urban and 84.4 Kbps in highway) are truly meaningful in
current real applications such as safety and traffic control. This clearly claims for
the utilization of these automatic algorithms to help human designers.
Notice the importance of the VANET scenario where there are the transfers of
information, because in highway the effective transmission data rates are 70% lower
than in the urban areas. This is due mainly to the high speed at which vehicles
move out of towns.
The following highlights the most important results presented in this chapter:
• Urban scenario:
• Highway scenario:
93
CHAPTER 6. RESULTS
94
Chapter 7
This chapter describes the conclusions drawn from the study carried out in this
Master Thesis and suggests some guidelines for the future work.
7.1 Conclusions
The deployment of vehicular networks is a field with about ten years of intense re-
search activity and progress. Nowadays, the widely adopted approach is equipping
vehicles with WLAN devices (IEEE 802.11 family). If vehicles can directly commu-
nicate with each other and with roadside infrastructure, an entirely new paradigm
for traffic safety and transport efficiency can be created.
In this Master Thesis we have optimized the VDTP protocol used in peer-to-peer
information transfer in VANETs. In order to do this we have defined the optimiza-
tion OFTC (Optimal File Transfer Protocol Configuration) problem, which lies in
searching efficient parameters setting of VDTP protocol that maximizes the amount
of data being transferred and minimizes the transmission time as the number of lost
packets.
95
CHAPTER 7. CONCLUSIONS AND FUTURE WORK
The proposed problem has been solved by employing five metaheuristic algo-
rithms (SA, GA, ES, PSO, and DE) that use the VanetMobiSim/Ns-2 vehicular
network simulator to evaluate the solutions generated during the execution. We
have developed the VDTP protocol in order to simulate it on ns-2. In addition,
we have modified ns-2 simulator adding the functionality of interacting with these
metaheuristic algorithms. In turn, we have defined two different scenarios on which
we have solved the problem (urban and highway instances) based on two real areas
of Málaga city. Finally, we have compared the performance of the obtained config-
urations with the defined ones by human experts of CARLINK consortium.
In order to compare the algorithms with each other we have used a nonparamet-
ric test, the Friedman test. The results reveal that PSO performs statistically better
than the others in the urban scenario. Moreover, this algorithm obtains similar re-
sults that the best algorithms (GA and SA) in the highway scenario. The genetic
algorithm also gets quite competitive results for both scenarios.
From the point of view of its real world utilization, PSO returned configuration
can reduce 19.6% of the transmission time in urban scenario and 25.43% in highway
areas with regards to human experts configuration, while transmitting the same
amount of data (1,024 Kbytes).
The highest effective data rates is obtained by using the same configuration
(PSO), it is 2402,32 Kbps (300,39 Kbytes/s) and 332 Kbps (41,5 Kbytes/s) in ur-
ban and highway scenarios, respectively. Besides, all the metaheuristic algorithms
have obtained higher bandwidth than that offered by CARLINK experts, except in
one case (ES in highway instance.) Furthermore, all analyzed VDTP configurations
have transferred correctly 1,024 Kbyte files with a non-significant packet loss.
The execution time spent on solving the OFTC problem by the algorithms are
between 80 and 150 minutes for the urban case and between 23 and 60 minutes
in the highway. Although involving a large computational effort is acceptable for
designers of VANETs.
The analysis of the results and the required computational effort lead us to advise
the final use of our automatic design algorithm for this kind of problems.
96
7.2. FUTURE WORK
This Master Thesis work is the starting point of several research lines, the most
notable ones are the following ones:
• The use of larger and more realistic VANET scenarios for evaluating in a more
realistic way the fitness function. Additionally, studying how the network sizes
affect the performance of these optimization techniques.
• Optimizing other protocols used in VANETs (such as DSR, UDP, ...) through
the use of the strategy used in the Master Thesis, i.e., coupling metaheuristic
techniques and a realistic VANET simulator.
• Applying on real-world tests the results obtained in this work using real cars
moving through roads, in order to compare the performance against the sim-
ulation results.
Besides the future challenges presented above, the field of vehicular networks
opens up a large universe difficult to explore. However, the benefits of reaching the
goal motivate us to invest in this difficult adventure.
97
CHAPTER 7. CONCLUSIONS AND FUTURE WORK
98
Appendix A
This appendix contains the results that have been obtained in the experiments car-
ried out in this Master Thesis and that have been discussed in Chapter 6. Section A.1
shows the results of simulations of the obtained configurations. Section A.2 presents
the execution times used in the execution of the algorithms.
The results of simulations in urban scenario are shown in Tables A.1, A.2, A.3,
A.4, and A.5 containing the results of configurations obtained by the algorithms
PSO, DE, GA, ES, and SA, respectively. The results obtained in this same scenario
using the configuration used CARLINK experts [24] are shown in Table A.6.
The results of simulations in urban scenario are shown in Tables A.7, A.8, A.9,
A.10, and A.11 containing the results of configurations obtained by the algorithms
PSO, DE, GA, ES, and SA, respectively. The results obtained in this same scenario
using the configuration used CARLINK experts [24] are shown in Table A.12.
99
APPENDIX A. DETAILED NUMERICAL RESULTS
The first column of the tables shows the number of the transfer, the second the
amount of data that has been transferred successfully in Kbytes, the third presents
the number of lost during the file transfer, and the fourth column shows the time in
seconds used to complete the download file.
Table A.1: Results obtained by simulating in urban scenario the PSO configuration
(chunk_size=41358, timeout=10.00000, max_attempts=3).
100
A.1. SIMULATION RESULTS
101
APPENDIX A. DETAILED NUMERICAL RESULTS
Table A.6: Results obtained by simulating in urban scenario the CARLINK config-
uration [24] (chunk_size=25600, timeout=8.0, max_attempts=8).
102
A.1. SIMULATION RESULTS
Table A.7: Results obtained by simulating in highway scenario the PSO configura-
tion (chunk_size=29257, timeout=6.42140, max_attempts=9).
103
APPENDIX A. DETAILED NUMERICAL RESULTS
104
A.1. SIMULATION RESULTS
105
APPENDIX A. DETAILED NUMERICAL RESULTS
Tables A.13 and A.14 show the execution time required by each algorithm to
solve the OFTC problem for urban and highway scenarios, respectively. The first
column shows the independent run which is measured. For each algorithm, the first
column (Best sol.) indicates the time in seconds when the best solution was found
and the second column (Total) shows the total execution time taken to run the
independent run.
106
PSO DE ES ES GA
# Best sol. Total Best sol. Total Best sol. Total Best sol. Total Best sol. Total
1 1.58E+10 1.63E+10 6.16E+08 5.66E+09 7.43E+07 7.43E+07 5.17E+07 5.61E+08 3.27E+09 5.59E+09
2 3.89E+09 7.22E+09 3.47E+09 3.86E+09 5.62E+09 5.76E+09 4.33E+08 7.17E+08 1.81E+09 3.70E+09
3 1.52E+09 4.32E+09 3.03E+09 5.71E+09 3.10E+09 1.07E+10 8.93E+08 1.16E+09 1.32E+09 4.89E+09
4 2.72E+09 9.84E+09 1.86E+09 5.67E+09 7.83E+07 7.83E+07 5.46E+08 6.01E+08 6.07E+09 6.23E+09
5 5.11E+09 5.90E+09 2.61E+09 5.48E+09 3.61E+09 6.19E+09 5.00E+08 1.47E+09 1.16E+09 5.30E+09
6 7.64E+09 8.57E+09 1.80E+09 9.02E+09 4.61E+07 4.61E+07 4.02E+08 5.98E+08 7.59E+08 5.83E+09
7 1.32E+10 3.01E+10 3.45E+09 4.91E+09 1.26E+08 6.78E+09 6.00E+08 1.36E+09 2.47E+09 3.74E+09
8 1.11E+10 1.19E+10 3.90E+09 5.56E+09 4.77E+09 8.21E+09 3.07E+08 6.00E+08 1.82E+09 5.51E+09
9 2.69E+09 6.66E+09 1.25E+10 1.68E+10 2.97E+07 2.97E+07 3.94E+08 6.47E+08 3.66E+09 5.12E+09
A.2. FINAL EXECUTION TIMES
10 1.82E+09 6.80E+09 2.47E+09 5.73E+09 4.59E+09 8.75E+09 1.92E+08 5.89E+08 3.74E+09 5.33E+09
11 3.35E+09 6.59E+09 3.48E+09 5.72E+09 2.21E+08 2.21E+08 1.05E+09 7.55E+08 2.40E+09 1.57E+10
12 2.56E+09 3.30E+09 4.28E+09 6.20E+09 1.58E+09 8.51E+09 3.38E+08 1.15E+09 3.48E+09 3.77E+09
13 1.40E+09 7.23E+09 4.31E+09 5.82E+09 5.40E+09 7.37E+09 5.87E+08 4.93E+08 1.59E+10 1.74E+10
14 5.06E+09 5.68E+09 3.40E+09 3.75E+09 7.01E+07 7.01E+07 1.01E+09 5.87E+08 3.00E+09 5.25E+09
107
15 5.79E+09 8.12E+09 4.97E+09 9.22E+09 6.02E+09 6.87E+09 5.88E+08 5.61E+08 1.85E+09 5.23E+09
16 6.04E+08 7.44E+09 4.37E+09 5.82E+09 2.83E+09 6.62E+09 2.21E+08 7.17E+08 4.93E+09 5.35E+09
17 4.00E+09 5.46E+09 3.49E+09 5.46E+09 2.81E+07 8.51E+09 5.42E+07 1.16E+09 6.19E+08 7.24E+09
18 5.48E+09 5.88E+09 1.14E+10 1.29E+10 7.43E+07 7.43E+07 2.31E+08 6.01E+08 2.17E+09 5.38E+09
19 3.56E+09 9.98E+09 5.67E+08 5.49E+09 5.62E+09 5.76E+09 6.10E+08 1.47E+09 1.85E+09 5.50E+09
20 5.04E+09 7.40E+09 3.90E+09 5.58E+09 3.10E+09 1.07E+10 1.34E+09 1.67E+09 1.66E+09 6.36E+09
21 5.75E+09 6.67E+09 9.47E+09 1.57E+10 7.83E+07 7.83E+07 1.46E+09 1.68E+09 3.18E+09 5.80E+09
22 1.08E+09 5.31E+09 5.35E+09 6.14E+09 3.61E+09 6.19E+09 5.30E+08 1.88E+09 2.26E+09 5.38E+09
23 5.02E+09 5.45E+09 1.76E+09 6.34E+09 4.61E+07 4.61E+07 2.72E+08 5.63E+08 5.43E+08 5.46E+09
(Best sol.) and to finish the whole process (Total) solving the OFTC problem in the
Table A.13: Execution time in seconds for the algorithms to find the best solution
30 2.62E+09 7.83E+09 1.25E+09 5.84E+09 7.01E+07 7.01E+07 3.94E+08 5.98E+08 3.76E+09 4.69E+09
PSO DE ES ES GA
# Best sol. Total Best sol. Total Best sol. Total Best sol. Total Best sol. Total
1 1.86E+09 2.11E+09 3.11E+09 3.33E+09 2.27E+09 2.63E+09 5.72E+07 9.58E+07 6.95E+08 1.20E+09
2 8.94E+08 1.32E+09 9.23E+08 1.89E+09 6.58E+08 6.58E+08 9.41E+07 9.18E+07 9.47E+08 1.24E+09
3 5.73E+08 1.50E+09 2.94E+08 1.36E+09 1.77E+07 1.77E+07 9.34E+07 1.24E+08 8.37E+08 1.47E+09
4 1.50E+09 2.87E+09 1.94E+08 3.19E+09 1.35E+07 1.35E+07 2.52E+08 1.20E+08 1.33E+09 1.45E+09
5 1.16E+09 1.71E+09 4.69E+08 1.29E+09 4.02E+08 4.02E+08 9.77E+07 2.85E+08 2.78E+08 1.16E+09
6 8.68E+08 1.49E+09 1.15E+09 1.88E+09 1.91E+08 1.91E+08 1.35E+08 1.26E+08 1.55E+08 5.06E+08
7 1.28E+09 2.05E+09 7.13E+08 7.73E+08 8.91E+08 8.91E+08 1.61E+08 1.98E+08 2.51E+08 1.42E+09
8 2.93E+09 3.96E+09 2.55E+09 2.63E+09 7.32E+08 1.00E+09 7.00E+07 1.66E+08 7.24E+08 1.23E+09
9 2.72E+09 3.39E+09 1.07E+09 1.46E+09 1.12E+09 1.40E+09 1.20E+08 9.48E+07 2.44E+08 1.33E+09
10 1.57E+09 3.39E+09 1.14E+09 3.70E+09 7.32E+07 7.32E+07 6.93E+07 1.63E+08 1.67E+09 2.42E+09
11 1.64E+09 1.98E+09 8.34E+08 4.44E+09 4.60E+08 4.60E+08 1.88E+06 1.78E+08 1.01E+09 1.17E+09
12 3.90E+09 3.96E+09 3.95E+08 3.16E+09 7.68E+08 1.45E+09 1.45E+07 1.40E+08 1.06E+09 2.91E+09
13 6.70E+08 1.51E+09 2.84E+07 3.79E+08 4.71E+08 1.42E+09 7.01E+07 3.09E+07 1.06E+09 1.58E+09
14 1.19E+09 2.89E+09 8.51E+07 1.05E+09 4.47E+08 4.47E+08 6.66E+07 1.28E+08 9.66E+08 1.21E+09
108
15 9.31E+08 1.17E+09 3.13E+08 7.82E+08 1.18E+09 1.20E+09 9.30E+07 1.60E+08 1.18E+08 1.18E+09
16 2.32E+09 2.53E+09 1.10E+09 1.65E+09 1.29E+08 1.29E+08 1.29E+08 1.13E+08 2.61E+07 1.79E+09
17 1.97E+09 2.33E+09 2.69E+08 1.82E+09 6.20E+08 1.41E+09 6.17E+07 1.51E+08 1.15E+09 1.29E+09
18 1.81E+08 1.91E+09 6.57E+08 8.47E+08 2.18E+07 6.49E+08 7.11E+07 1.14E+08 5.51E+08 1.25E+09
19 1.43E+09 1.45E+09 1.98E+09 2.86E+09 2.85E+08 1.41E+09 1.63E+08 1.45E+08 9.21E+08 1.24E+09
20 4.97E+08 2.00E+09 1.25E+09 2.83E+09 1.24E+09 1.50E+09 1.52E+08 1.51E+08 1.17E+09 1.30E+09
21 3.31E+09 4.16E+09 1.32E+09 1.92E+09 1.14E+08 1.14E+08 7.81E+07 2.40E+08 3.44E+09 3.69E+09
22 5.15E+08 1.62E+09 3.20E+07 1.33E+09 6.34E+07 6.34E+07 8.08E+07 2.13E+08 3.59E+09 4.01E+09
23 9.69E+08 1.19E+09 1.12E+09 1.97E+09 1.16E+08 1.16E+08 1.04E+08 1.64E+08 8.13E+08 1.35E+09
(Best sol.) and to finish the whole process (Total) solving the OFTC problem in the
Table A.14: Execution time in seconds for the algorithms to find the best solution
30 3.85E+08 2.85E+09 4.81E+09 7.28E+09 4.60E+08 4.60E+08 3.61E+07 2.17E+08 6.21E+08 1.31E+09
Bibliography
[1] Comparing inertia weights and constriction factors in particle swarm opti-
mization, volume 1, 2000.
[3] Mobile Ad, Charles E. Perkins, and Elizabeth M. Royer. Multicast Ad hoc
On-Demand Distance Vector (MAODV) Routing, 2000.
[7] Enrique Alba and J. Francisco Chicano. Software project management with
gas. Information Services, 177:2380–2401, dec 2007.
[8] Enrique Alba, Sebastian Luna, and Jamal Toutouh. Accuracy and Efficiency
in Simulating VANETs . In Modelling, Computation and Optimization in
Information Systems and Management Sciences, pages 568–578, London, UK,
2008. Physica Verlag, Springer-Verlag.
109
BIBLIOGRAFY
[9] Hedi Ayed, Djamel Khadraoui, Zineb Habbas, Pascal Bouvry, and
Jean François Merche. Transfer graph approach for multimodal transport
problems. In MCO, pages 538–547, 2008.
[12] James E. Baker. Reducing bias and inefficiency in the selection algorithm.
In Proceedings of the Second International Conference on Genetic Algorithms
on Genetic algorithms and their application, pages 14–21, Hillsdale, NJ, USA,
1987. L. Erlbaum Associates Inc.
[13] Antonio Berlanga, Pedro Isasi, Araceli Sanchis, and José M. Molina. Neu-
ral networks robot controller trained with evolutionary strategies. In 1999
Congress on Evolutionary Computation, pages 413–419, Piscataway, NJ, 1999.
IEEE Service Center.
[14] Specification of the bluetooth system, volume 1: Core, v1.1. Bluetooth SIG,
February 2001.
[16] Allan Bricker, Michael Litzkow, and Miron Livny. Condor Technical Summary.
Technical report, Computer Sciences Department, University of Wisconsin -
Madison, May 1992.
[19] Tracy Camp and Yu Liu. An adaptive mesh-based protocol for geocast routing.
J. Parallel Distrib. Comput., 63(2):196–213, 2003.
110
BIBLIOGRAFY
[20] Erick Cantú-Paz, Martin Pelikan, Martin Pelikan, David E. Goldberg, and
David E. Goldberg. Boa: The bayesian optimization algorithm. In In, pages
525–532. Morgan Kaufmann, 1999.
111
BIBLIOGRAFY
[30] Han-Chieh Chao and Sherali Zeadally. Mobility protocols for its/vanet. Com-
puter Communications, 31(12):2765 – 2766, 2008. Mobility Protocols for IT-
S/VANET.
[31] Yawgeng A. Chau and Yao-Hua Chen. Speed-based adaptive medium access
control with csma/ca and reserved time slots. In SUTC ’06: Proceedings
of the IEEE International Conference on Sensor Networks, Ubiquitous, and
Trustworthy Computing - Vol 2 - Workshops, pages 208–213, Washington, DC,
USA, 2006. IEEE Computer Society.
[33] Frank Chiang, Zenon Chaczko, Johnson I. Agbinya, and Robin Braun. Ant-
based topology convergence algorithms for resource management in vanets. In
Roberto Moreno-Díaz, Franz Pichler, and Alexis Quesada-Arencibia, editors,
EUROCAST, volume 4739 of Lecture Notes in Computer Science, pages 992–
1000. Springer, 2007.
[34] Kwan-Wu Chin and Darryn Lowe. The IEEE 802.15.3 MAC: Enabling high-
rate multimedia applications in wireless personal area network, June 2006.
[36] David T. Connolly. An improved annealing scheme for the QAP. European
Journal of Operational Research, 46(1):93–100, May 1990.
[39] M. Dorigo. Optimization, Learning and Natural Algorithms. PhD thesis, DEI,
Politecnico di Milano, 1992.
112
BIBLIOGRAFY
[41] Jakob Eriksson, Hari Balakrishnan, and Samuel Madden. Cabernet: Vehicular
Content Delivery Using WiFi. In 14th ACM MOBICOM, San Francisco, CA,
September 2008.
[42] Xiao feng Xie, Wen-Jun Zhang, and Zhi-Lian Yang. Solving numerical opti-
mization problems by simulating particle-wave duality and social information
sharing. In Social Information Sharing – Intern. Conf. of Artificial Intelli-
gence, Las Vegas, pages 1163–1169, 2002.
[44] Foroohar Foroozan and Kemal Tepe. A high performance cluster-based broad-
casting algorithm for wireless ad hoc networks based on a novel gateway selec-
tion approach. In PE-WASUN ’05: Proceedings of the 2nd ACM international
workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous
networks, pages 65–70, New York, NY, USA, 2005. ACM.
[46] A. Ghosh, D.R. Wolter, J.G. Andrews, and R. Chen. Broadband wireless
access with wimax/802.16: current performance benchmarks and future po-
tential. Communications Magazine, IEEE, 43(2):129–136, Feb. 2005.
[48] Fred Glover. Heuristics for integer programming using surrogate constraints.
Decision Sciences, 8:156–166, 1977.
[49] Fred Glover. Future paths for integer programming and links to artificial
intelligence. Computers & Operation Research, 13(5):533–549, 1986.
113
BIBLIOGRAFY
[50] Fred Glover. Tabu Search - Part I. ORSA Journal on Computing, 1(3):190–
206, 1989.
[51] Fred Glover. Scatter search and path relinking, pages 297–316. McGraw-Hill,
Maidenhead, UK, England, 1999.
[53] Víctor González, Alberto Los Santos, Carolina Pinart, and Francisco Milagro.
Experimental demonstration of the viability of ieee 802.11b based inter-vehicle
communications. In TridentCom ’08: Proceedings of the 4th International
Conference on Testbeds and research infrastructures for the development of
networks & communities, pages 1–7, ICST, Brussels, Belgium, Belgium, 2008.
ICST (Institute for Computer Sciences, Social-Informatics and Telecommuni-
cations Engineering).
[54] Daniel Gorgen, Hannes Frey, and Christian Hiedels. JANE-The Java Ad Hoc
Network Development Environment. In ANSS ’07: Proceedings of the 40th
Annual Simulation Symposium, pages 163–176, Washington, DC, USA, 2007.
IEEE Computer Society.
[55] Zygmunt J. Haas, Marc R. Pearlman, and Prince Samar. The zone routing
protocol (ZRP) for ad hoc networks. Internet-draft, IETF MANET Working
Group, July 2002. Expiration: January, 2003.
[56] J. Harri and C. Bonnet. A lower bound for vehicles’ trajectory duration.
volume 4, pages 2273–2277, Sept., 2005.
114
BIBLIOGRAFY
[61] Chenn-Jung Huang, Yi-Ta Chuang, Dian-Xiu Yang, I-Fan Chen, You-Jia
Chen, and Kai-Wen Hu. A mobility-aware link enhancement mechanism for
vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw., 2008:1–10,
2008.
[62] Martin Hulin. Evolution strategies for circuit partitioning. In Branko Souček,
editor, Dynamic, Genetic, and Chaotic Programming, pages 413–436. John
Wiley, New York, 1992.
[64] A L. Ingber. Adaptive simulated annealing and lester ingber. Control and
Cybernetics, 25:33–54, 1996.
[65] Atsushi Iwata, Ching-Chuan Chiang, Guangyu Pei, Mario Gerla, and Tsu-Wei
Chen. Scalable routing strategies for ad hoc wireless networks. IEEE Journal
on Selected Areas in Communications, 17(8):1369–1379, August 1999.
[66] Philippe Jacquet, Paul Mühlethaler, Thomas Clausen, Anis Laouiti, Amir
Qayyum, and Laurent Viennot. Optimized link state routing protocol. In
IEEE INMIC’01, 28-30 December 2001, Lahore, Pakistan, pages 62–68. IEEE,
IEEE, December 2001.
[67] Jaroslaw Malek. Trace graph - Network simulator ns-2 trace files analyser.
http://www.tracegraph.com/.
[68] Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He, and David Du. TBD:
Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks. In
Proc. of the 29th International Conference on Distributed Computing Systems
(ICDCS’09), 2009.
[69] David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc
wireless networks. In Thomasz Imielinski and Hank Korth, editors, Mobile
Computing, volume 353, chapter 5, pages 153–181. Kluwer Academic Publish-
ers, 1996.
115
BIBLIOGRAFY
[71] James Kennedy. The particle swarm: Social adaptation of knowledge. IEEE
International Conference on Evolutionary Computation, pages 303–308, 1997.
[72] James Kennedy, Russell C. Eberhart, and Yuhui Shi. Swarm Intelligence. San
Francisco, EUA : Morgan Kaufmann, 2001.
[78] Houda Labiod, Afifi Hossam, and Costantino De Santis. Wi-Fi, Bluetooth,
Zigbee and WiMax. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007.
[79] Manuel Laguna and Rafael Martí. Scatter search : methodology and imple-
mentations in C. Kluwer Acad. Publ., 2003.
[80] Jason Lebrun, Chen nee Chuah, Dipak Ghosal, and Michael Zhang.
Knowledge-based opportunistic forwarding in vehicular wireless ad hoc net-
works. In In IEEE Vehicular Tech. Conf, pages 2289–2293, 2005.
[81] Jong Min Lee, Myoung Ju Yu, Young Hun Yoo, and Seong Gon Choi. A new
scheme of global mobility management for inter-vanets handover of vehicles in
v2v/v2i network environments. In NCM ’08: Proceedings of the 2008 Fourth
116
BIBLIOGRAFY
[83] Tao Lin, S. F. Midkiff, and J. S. Park. Minimal connected dominating set
algorithms and application for a manet routing protocol. In Performance,
Computing, and Communications Conference, 2003. Conference Proceedings
of the 2003 IEEE International, pages 157–164, 2003.
[84] Lianggui Liu and Guangzeng Feng. Simulated annealing based multi-
constrained qos routing in mobile ad hoc networks. Wirel. Pers. Commun.,
41(3):393–405, 2007.
[88] Kinji Matsumura, Kazuya Usui, Kenjiro Kai, and Koichi Ishikawa. Location-
aware data broadcasting: an application for digital mobile broadcasting in
japan. In MULTIMEDIA ’03: Proceedings of the eleventh ACM international
conference on Multimedia, pages 271–274, New York, NY, USA, 2003. ACM.
117
BIBLIOGRAFY
[90] Jack Meyer and Robert H. Rasche. Kolmogorov-smirnov tests for distribution
function similarity with applications to portfolios of common stock. NBER
Technical Working Papers 0076, National Bureau of Economic Research, Inc,
March 1989.
[91] Sudip Misra, Isaac Woungang, and Subhas Chandra Misra. Guide to Wireless
Ad Hoc Networks. Springer Publishing Company, Incorporated, 2009.
[93] Zhaomin Mo, Hao Zhu, Kia Makki, and N. Pissinou. MURU: A Multi-Hop
Routing Protocol for Urban Vehicular Ad Hoc Networks. pages 1–8, July 2006.
[94] Heinz Mühlenbein. The equation for response to selection and its use for
prediction. Evol. Comput., 5(3):303–346, 1997.
118
BIBLIOGRAFY
[104] Mahamed G. Omran, Andries Petrus Engelbrecht, and Ayed A. Salman. Par-
ticle swarm optimization for pattern recognition and image processing. In
Swarm Intelligence in Data Mining, pages 125–151. 2006.
[107] Vincent D. Park and M. Scott Corson. A highly adaptive distributed routing
algorithm for mobile wireless networks. In IEEE Conference on Computer
Communications, INFOCOM’97, April 7-11, 1997, Kobe, Japan, volume 3,
pages 1405–1413. IEEE, IEEE, April 1997.
[108] Raffaele Penazzi, Piergiorgio Capozio, Martin Duncan, Angelo Scuderi, Max
Siti, and Edoardo Merli. Cooperative safety: a combination of multiple tech-
nologies. In DATE ’08: Proceedings of the conference on Design, automation
and test in Europe, pages 959–961, New York, NY, USA, 2008. ACM.
[109] C. Perkins. IP Mobility Support for IPv4. RFC 3344 (Proposed Standard),
August 2002. Updated by RFC 4721.
119
BIBLIOGRAFY
[115] Vehicle Safety Communications Project. Final Project. Technical Report DOT
HS 810 591, Vehicle Safety Communications Project, April 2006.
[116] Jorge Puente, Helio R. Díez, Ramiro Varela, Camino R. Vela, and Luis P.
Hidalgo. Heuristic rules and genetic algorithms for open shop scheduling prob-
lem. In CAEPIA, pages 394–403, 2003.
[117] Matija Puzar, Jon Andersson, Thomas Plagemann, and Yves Roudier.
SKiMPy: a simple key management protocol for MANETs in emergency and
rescue operations. In ESAS’05, 2nd European Workshop on Security and Pri-
vacy in Ad Hoc and Sensor Networks, July 13-14, 2005, Visegrad, Hungary -
Also published in LNCS Volume 3813, Jul 2005.
[118] Amir Qayyum, Laurent Viennot, and Anis Laouiti. Multipoint Relaying: An
Efficient Technique for Flooding in Mobile Wireless Networks. Research Re-
port RR-3898, INRIA, 2000.
[119] Alain Ratle and Noureddine Atalla. Evolutionary optimization strategies for
the combinatorial design of heterogeneous materials. Evolutionary Optimiza-
tion, 1(1):77–88, 1999.
120
BIBLIOGRAFY
[127] Ivan Stojmenovic, Mahtab Seddigh, and Jovisa Zunic. Dominating sets
and neighbor elimination-based broadcasting algorithms in wireless networks.
IEEE Transactions on Parallel and Distributed Systems, 13:14–25, 2001.
[128] Rainer Storn and Kenneth Price. Differential Evolution - A simple and efficient
adaptive scheme for global optimization over continuous spaces. Technical
report, 1995.
[129] Rainer Storn and Kenneth Price. Differential Evolution – A Simple and Effi-
cient Heuristic for Global Optimization over Continuous Spaces. J. of Global
Optimization, 11(4):341–359, 1997.
[130] G. Stützle. Local search algorithms for combinatorial problems, analysis, im-
provements and new applications. Technica report, DISKI Dissertationen zur
Künstliken Intelligenz. Sankt Augustin. Germany, 1999.
[132] Douglas Thain, Todd Tannenbaum, and Miron Livny. Condor and the grid. In
Fran Berman, Geoffrey Fox, and Tony Hey, editors, Grid Computing: Making
the Global Infrastructure a Reality. John Wiley & Sons Inc., December 2002.
[134] Peter J. M. van Laarhoven, Emile H. L. Aarts, and Jan Karel Lenstra. Job
shop scheduling by simulated annealing. Oper. Res., 40(1):113–125, 1992.
121
BIBLIOGRAFY
[138] Zhiwei Wang, Gregory L. Durst, Russell C. Eberhart, Donald B. Boyd, and
Zina Ben Miled. Particle swarm optimization and neural network applica-
tion for qsar. Parallel and Distributed Processing Symposium, International,
10:194, 2004.
[141] Qing Xu, Tony Mak, Jeff Ko, and Raja Sengupta. Vehicle-to-vehicle safety
messaging in dsrc. In VANET ’04: Proceedings of the 1st ACM international
workshop on Vehicular ad hoc networks, pages 19–28, New York, NY, USA,
2004. ACM.
[142] Yun-Sheng Yen, Yi-Kung Chan, Han-Chieh Chao, and Jong Hyuk Park. A
genetic algorithm for energy-efficient based multicast routing on MANETs.
Comput. Commun., 31(4):858–869, 2008.
[143] Jianjun Zhang, Gong Zhang, and Ling Liu. GeoGrid: A Scalable Location
Service Network. In ICDCS, page 60, 2007.
122