Ramon S. Schwartz, R. Barbosa, N. Meratnia, G. Heijenk, H. Scholten
Several promising applications for Vehicular Ad-hoc Networks (VANETs) exist. For most of these applications, the communication among vehicles is envisioned to be based on the broadcasting of messages. This is due to the inherent highly mobile environment and importance of these messages to vehicles nearby. To deal with broadcast communication, dissemination protocols must be defined in such a way as to (i) prevent the so-called broadcast storm problem in dense networks and (ii) deal with disconnected networks in sparse topologies. In this paper, we present a Simple and Robust Dissemination (SRD) protocol that deals with these requirements in both sparse and dense networks. Its novelty lies in its simplicity and robustness. Simplicity is achieved by considering only two states (cluster tail and non-tail) for a vehicle. Robustness is achieved by assigning message delivery responsibility to multiple vehicles in sparse networks. Our simulation results show that SRD achieves high delivery ratio and low end-to-end delay under diverse traffic conditions.
{"title":"A Simple and Robust Dissemination protocol for VANETs","authors":"Ramon S. Schwartz, R. Barbosa, N. Meratnia, G. Heijenk, H. Scholten","doi":"10.1109/EW.2010.5483419","DOIUrl":"https://doi.org/10.1109/EW.2010.5483419","url":null,"abstract":"Several promising applications for Vehicular Ad-hoc Networks (VANETs) exist. For most of these applications, the communication among vehicles is envisioned to be based on the broadcasting of messages. This is due to the inherent highly mobile environment and importance of these messages to vehicles nearby. To deal with broadcast communication, dissemination protocols must be defined in such a way as to (i) prevent the so-called broadcast storm problem in dense networks and (ii) deal with disconnected networks in sparse topologies. In this paper, we present a Simple and Robust Dissemination (SRD) protocol that deals with these requirements in both sparse and dense networks. Its novelty lies in its simplicity and robustness. Simplicity is achieved by considering only two states (cluster tail and non-tail) for a vehicle. Robustness is achieved by assigning message delivery responsibility to multiple vehicles in sparse networks. Our simulation results show that SRD achieves high delivery ratio and low end-to-end delay under diverse traffic conditions.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114524830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, we have studied the statistical properties of the capacity of Nakagami-m channels when spatial diversity combining, such as maximal ratio combining (MRC) and equal gain combining (EGC), is employed at the receiver. The presented results provide insight into the statistical properties of the channel capacity under a wide range of fading conditions in wireless links using L-branch diversity combining techniques. We have derived closed-form analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the channel capacity. The statistical properties of the capacity are studied for different values of the number of diversity branches and for different severity levels of fading. The analytical results are verified with the help of simulations. It is observed that increasing the number of diversity branches increases the mean channel capacity, while the variance and ADF of the channel capacity decreases. Moreover, systems in which the fading in diversity branches is less severe (as compared to Rayleigh fading) have a higher mean channel capacity. The presented results are very helpful to optimize the design of the receiver of wireless communication systems that employ spatial diversity combining.
{"title":"The influence of severity of fading on the statistical properties of the capacity of Nakagami-m channels with MRC and EGC","authors":"G. Rafiq, V. Kontorovich, M. Patzold","doi":"10.1109/EW.2010.5483507","DOIUrl":"https://doi.org/10.1109/EW.2010.5483507","url":null,"abstract":"In this article, we have studied the statistical properties of the capacity of Nakagami-m channels when spatial diversity combining, such as maximal ratio combining (MRC) and equal gain combining (EGC), is employed at the receiver. The presented results provide insight into the statistical properties of the channel capacity under a wide range of fading conditions in wireless links using L-branch diversity combining techniques. We have derived closed-form analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the channel capacity. The statistical properties of the capacity are studied for different values of the number of diversity branches and for different severity levels of fading. The analytical results are verified with the help of simulations. It is observed that increasing the number of diversity branches increases the mean channel capacity, while the variance and ADF of the channel capacity decreases. Moreover, systems in which the fading in diversity branches is less severe (as compared to Rayleigh fading) have a higher mean channel capacity. The presented results are very helpful to optimize the design of the receiver of wireless communication systems that employ spatial diversity combining.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides a performance comparison of two macrocellular topologies from the point of view of RF-repeater deployment. The numerical, system level, performance estimation was done in the downlink direction using high speed downlink packet access technology. In addition to a detailed repeater model, a distance dependent orthogonality model for wideband CDMA codes was included in the performance analysis and was compared to the traditional model of constant orthogonality. The traditional European topology, based on hexagonal cells (a.k.a. Clover-leaf topology), was set against a novel, Triangular, topology. Based on the results, the novel Triangular topology (when equipped with repeater) can provide comparable downlink HSDPA performance to the traditional Clover-leaf topology. Repeater worked significantly better in the Triangular topology than in the Clover-leaf topology, when comparing the improvement of maximum throughput due to repeater in both topologies.
{"title":"Comparison of RF-repeater efficiency in macrocellular network topologies","authors":"P. Lähdekorpi, J. Itkonen, J. Lempiäinen","doi":"10.1109/EW.2010.5483387","DOIUrl":"https://doi.org/10.1109/EW.2010.5483387","url":null,"abstract":"This paper provides a performance comparison of two macrocellular topologies from the point of view of RF-repeater deployment. The numerical, system level, performance estimation was done in the downlink direction using high speed downlink packet access technology. In addition to a detailed repeater model, a distance dependent orthogonality model for wideband CDMA codes was included in the performance analysis and was compared to the traditional model of constant orthogonality. The traditional European topology, based on hexagonal cells (a.k.a. Clover-leaf topology), was set against a novel, Triangular, topology. Based on the results, the novel Triangular topology (when equipped with repeater) can provide comparable downlink HSDPA performance to the traditional Clover-leaf topology. Repeater worked significantly better in the Triangular topology than in the Clover-leaf topology, when comparing the improvement of maximum throughput due to repeater in both topologies.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapidly increasing use of smart phones with Internet access or data connectivity solutions for laptops is putting the infrastructure of cellular operators under stress. Both the number of devices and the bandwidth requirement are increasing. Indoor usage is also becoming prominent. One envisioned solution is the use of so-called femtocells. Femtocells are portable and low-cost base-stations for in-home usage. They are deployed by endusers and are connected to the operator network by a digital subscriber line (DSL), cable modem or optical fiber connection. The femtocells are operated along with the macrocell in a typical two-tier network structure. The regular base stations operate in one tier and the femtocells operate in the other tier. In a shared spectrum configuration, the uncontrolled deployment and loose control of the femtocells generate challenging interference management scenarios. With extensive simulations, we perform an evaluation of several femtocell to femtocell interference scenarios and one macrocell to femtocell scenario. We focus on typical 4G cases, with an orthogonal frequency-division multiple access (OFDMA) physical layer and full frequency reuse. Our results show that without any interference management, system performance is significantly degraded and that complete outages occur in specific cases.
{"title":"Performance evaluation of OFDMA femtocells link-layers in uncontrolled deployments","authors":"Tania Villa, R. Merz, Pablo Vidales","doi":"10.1109/EW.2010.5483451","DOIUrl":"https://doi.org/10.1109/EW.2010.5483451","url":null,"abstract":"The rapidly increasing use of smart phones with Internet access or data connectivity solutions for laptops is putting the infrastructure of cellular operators under stress. Both the number of devices and the bandwidth requirement are increasing. Indoor usage is also becoming prominent. One envisioned solution is the use of so-called femtocells. Femtocells are portable and low-cost base-stations for in-home usage. They are deployed by endusers and are connected to the operator network by a digital subscriber line (DSL), cable modem or optical fiber connection. The femtocells are operated along with the macrocell in a typical two-tier network structure. The regular base stations operate in one tier and the femtocells operate in the other tier. In a shared spectrum configuration, the uncontrolled deployment and loose control of the femtocells generate challenging interference management scenarios. With extensive simulations, we perform an evaluation of several femtocell to femtocell interference scenarios and one macrocell to femtocell scenario. We focus on typical 4G cases, with an orthogonal frequency-division multiple access (OFDMA) physical layer and full frequency reuse. Our results show that without any interference management, system performance is significantly degraded and that complete outages occur in specific cases.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130846837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Filter bank based multicarrier (FBMC) is an interesting alternative to OFDM especially for spectrally agile communication waveform generation and for cognitive radio scenarios. For enhanced link performance and robustness, most of the common multi-antenna schemes can be combined with FBMC equally well as with OFDM. However, one significant shortcoming of FBMC is the difficulty of combining it with the famous transmit diversity scheme of Alamouti coding. In this paper, we present a block-wise Alamouti scheme for FBMC and test its performance.
{"title":"A block-Alamouti scheme for filter bank based multicarrier transmission","authors":"M. Renfors, T. Ihalainen, T. H. Stitz","doi":"10.1109/EW.2010.5483517","DOIUrl":"https://doi.org/10.1109/EW.2010.5483517","url":null,"abstract":"Filter bank based multicarrier (FBMC) is an interesting alternative to OFDM especially for spectrally agile communication waveform generation and for cognitive radio scenarios. For enhanced link performance and robustness, most of the common multi-antenna schemes can be combined with FBMC equally well as with OFDM. However, one significant shortcoming of FBMC is the difficulty of combining it with the famous transmit diversity scheme of Alamouti coding. In this paper, we present a block-wise Alamouti scheme for FBMC and test its performance.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130937254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Researchers need to choose an appropriate scenario to study the performance of a Mobile Ad hoc NETwork (MANET) via simulation. For example, routing is not properly evaluated when the shortest path between each pair of nodes in the simulation scenario is two or less. Various standards may be required to construct a credible MANET simulation scenario. In this work, we concentrate upon three standards for evaluating MANET routing protocols. Metrics involved in these standards are: average shortest-path hop count, average network partitioning, and average neighbor count. The main contribution of this work is to provide researchers with models that allow them to easily construct rigorous MANET simulation scenarios. The input to our models is the desired values for the three metrics mentioned; our models then output parameters for a simulation scenario that approximately meet the researcher's target values for the metrics. Our models were designed using a recently published mobility model that was constructed by extracting the statistical features of real human movement. Our models enable researchers to test MANET routing protocols in a more realistic manner, thereby improving the credibility of their MANET simulation studies.
{"title":"Constructing rigorous MANET simulation scenarios with realistic mobility","authors":"Aarti Munjal, T. Camp, W. Navidi","doi":"10.1109/EW.2010.5483539","DOIUrl":"https://doi.org/10.1109/EW.2010.5483539","url":null,"abstract":"Researchers need to choose an appropriate scenario to study the performance of a Mobile Ad hoc NETwork (MANET) via simulation. For example, routing is not properly evaluated when the shortest path between each pair of nodes in the simulation scenario is two or less. Various standards may be required to construct a credible MANET simulation scenario. In this work, we concentrate upon three standards for evaluating MANET routing protocols. Metrics involved in these standards are: average shortest-path hop count, average network partitioning, and average neighbor count. The main contribution of this work is to provide researchers with models that allow them to easily construct rigorous MANET simulation scenarios. The input to our models is the desired values for the three metrics mentioned; our models then output parameters for a simulation scenario that approximately meet the researcher's target values for the metrics. Our models were designed using a recently published mobility model that was constructed by extracting the statistical features of real human movement. Our models enable researchers to test MANET routing protocols in a more realistic manner, thereby improving the credibility of their MANET simulation studies.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127306720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we explore the possibility of exploiting underutilized channels in the GSM bands. The secondary (unlicensed) users of the spectrum are the nodes of an overlay cognitive ad-hoc network, which opportunistically transmits in data channels left unused by the primary (licensed) system. The fundamental constraints for the secondary system are: 1) it uses the time slots/frequency channels (i.e. data channels) unused by the primary GSM system, 2) its operation does not degrade the performances of the primary system, 3) there is no exchange of signalling information between the primary and the secondary system to facilitate the secondary usage of spectrum, that is, the primary users are not cognitive aware. The focus is on the feasibility of the proposed approach, so that we consider a system level simulator based on a realistic GSM network deployed in the city of Bologna. In this context we evaluate the impact that the operation of the secondary users has on the performances of the primary system. In addition, we study the performances that can be obtained by the secondary system under the condition of marginal interference to the primary system. We will show that an appropriate choice of the frequency channel, makes the secondary usage of spectrum a valid approach to increase the operator's spectrum efficiency.
{"title":"Evaluation of spectrum opportunities in the GSM band","authors":"Andrea Carniani, L. Giupponi, R. Verdone","doi":"10.1109/EW.2010.5483438","DOIUrl":"https://doi.org/10.1109/EW.2010.5483438","url":null,"abstract":"In this paper we explore the possibility of exploiting underutilized channels in the GSM bands. The secondary (unlicensed) users of the spectrum are the nodes of an overlay cognitive ad-hoc network, which opportunistically transmits in data channels left unused by the primary (licensed) system. The fundamental constraints for the secondary system are: 1) it uses the time slots/frequency channels (i.e. data channels) unused by the primary GSM system, 2) its operation does not degrade the performances of the primary system, 3) there is no exchange of signalling information between the primary and the secondary system to facilitate the secondary usage of spectrum, that is, the primary users are not cognitive aware. The focus is on the feasibility of the proposed approach, so that we consider a system level simulator based on a realistic GSM network deployed in the city of Bologna. In this context we evaluate the impact that the operation of the secondary users has on the performances of the primary system. In addition, we study the performances that can be obtained by the secondary system under the condition of marginal interference to the primary system. We will show that an appropriate choice of the frequency channel, makes the secondary usage of spectrum a valid approach to increase the operator's spectrum efficiency.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work investigates the problem of resource allocation (in terms of transmit powers and subchannel assignment) in the uplink channel of an orthogonal frequency division multiple access (OFDMA) network, populated by mobile users with constraints in terms of target transmit data rates. The optimization problem is tackled with the analytical tools of coalitional game theory, and a simple and practical algorithm based on Markov modeling is introduced. The proposed algorithm allows the mobile devices to fulfill their data rate demands with minimum utilization of the network resources. Simulation results are provided to validate the theoretical analysis for practical OFDMA network parameters.
{"title":"A coalitional game-inspired algorithm for resource allocation in orthogonal frequency division multiple access","authors":"F. Shams, G. Bacci, M. Luise","doi":"10.1109/EW.2010.5483424","DOIUrl":"https://doi.org/10.1109/EW.2010.5483424","url":null,"abstract":"This work investigates the problem of resource allocation (in terms of transmit powers and subchannel assignment) in the uplink channel of an orthogonal frequency division multiple access (OFDMA) network, populated by mobile users with constraints in terms of target transmit data rates. The optimization problem is tackled with the analytical tools of coalitional game theory, and a simple and practical algorithm based on Markov modeling is introduced. The proposed algorithm allows the mobile devices to fulfill their data rate demands with minimum utilization of the network resources. Simulation results are provided to validate the theoretical analysis for practical OFDMA network parameters.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Windows were traditionally used as a means of building access and egress for RF signals. However, the drive towards building energy efficiency now means that windows are frequently coated with thin layers of Transparent Conductors (TCs). TCs can let visible light energy pass virtually un-attenuated, but reflect longer wavelengths (typically from the infrared region), to keep buildings warmer in colder climates and cooler in warmer climates. However, the use of TCs has a negative impact on wireless propagation, which this paper reports on. Three commercially available windows are examined, with results showing that less than 1% of the signal passes in either direction. This result is taken from a series of measurement over a range of frequencies from 800 MHz to 6 GHz, both in a large hall and in the WIT anechoic chamber.
{"title":"Rf propagation through Transparent Conductors in energy efficient windows","authors":"D. Stolhofer, H. Doelecke, Yaqiang Liu, P. O'eary","doi":"10.1109/EW.2010.5483412","DOIUrl":"https://doi.org/10.1109/EW.2010.5483412","url":null,"abstract":"Windows were traditionally used as a means of building access and egress for RF signals. However, the drive towards building energy efficiency now means that windows are frequently coated with thin layers of Transparent Conductors (TCs). TCs can let visible light energy pass virtually un-attenuated, but reflect longer wavelengths (typically from the infrared region), to keep buildings warmer in colder climates and cooler in warmer climates. However, the use of TCs has a negative impact on wireless propagation, which this paper reports on. Three commercially available windows are examined, with results showing that less than 1% of the signal passes in either direction. This result is taken from a series of measurement over a range of frequencies from 800 MHz to 6 GHz, both in a large hall and in the WIT anechoic chamber.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). Rather, an intermediate node en route acts in an impromptu fashion and takes a decision that is based solely on current circumstances. A popular example of opportunistic routing is the “delay tolerant” forwarding to “data mules” when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information: it seeks the neighbor best qualified to “carry” the packet to destination. If none is available, it will await the right opportunity. This procedure is also known as “data muling” or Delay Tolerant Network (DTN) routing. The Vehicular Ad Hoc Networks (VANET), because of its intrinsic intermittent connectivity (during off peak hours and at night) is an ideal “playground” for opportunistic routing/multicast. In this paper we will examine two examples of VANET opportunistic routing: Delay Tolerant geo-inspired routing and real time video stream multicast of emergency/accident multimedia reports to vehicles in disconnected platoons using network coding.
{"title":"Opportunistic vehicular routing","authors":"Kevin C. Lee, M. Gerla","doi":"10.1109/EW.2010.5483530","DOIUrl":"https://doi.org/10.1109/EW.2010.5483530","url":null,"abstract":"In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). Rather, an intermediate node en route acts in an impromptu fashion and takes a decision that is based solely on current circumstances. A popular example of opportunistic routing is the “delay tolerant” forwarding to “data mules” when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information: it seeks the neighbor best qualified to “carry” the packet to destination. If none is available, it will await the right opportunity. This procedure is also known as “data muling” or Delay Tolerant Network (DTN) routing. The Vehicular Ad Hoc Networks (VANET), because of its intrinsic intermittent connectivity (during off peak hours and at night) is an ideal “playground” for opportunistic routing/multicast. In this paper we will examine two examples of VANET opportunistic routing: Delay Tolerant geo-inspired routing and real time video stream multicast of emergency/accident multimedia reports to vehicles in disconnected platoons using network coding.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}