# Performance analysis and enhancement of IEEE 802.11p beaconing

- 60 Downloads

## Abstract

Previous work on the performance analysis of IEEE 802.11p beaconing protocol has paid little attention to the varying number of contending nodes and the restricted channel access: Since each node is allowed to broadcast only one beacon frame per control channel (CCH), the number of contending nodes decreases as the CCH elapses. Thus, the performance of 802.11p MAC protocol varies with the number of contending nodes, and the expiration of CCH may cause the beacon messages to drop. In this paper, we propose a new mathematical model to analyze the performance of 802.11p MAC, which considers both the effects of changing number of contending nodes and the restricted channel access. Based on the analytic results, a *random contention window* scheme is proposed. Through conducting extensive simulations, we verify that the proposed scheme considerably outperforms the legacy 802.11p protocol.

## Keywords

IEEE 802.11p Beaconing Control channel Performance analysis Random contention window## Abbreviations

- AIFS
Arbitration interframe space

- AIFSN
AIFS number

- BC
Backoff counter

- CCH
Control channel

- CCHI
CCH interval

- CW
Contention window

*C**W*_{min}Minimum CW

*C**W*_{max}Maximum CW

- DCF
Distribution coordination function

- DSRC
Dedicated short-range communication

- EDCA
Enhanced distributed channel access

- EIFS
Extended interframe space

- ITS
Intelligent transportation systems

- MAC
Media access control

- OCB
Outside the context of basic service set

- PHY
Physical

- SI
Synchronization interval

- RSU
Road site units

- SCH
Service channel

- SCHI
SCH interval

- SIFS
Short interframe space

- VANET
Vehicular ad hoc network

- V2V
Vehicle to vehicle

- WAVE
Wireless access in vehicular environment

## 1 Introduction

Dedicated short-range communication (DSRC) is considered as one of the most crucial technologies for intelligent transportation systems (ITS). Operating at 5.9-GHz frequency band, DSRC can provide wireless communication capabilities for transportation applications within a 1000-m range typically at highway speeds [1]. Wireless access in vehicular environment (WAVE) is a key protocol for DSRC, which consists of the IEEE 1609 family and IEEE 802.11p. The IEEE 1609 family includes resource manager (1609.1), security services (1609.2), network layer services (1609.3), multi-channel operation (1609.4), and electronic payment (1609.11)[2]. And IEEE 802.11p, which is a modified version of the IEEE 802.11 standard, is adopted for standardization of the physical (PHY) and media access control (MAC) layers.

IEEE 1609.4 standard splits the allocated spectrum into seven channels, including one control channel (CCH) and six service channels (SCHs). And the channel access time is divided into consecutive synchronization intervals (SIs)[3], where each SI has a fixed length of 100 ms and consists of two alternating 50-ms intervals—CCH interval (CCHI) and SCH interval (SCHI). During CCH, nodes can broadcast status messages (beacons), like car position, speed, and heading, as well as safety messages, including any accident ahead, sudden brake, and poor road condition detected.

IEEE 802.11p MAC applies enhanced distributed channel access (EDCA) scheme for channel access control, where nodes access channel basically according to the distribution coordination function (DCF), while priorities are considered [4]. Accordingly, nodes sense the channel before starting a transmission: If the channel is idle for a period of arbitration inter-frame space (AIFS, the duration varies according to nodes’ priorities), the node can access channel immediately. Else if the channel is busy, after waiting for a period of AIFS, the node enters into the backoff process by randomly selecting a backoff counter (*BC*) from the range of (0,*w*), where *w* is the node’s current contention window (CW) size. Initially, *w* is set to its minimum value, *C**W*_{min}, and it doubles each time a collision occurs till it reaches to the maximum value, *C**W*_{max}. However, because feedback is not allowed in broadcast communications, 802.11p beaconing adopts a constant CW size, i.e. *C**W*_{min}.

In 802.11p vehicular ad hoc network (VANET), since the nodes broadcast only one beacon frame per CCHI, the number of contending nodes decreases as CCHI elapses. Thus, the nodes suffer from the highest collision probability at the beginning of CCHI. Also, as CCHI switches to SCHI every 50 ms, in a dense network, the expiration of CCH may cause heavy dropping of beacon messages. So far, previous work pays little attention to these factors, or investigates them separately, which is unable to disclose how these factors jointly affect the performance of 802.11p beaconing. In light of the above inadequacies, we develop a new mathematical model in this paper and then propose a random contention window scheme to enhance the performance of 802.11p MAC. Our contributions are as follows: (1) A mathematical model considering the effects caused both by channel expiration and varying numbers of contending nodes is built. Based on this new model, the time slots where CCH expiration occurs are counted. And the successful transmission probability of beacon messages upon different network size and *C**W*_{min} is calculated. (2) A random contention window mechanism is presented to improve the reliability of beacon message broadcasting: Instead of utilizing a constant *CW*, arrays of minimum and maximum CWs (*C**W*_{min} and *C**W*_{max}) are provided. Nodes can randomly select a pair of *C**W*_{min} and *C**W*_{max}, based on which they can form groups. (3) Proposed scheme is implemented on the ns-3 simulator. By performing extensive simulations, the performance gain of our proposal comparing with the legacy protocol can be verified.

The remainder of this paper is organized as follows. Section 2 reviews the related works. Section 3 presents our new analytical model, which counts the *BC* time slots where CCH expiration occurs and evaluates successful transmission probabilities. Section 4 describes the details of our proposed *random contention window* scheme, while Section 5 shows and discusses the simulation results. Finally, Section 6 gives some concluding remarks.

## 2 Related works

IEEE 802.11 VANET adopts the EDCA scheme for channel access control, which can provide prioritized services by enhancing the legacy DCF. Many researchers have investigated the performance of the 802.11p EDCA protocol through simulations or mathematical modeling. Eichler [5] and Martelli et al. [6] conducted extensive simulations: [5] proved that, while EDCA can prioritize messages, it can significantly degrade network performance in a dense environment. Martelli et al. [6] studied two important performance parameters of beaconing—beacon delivery rate (PDR) and beacon inter-reception time (PIR). Their results showed that PIR time distribution is heavy-tailed, while PIR and PDR are loosely correlated metrics. Qiu et al. [7] adopted verified stochastic traffic models, which incorporate the effect of urban settings (such as traffic lights and vehicle interactions) in order to study the broadcasting performance of 802.11p VANET. Utilizing stochastic geometry and queuing theory, [8] studied the transmission behavior of vehicle-to-vehicle (V2V) safety communications with non-saturated data traffic. Also, [9] investigated the connectivity properties of VANET under the impact of fading and path losses, by modeling the road systems as random line process and vehicle locations as Poisson point process.

Bianchi [10] pioneered to build a 2-D Markov chain model for the performance analysis of the 802.11 DCF protocol, focusing on a saturated network deployed under an ideal wireless channel. Zheng and Wu, Han et al., Ma et al., Li et al., Gallardo et al., Khabazian et al., Campolo et al., Stanica et al., Yang et al., Fallah et al., Yao et al., and Wang et al. [11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22] extended the Markov chain model in [10] and evaluated the performance of the 802.11p MAC protocol. In [11], 2-D and 1-D Markov chains are built in order to study the channel access performance under the factors such as saturation condition and standard parameters. Similarly, [12] studied the impact of standard parameters like CW size and AIFS duration.

Ma et al., Li et al., Gallardo et al., Khabazian et al., Campolo et al., Stanica et al., Yang et al., Fallah et al., Yao et al., and Wang et al. [13, 14, 15, 16, 17, 18, 19, 20, 21, 22] devoted to investigate the performance of 802.11p MAC in the control channel (CCH), i.e., performance of broadcasting safety messages and beacons. Ma et al. [13] combined Markov chain-based models with simulations, taking hidden terminal, non-saturation traffic, and mobility into account. Li et al. [14] built a 2-D Markov chain model with finite buffers and finite loads, which includes modeling the backoff process and queueing process. Assuming CCH is continually available, both [15] and [16] evaluated the performance of broadcasting safety messages with different priorities. In contrast, [17] analyzed the effects caused by restricted channel access of CCH, i.e., switching CCHI and SCHI periodically. Stanica et al. [18] suggested a non-ergodic Markov chain for periodic beaconing, while [19] utilized a discrete time D/M/1 queue. Since transmission reliability is very important for broadcasting of message, [20] suggested a model for the broadcast-based VANET network on a highway topology and studied the effect of transmission rate and transmission range. Also, [21] analyzed the reliability of safety-critical data under both non-saturated and saturated conditions. Wang et al. [22] provided a more comprehensive model, which includes MAC protocol operations, PHY layer wireless channel conditions, and mobility of vehicles.

However, the previous models suggested for analyzing the 802.11p beaconing have paid little attention to the varying number of contending nodes [13, 14, 21], and the restricted channel access of CCH [15, 16], or investigated them separately [17]. Since the 802.11p MAC protocol is a contention-based scheme, the joint effect of the varying number of contending nodes and the restricted channel access may lead the network to perform quite differently. In this work, we develop a new mathematic model that integrates those two factors. And based on the analysis results, we propose a random contention window scheme to improve the performance of 802.11p beaconing.

## 3 Analysis model

*N*nodes and the one-hop neighbors of each node are not changed due to node mobility. CCH channel is slotted into

*S*

_{M}slots, and the duration of each slot varies according to the events that occur in the slot. At the

*i*th time slot, the busy probability of the medium is denoted by

*p*

^{i}. Also, the nodes use a constant contention window,

*C*

*W*

_{min}, which is denoted by

*W*. Then, based on [10], the probability

*τ*that a tagged node transmits in a randomly chosen time slot is given by

*N*

_{i}be the number of nodes which have beacons buffered at

*i*th time slot. Based on the 802.11p standard, each node can broadcast only one beacon frame per CCH, and retransmission is not allowed in case of collisions. Therefore, the number of contending nodes is a non-increasing function of the

*i*th slot:

*N*

_{i}nodes have beacon frames to send at the

*i*th time slot, the busy probability

*p*

^{i}of

*i*th slot is

*i*th time slot, if the channel is busy and

*N*

_{i}nodes are contending, then the probability of a successful transmission \(p^{i}_{s}\) is given by

*i*th time slot, the idle probability is 1−

*p*

^{i}and the collision probability \(1 - p^{i}_{s}\). Note that

*N*

_{1}, the number of contending nodes at the first time slot, equals to

*N*. Since

*j*is the number of nodes which experience collisions, combining (2) ∼ (4) gives the value of

*N*

_{i}as follows: ∀

*i*, 2≤

*i*≤

*N*,

*i*, 2≤

*i*≤

*N*,

*i*th time slot

*T*

_{i}. First, let us define

*T*

_{s}and

*T*

_{c}as the time durations for a successful transmission of one beacon frame and a failed transmission due to a collision, respectively:

*L*is the packet length,

*R*the data rate, and

*T*

_{h}the duration of the physical layer convergence protocol (PLCP) preamble and header. Using the idle probability and collision probability of the

*i*th slot, we have

*δ*is the duration of one idle time slot which is defined in the 802.11p standard. Using (8), we can compute the duration of totally exhausted channel,

*T*

_{e}, which is the summation of all time slots before the CCH expires. If we assume the expiration occurs at the

*m*th time slot, then

where *T*_{g} is the guard interval. The second equality of (9) is derived by denoting *T*_{c}=*T*_{s}+*α*, where *α*=*E**I**F**S*−*A**I**F**S*, and also from (3) and (4).

*R*as follows:

where the numerator counts how many time slots have been generated before CCH expiration occurs. Since it equals to *m*, we can obtain its value by solving (9) under the condition that *T*_{e}≤*T*_{CCH}, i.e., the broadcasting of beacons cannot exceed *T*_{CCH}. Similarly, the number of expected time slots indicates the time slots required for all the nodes to transmit one beacon on a continually available channel: Its value can be obtained through (9) by replacing the parameter *m* with *N*, which is the number of nodes in the current network.

*m*, the time slot where a CCH timeout occurs, and

*R*, the satisfactory ratio, as in Table 2. In the network of 20 nodes and

*C*

*W*

_{min}=32, one can see that the maximum number of time slots provided by the CCH channel is 36.9. Also, the satisfactory ratio reaches 100% in small size networks, such as networks with less than 60 nodes. However, as the number of nodes or the contention window size increases, the number of available time slots is reduced, e.g., in the 100-node network with

*C*

*W*

_{min}=128, the number of provided

*BC*time slots is only 31.9. Moreover, the satisfactory ratio

*R*in dense networks degrades more severely, e.g., in the network with 80 nodes, only 80% nodes can obtain slots for broadcasting beacon messages, and in the network with 100 nodes, the ratio is reduced to 64%.

Parameters in analysis

Parameters | Value |
---|---|

Packet size | 500 bytes |

Channel period (CCH+SCH) | 100 ms |

Beacon generation rate | 10 Hz |

Data rate | 3 Mbps |

Slot time | 16 |

SIFS time | 32 |

AIFSN | 2 |

EIFS | 188 |

Header duration ( | 40 |

Packet generation rate | 10 Hz |

Provided time slots and satisfactory ratio

| No. of nodes | |||||||
---|---|---|---|---|---|---|---|---|

20 | 60 | 80 | 100 | |||||

| | | | | | | | |

32 | 36.9 | 1.0 | 32.8 | 1.0 | 32.6 | 0.8 | 32.6 | 0.64 |

64 | 33.1 | 1.0 | 32.1 | 1.0 | 32.1 | 0.8 | 32.1 | 0.64 |

128 | 33.8 | 1.0 | 31.9 | 1.0 | 31.9 | 0.79 | 31.9 | 0.63 |

In summary, although increasing the contention window size can reduce the collision probability, a large *CW* size may increase the channel access delay and cause dropping of beacons due to the channel expiration. Therefore, it is important to adopt a proper size of contention window in order to enhance the reliability of the 802.11p beaconing.

## 4 Random contention window selection

### 4.1 Overview

Based on the previously analyzed results, in this section, we propose a *random contention window scheme* to improve the performance of 802.11p MAC on broadcasting. Since the reliability of broadcasting message is a main concern of our work, we assume nodes compete channel under the same priority. The key idea of our proposal is as follows. Instead of applying a constant contention window, *CW*, where nodes randomly select a *BC* from range (0,*w*), here *w* is the value of *CW*, they are supplied with minimum and maximum contention window (*C**W*_{min} and *C**W*_{max}) arrays. During backoff process, nodes can select a pair of numbers, *C**W*_{min} and *C**W*_{max}, from provided arrays, and the *BC* is determined by randomly choosing a number from range (*C**W*_{min},*C**W*_{max}). The contention window array sizes can be tuned according to the network scale, i.e., with large-scale networks, arrays with more available numbers are provided, and with small-scale networks, arrays with fewer available numbers are supplied. Since the nodes adopting the same *C**W*_{min} and *C**W*_{max} form a group and channel access contentions only occur among nodes belonging to the same group, our scheme is expected to efficiently reduce the collisions occurred in CCH.

### 4.2 Determination of contention window

*N*denote the number of nodes associated with an RSU,

*n*denote the group size, and

*k*denote the number of groups, clearly

*k*=

*N*/

*n*. Also, let

*C*

*W*

_{min}[

*k*] and

*C*

*W*

_{max}[

*k*] denote the arrays of

*C*

*W*

_{min}and

*C*

*W*

_{max}, which can provide

*k*values individually. Through randomly selecting an integer

*i*from the range (0,

*k*), a node can obtain one pair of minimum and maximum contention windows,

*C*

*W*

_{min}[

*i*] and

*C*

*W*

_{max}[

*i*], the difference between which is

*ε*. The nodes select the same number from (0,

*k*), i.e.,

*i*, applying the same minimum and maximum contention windows,

*C*

*W*

_{min}[

*i*] and

*C*

*W*

_{max}[

*i*], and they fall into a group. The nodes’ backoff counters can be determined through randomly selecting a number from range (

*C*

*W*

_{min}[

*i*],

*C*

*W*

_{max}[

*i*]). Note that the value of

*ε*, which is the difference between each pair of

*C*

*W*

_{min}[

*i*] and

*C*

*W*

_{max}[

*i*], determines the number of

*BC*time slots that can be generated from the range (

*C*

*W*

_{min}[

*i*],

*C*

*W*

_{max}[

*i*]).

In order to set the values of *n* and *ε*, we first give a brief review on a work in [10]. Bianchi [10] proves that the optimal contention window size of the 802.11 DCF scheme can be obtained by \(W_{\text {opt}} = N\sqrt {2T_{c} / \delta }\), where *N* is the number of contending nodes, *δ* the duration of an idle time slot, and *T*_{c} the time duration of a failed transmission due to collisions, as in Section 3. As [10] investigates the legacy protocol, where *BC* is selected from the range (0,*W*_{opt}), one can conclude that the optimum number of *BC* time slots required by *N* nodes is *W*_{opt}. As the number of *BC* time slots in our work depends on *ε*, we propose to set the value of *ε* to be \(n\sqrt {2T_{c} / \delta }\), where *n* is the group size. In the numerical example given in Section 3, the 802.11p beaconing performs better in a network consisting of 20 nodes, we propose to set *n* to be 20. Using the parameters given in Table 1 while setting *n* to be 20, we can find the optimum value of *ε* is 32, which exactly corresponds with the analytic result shown in Fig. 1a.

In our proposal, nodes communicating with the same RSU utilize the same contention window arrays, the size of which are determined by *k*, and the values of the members are determined by *ε*. These parameters, *k* and *ε*, are broadcast by the RSU periodically, i.e., piggyback them into the beacon messages. For a node freshly moves into the RSU’s coverage, the parameters can be sent to the node during its association process. Because 802.11p supports the Outside the Context of Basic service set (OCB) mode, nodes may transmit/receive data to/from a RSU without associating with it. In such a case, the node is enabled to perform the backoff process according to the legacy protocol.

### 4.3 Additional issues

Our proposal can improve the performance of 802.11p MAC on broadcasting as follows. Comparing with the legacy protocol, where only a constant contention window is available, our proposal provides nodes with contention window arrays, which makes the nodes form groups based on the chosen values. Since the configuration of group size as well as the contention window ranges are based on our analytical results, proposed scheme is expected to reduce collisions that occurred in CCH efficiently. In addition, our proposal totally works in a distributed fashion, although the parameters related to the contention window arrays are broadcast by the RSUs periodically, due to their small sizes, the involved overhead can be neglected.

## 5 Performance evaluation

*ns-3*to evaluate the performance of our proposed scheme. 802.11p MAC/PHY technologies and the channel switching schemes of IEEE 1609.4 standard are implemented in the ns-3 simulation environment. We consider a 300 × 1500 m

^{2}highway, where nodes are moving according to a random way-point mobility model with a speed of 20 m/s. Nodes are allowed to broadcast 500-byte beacon messages 10 times per second at 6 Mbps. The 10-MHz CCH is provided with a duration of 50 ms, and the two-ray ground model is adopted as a propagation model. Based on our analysis in the previous section, the group size

*n*is set to 20, and the number of

*BC*time slots available for each group is set to 32. More details on the simulation parameters can be found in Table 3.

Parameters in simulation

Parameters | Value |
---|---|

Road region | 300*1500 m |

Average speed | 20 m/s |

Packet size | 500 bytes |

Control channel period (CCH) | 50 ms |

Beacon generation rate | 10 Hz |

Data rate | 6 Mbps |

Group size ( | 20 |

Contention window step size ( | 32 |

where the safety range is the length of the side of a predefined square. In the simulations, transmissions and receptions of beacons occurred in each square are recorded: Any two nodes can receive beacons from each other only if the euclidean distance between them is less than the safety range. A successful reception of the beacon also depends on whether the sender has successfully broadcast a beacon, i.e., the transmission collision as well as the CCH timeout will cause a reception failure. Therefore, the packet reception rate is a metric that shows how the performance of the 802.11p protocol is affected by factors like the varying number of contending nodes, the restricted channel access, and the mobility of nodes. We will use the metric to compare the performances of our proposed protocol and the legacy one.

*BC*time slots available for each group are set to the optimum values which are obtained by the analysis model and that contentions occur only among the nodes belonging to the same group. Therefore, our protocol efficiently reduces the packet losses caused by collisions and the channel expiration.

## 6 Conclusion

In this work, we have proposed a new analytic model to investigate the performance of 802.11p MAC protocol on beaconing, especially regarding the effects caused both by varying numbers of contending nodes and by the restricted channel access. Based on the result of the analytic modeling, we presented a *random contention window* scheme to enhance the performance of 802.11p. Instead of adopting a constant contention window size, our scheme provides arrays of minimum and maximum contention windows, from which the nodes can randomly select a pair of *C**W*_{min} and *C**W*_{max}. Nodes that select the same pair of *C**W*_{min} and *C**W*_{max} form a group, and they contend to access the channel. The optimal contention window size for the group is also discussed, and we can see that our analytic modeling is correct. Finally, we conducted extensive simulations using ns-3 to evaluate the performance of the proposed scheme, and the results show that our proposal efficiently enhances the broadcast performance of the 802.11p MAC protocol.

## Notes

### Funding

This work was supported by Natural Science Foundation of the Jiangsu Higher Education Institutions (16KJB520044), Basic Science Research Program through the National Research Foundation of Korea (2017R1D1A1B03028184), and in part by the research grant of Kwangwoon University in 2017.

### Availability of data and materials

Not applicable.

### Authors’ contributions

XL proposed the analysis model as well as the random contention window scheme, derived the mathematical equations, and performed the simulations and manuscript writing. SHR contributed in the manuscript revision and correction. Both authors read and approved the final manuscript.

### Competing interests

The authors declare that they have no competing interests.

### Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

## References

- 1.S. Biswas, R. Tatchikou, F. Dion, Implementation and evaluation of scalable vehicle-to-vehicle safety communication control. IEEE Commun. Mag.
**49**(11), 134–141 (2011).CrossRefGoogle Scholar - 2.C. -Y Chang, H. -C. Yen, D. -J Deng, V2V QoS guaranteed channel access in IEEE 802.11p VANETs. IEEE Trans. Dependable Secure Comput.
**13**(1), 5–17 (2016).CrossRefGoogle Scholar - 3.S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, H. Zedan, A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl.
**37**(9), 380–392 (2014).CrossRefGoogle Scholar - 4.IEEE, 802.11p-2010, IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks specific requirements part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments, 1–51 (2010).Google Scholar
- 5.S Eichler, in
*Proceeding IEEE VTC*. Performance Evaluation of the IEEE 802.11 p WAVE Communication Standard (IEEE, 2007), pp. 2199–2203.Google Scholar - 6.F. Martelli, M. E. Renda, G. Resta, P. Santi, in
*Proceeding IEEE Infocom*. A Measurement-based Study of Beaconing Performance in IEEE 802.11p Vehicular Networks (IEEE, 2012), pp. 1503–1511.Google Scholar - 7.H. J. F. Qiu, I. W. -H. Ho, C. K. Tse, Y. Xie, A methodology for studying 802.11p VANET broadcasting performance with practical vehicle distribution. IEEE Trans. Veh. Technol.
**37**(9), 4756–4768 (2015).CrossRefGoogle Scholar - 8.Z. Tong, H. Lu, M. Haenggi, C. Poellabauer, A stochastic geometry approach to the modeling of DSRC for vehicular safety communication. IEEE Trans. Intell. Trans. Syst.
**17**(5), 1448–1458 (2016).CrossRefGoogle Scholar - 9.D. H Thuan, H. V Cuu, H. N Do, VANET modeling and statistical properties of connectivity in urban environment. REV J. Electron. Commun.
**3**(1-2), 50–58 (2013).CrossRefGoogle Scholar - 10.G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun.
**18:**, 535–547 (2000).CrossRefGoogle Scholar - 11.J. Zheng, Q. Wu, Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Trans. Veh. Technol.
**65**(4), 2673–2687 (2016).CrossRefGoogle Scholar - 12.C. Han, M. Dianati, R. Tafazolli, R. Kernchen, X. (S.) Shen, Analytical study of the IEEE 802.11p MAC sublayer in vehicular networks. IEEE Trans. Intell. Transp. Syst.
**13**(2), 873–886 (2012).CrossRefGoogle Scholar - 13.X. Ma, X. Chen, H. H. Refai, in
*Proceeding IEEE VTC-2007 Fall*. Unsaturated Performance of IEEE 802.11 Broadcast Service in Vehicle-to-Vehicle Networks (IEEE, 2007), pp. 1957–1961.Google Scholar - 14.B. Li, B. Hu, R. P. Liu, S. Chen, in
*Proceeding IEEE ICC, & quot*. Modeling and QoS Analysis of IEEE 802.11 Broadcast Scheme in Vehicular Ad Hoc Networks (IEEE, 2013), pp. 6444–48.Google Scholar - 15.J. R. Gallardo, D. Makrakis, H. T. Mouftah, Mathematical analysis of EDCA’s performance on the control channel of an IEEE 802.11p WAVE vehicular network. EURASIP J. Wirel. Commun. Netw.
**2010**(489-527), 1–15 (2010).Google Scholar - 16.M. Khabazian, S. Aissa, M. Mehmet-Ali, Performance modeling of safety messages broadcast in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst.
**14**(1), 380–387 (2013).CrossRefGoogle Scholar - 17.C. Campolo, A. Vinel, A. Molinaro, Y. Koucheryavy, Modeling broadcasting in IEEE 802.11p/WAVE vehicular networks. IEEE Commun. Lett.
**15**(2), 199–201 (2011).CrossRefGoogle Scholar - 18.R. Stanica, E. Chaput, A. Beylot, in
*Proceeding IEEE ICC*. Enhancements of IEEE 802.11p Protocol for Access Control on a VANET Control Channel (IEEE, 2011), pp. 1–5.Google Scholar - 19.Q. Yang, J. Zheng, L. Shen, in
*Proceeding IEEE Globecom*. Modeling and Performance Analysis of Periodic Broadcast in Vehicular Ad Hoc Networks (IEEE, 2011), pp. 1–5.Google Scholar - 20.Y. P. Fallah, C. -L. Huang, R. Sengupta, H. Krishnan, Analysis of information dissemination in vehicular ad-hoc networks with application to cooperative vehicle safety systems. IEEE Trans. Veh. Technol.
**60**(1), 233–247 (2011).CrossRefGoogle Scholar - 21.Y. Yao, L. Rao, X. Liu, Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE Trans. Veh. Technol.
**62**(9), 4198–4212 (2013).CrossRefGoogle Scholar - 22.H. Wang, R. P. Liu, W. Ni, W. Chen, I. B. Collings, VANET modeling and clustering design under practical traffic channel and mobility conditions. IEEE Trans. Commun.
**63**(3), 870–881 (2015).CrossRefGoogle Scholar

## Copyright information

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.