Advertisement

Study of Probabilistic Worst Case Inter-Beacon Delays Under Realistic Vehicular Mobility Conditions

  • Alexandre MouradianEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9143)

Abstract

Road safety applications are one of the main incentives to deploy vehicular networks. These applications rely on periodic message exchange among vehicles (known as beaconing). The beacon messages contain information about the environment which is used to perceive dangerous situations and alert the drivers. The inter-beacon delay is the time between two consecutive beacons received from a car. It is an essential parameter because, if this delay exceeds the application requirement, the application cannot accurately predict dangerous situations and alert the drivers on time. The worst case inter-beacon delay has thus to be bounded according to the application requirements. Unfortunately, a tight and strict bound is in fact very difficult to obtain for a real network because of the randomness of the collisions among beacons coming from: the unpredictable mobility patterns, random interferences, randomness of the MAC layer backoff, etc.

In this paper, we propose to provide a probabilistic worst-case of the inter-beacon delay under realistic mobility using Extreme Value Theory (EVT). EVT provides statistical tools which allow to make predictions on extreme deviations from the average of a parameter. These statistical predictions can be made based on data gathered from simulation or experimentation. We first introduce the EVT technique. Then we discuss its application to the study of inter-beacon delays. Finally, we apply EVT on the results of extensive vehicular network simulation using a realistic mobility trace: the Cologne trace.

References

  1. 1.
    The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/
  2. 2.
    Alvarado, E., Sandberg, D.V., Pickford, S.G.: Modeling Large Forest Fires as Extreme Events. National Emergency Training Center, Emmitsburg (1998)Google Scholar
  3. 3.
    Autolitano, A., Campolo, C., Molinaro, A., Scopigno, R.M., Vesco, A.: An Insight into Decentralized Congestion Control Techniques for VANETs from ETSI TS 102 687 V1. 1.1, IFIP WD, Valencia (2013)Google Scholar
  4. 4.
    Beirlant, J., Goegebeur, Y., Segers, J., Teugels, J.: Statistics of Extremes: Theory And Applications. Wiley, NewJersey (2006)Google Scholar
  5. 5.
    Consortium, C.V.S.C., et al.: Vehicle Safety Communications Project: Task 3 Final Report: Identify Intelligent Vehicle Safety Applications Enabled by DSRC. National Highway Traffic Safety Administration, US Department of Transportation, Washington, DC (2005)Google Scholar
  6. 6.
    Dahab, A.Y., Said, A.M., Hasbullah, H.: Application of extreme value theory to bursts prediction. SPIJ 3(4), 55 (2009)Google Scholar
  7. 7.
    Edgar, S., Burns, A.: Statistical Analysis of WCET for Scheduling. IEEE RTSS, London (2001)CrossRefGoogle Scholar
  8. 8.
    Embrechts, P., Resnick, S.I., Samorodnitsky, G.: Extreme value theory as a risk management tool. North Am. Actuarial J. 3(2), 30–41 (1999)zbMATHMathSciNetCrossRefGoogle Scholar
  9. 9.
    Hartenstein, H., Laberteaux, K.: VANET: vehicular applications and inter-networking technologies. Wiley Online Library, Chichester (2010)Google Scholar
  10. 10.
    Jain, R.: The Art of Computer Systems Performance Analysis. Wiley, New York (2008)Google Scholar
  11. 11.
    Kloiber, B., Garcia, C., Härri, J., Strang, T.: Update delay: a new information-centric metric for a combined communication and application level reliability evaluation of cam based safety applications. In: ITS World Congress (2012)Google Scholar
  12. 12.
    Koçak, K.: Practical ways of evaluating wind speed persistence. Energy 33(1), 65–70 (2008)CrossRefGoogle Scholar
  13. 13.
    Liu, C., Shu, Y., Liu, J., Yang, O.: Application of Extreme Value Theory to the Analysis of Wireless Network Traffic. IEEE ICC, Glasgow (2007)CrossRefGoogle Scholar
  14. 14.
    Lu, Y., Nolte, T., Bate, I., Cucu-Grosjean, L.: A Statistical Response-Time Analysis of Real-Time Embedded Systems, pp. 351–362. IEEE RTSS, Puerto Rico (2012)Google Scholar
  15. 15.
    Nelder, J.A., Mead, R.: A simplex method for function minimization. Comput. J. 7(4), 308–313 (1965)zbMATHCrossRefGoogle Scholar
  16. 16.
    Nguyen, T.V., Baccelli, F., Zhu, K., Subramanian, S., Wu, X.: A Performance Analysis of CSMA Based Broadcast Protocol in VANETs. IEEE INFOCOM, Turin (2013)CrossRefGoogle Scholar
  17. 17.
    Noori, H., Olyaei, B.: A Novel Study on Beaconing for VANET-Based Vehicle to Vehicle Communication: Probability of Beacon Delivery in Realistic Large-scale Urban Area using 802.11p. IEEE SaCoNeT, Paris (2013)Google Scholar
  18. 18.
    Shukla, R.K., Trivedi, M., Kumar, M.: On the proficient use of gev distribution: a case study of subtropical monsoon region in india. Annals. Computer Science Series 8 (2010)Google Scholar
  19. 19.
    Stanica, R., Chaput, E., Beylot, A.L.: Broadcast Communication in Vehicular Ad-hoc Network Safety Applications. IEEE CCNC, Lax Vegas (2011)CrossRefGoogle Scholar
  20. 20.
    Uchida, M.: Traffic Data Analysis Based on Extreme Value Theory and its Applications. IEEE GLOBECOM, Dallas (2004)CrossRefGoogle Scholar
  21. 21.
    Uppoor, S., Fiore, M.: Large-Scale Urban Vehicular Mobility for Networking Research. IEEE VNC, Amsterdam (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Laboratoire des Signaux Et Systèmes (L2S, UMR8506)Université Paris Sud-CNRS-CentraleSupélecGif-sur-yvetteFrance

Personalised recommendations