Skip to main content

Model, Analysis, and Improvements for Inter-Vehicle Communication Using One-Hop Periodic Broadcasting Based on the 802.11p Protocol

  • Chapter
Wireless Sensor and Mobile Ad-Hoc Networks

Abstract

Many future vehicle safety applications will rely on one-hop periodic broadcast communication (oPBC). The key technology for supporting this communication system is the new standard IEEE 802.11p which employs the carrier sense multiple access/collision avoidance (CSMA/CA) mechanism to resolve channel access competition. In this work, we first aim at understanding the behavior of such oPBC under varying load conditions by considering three important quality aspects of vehicle safety applications: reliability, fairness, and delay. Second, we investigate possible improvements of these quality aspects. We start with a clear mathematical model which gives the foundation for making an accurate simulation model as well as for defining new appropriate metrics to judge the aforementioned quality aspects. We evaluate oPBC with a strictly periodic broadcasting scheme, i.e., each vehicle broadcasts messages in a strictly periodic manner. The evaluation reveals that the hidden terminal, or Hidden Node (HN), problem is the main cause of various quality degradations especially when the network is unsaturated. To be more specific, the HN problem reduces the message reception ratio (i.e., reliability degradation) and causes unfair message reception ratios for vehicles (i.e., fairness degradation). Moreover, it causes long-lasting consecutive message losses (i.e., delay degradation) between vehicles while they are encountering each other, i.e., entering their Communication Ranges (CRs). In some serious cases, a certain vehicle could not successfully deliver any of its messages to a particularly destination vehicle throughout an entire encounter interval of these two vehicles. We propose three simple, but effective broadcasting schemes, to alleviate the impact of the HN problem. Though these solutions do not affect the message reception ratio (i.e., reliability) of the entire network, they do improve the fairness and delay aspects. These solutions are fully compatible with the IEEE 802.11p standard, i.e., they are application-level solutions and can be easily introduced in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In this paper,“No Message Interval” is also used to denote “delay.”

  2. 2.

    δ ≪ 1μs [19, 20].

  3. 3.

    When CR is 300 m, two vehicles approaching each other from the opposite directions with a relative speed of 80 m/s will have an encounter interval of 7.5 s.

  4. 4.

    There are more vehicles in a communication range for a saturated network condition than for an unsaturated network condition. A saturated network condition is most likely a traffic jam situation, where vehicles have a much lower speed compared to a normal traffic situation. As a result, there is a lower likelihood of a big accident with serious casualties.

  5. 5.

    Some concepts are rather misleading. In the document provided there are an RX threshold and a carrier sense threshold. But in the implementation there are an SINR threshold, a power sense threshold, and a carrier sense threshold.

References

  1. Final report, Vehicle safety communications project, Technical Report DOT HS 810 591, 2006

    Google Scholar 

  2. The CAR 2 CAR Communication Consortium. http://www.car-to-car.org/. 2011

  3. Internet ITS consortium. http://www.internetits.org/. 2011.

  4. Bai F, Krishnan H (2006) Reliability analysis of DSRC wireless communication for vehicle safety applications. In: Intelligent transportation systems conference, 2006. ITSC ’06. IEEE, pp 355–362

    Google Scholar 

  5. Robinson C, Caveney D, Caminiti L, Baliga G, Laberteaux K, Kumar P (2007) Efficient message composition and coding for cooperative vehicular safety applications. IEEE Trans Veh Technol 56(6):3244–3255

    Article  Google Scholar 

  6. Mittag J, Schmidt-Eisenlohr F, Killat M, Torrent-Moreno M, Hartenstein H (2010) MAC layer and scalability aspects of vehicular communication networks. In: VANET: vehicular applications and inter-networking technologies, pp 219–269

    Google Scholar 

  7. Torrent-Moreno M, Mittag J, Santi P, Hartenstein H (2009) Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Trans Veh Technol 58(7):3684–3703

    Article  Google Scholar 

  8. IEEE draft standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment: wireless access in vehicular environments, IEEE unapproved draft Std P802.11p/ D11.0, 2010

    Google Scholar 

  9. IEEE trial-use standard for wireless access in vehicular environments (WAVE) - resource manager, IEEE Std 1609.1, pp 1–63, 2006

    Google Scholar 

  10. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages, IEEE Std 1609.2, pp 1–105, 2006

    Google Scholar 

  11. IEEE trial-use standard for wireless access in vehicular environments (WAVE) - networking services, IEEE Std 1609.3, pp 1–87, 2007

    Google Scholar 

  12. IEEE trial-use standard for wireless access in vehicular environments (WAVE) - multi-channel operation, IEEE Std 1609.4, pp 1–74, 2006

    Google Scholar 

  13. Dedicated short range communications (DSRC) message set dictionary, SAE Standard J2735, 2009

    Google Scholar 

  14. IEEE standard for information technology- telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std 802.11-1997, pp 1–445, 1997

    Google Scholar 

  15. Choffnes DR, Bustamante FE (2005) An integrated mobility and traffic model for vehicular wireless networks. In: Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks, pp 69–78

    Google Scholar 

  16. Baumann R, Heimlicher S, May M. (2007) Towards realistic mobility models for vehicular Ad-hoc networks. In: 2007 Mobile networking for vehicular environments, pp 73–78

    Google Scholar 

  17. Bilstrup K, Uhlemann E, Strom E, Bilstrup U (2008)Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication. In: Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th, pp 1–5

    Google Scholar 

  18. Chen Q, Schmidt-Eisenlohr F, Jiang D, Torrent-Moreno M, Delgrossi L, Hartenstein H (2007) Overhaul of IEEE 802.11 modeling and simulation in NS-2. In: Proceedings of the 10th ACM symposium on modeling, analysis, and simulation of wireless and mobile systems, pp 159–168

    Google Scholar 

  19. Ma X, Chen X (2007) Delay and broadcast reception rates of highway safety applications in vehicular ad hoc networks. 2007 Mobile networking for vehicular environments, pp 85–90

    Google Scholar 

  20. Vinel A, Staehle D, Turlikov A (2009) Study of beaconing for car-to-car communication in vehicular ad-hoc networks. In: Communications workshops, 2009. ICC workshops 2009. IEEE international conference on, pp 1–5

    Google Scholar 

  21. Yang L, Guo J, Wu Y (2008) Channel adaptive one hop broadcasting for VANETs. In: Intelligent transportation systems, 2008. ITSC 2008. 11th international IEEE conference on, pp 369–374

    Google Scholar 

  22. Yin J, ElBatt T, Yeung G, Ryu B, Habermas S, Krishnan H, Talty T (2004) Performance evaluation of safety applications over DSRC vehicular ad hoc networks. In: VANET ’04: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 1–9

    Google Scholar 

  23. Kuge T, Ohno K, Itami M (2009) An analysis of performance degradation caused by hidden terminal and its improvement in inter-vehicle communication. In: Intelligent transport systems telecommunications,(ITST), 2009 9th international conference on, pp 482–485

    Google Scholar 

Download references

Acknowledgements

We would like to thank the Strategic Platform for Intelligent Traffic Systems (SPITS) project for funding this work (spits-project.com). SPITS is a Dutch project, tasked with creating ITS concepts that can improve mobility and safety.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Appendices

Appendices

A CSMA/CA

This section explains how CSMA/CA operates in periodic broadcast mode. Figure 21 shows a basic flowchart and Fig. 22 gives a corresponding state machine diagram. According to CSMA/CA, when a station becomes ready to broadcast (Ready To Transmit (RTT)), the station must first check the channel for a duration of AIFS. If the channel has been idle for longer than AIFS, the station starts its transmission immediately. If the channel is busy or becomes busy during AIFS, the station must wait for the channel to become idle. 802.11 refers to this wait as Access Deferral. If access is deferred, the station first waits for the channel to become idle for AIFS again. If the channel is idle, the station must perform Bf procedure by starting a Bf timer which is set to a random number drawn from an interval of {0,1,,CW}. The timer has the granularity of a slot time and is decremented every time when the channel is sensed to be idle for a slot time. The timer is stopped in case the channel becomes busy and the decrementing process is resumed when the channel becomes idle again (i.e., idle for a duration of AIFS). The station is allowed to transmit its message when the Bf timer reaches zero. Depending on the channel condition, a station may experience multiple AIFS plus access deferrals. Note that the Bf counting is at most done once. If a new message arrives from the upper layer, then the current message must be dropped and the new message transmission will start.

Fig. 21
figure 21

CSMA/CA procedure in periodic broadcast mode

Fig. 22
figure 22

CSMA/CA state machine

As shown in the state machine diagram in Fig. 22, each station is in one of the five states: IDLE, WAIT_AIFS, DEFERRING, Bf COUNTING, and XMIT. The station is in the IDLE state when it is neither in transmission nor RTT. In this diagram, we use several variables and constants to show the state transition conditions and timing changes.

  • The “n” holds the current time.

  • The “a” holds the current value of the AIFS counting.

  • The “c” holds the current value of the Bf counting.

  • The “do_c” is a boolean variable to indicate whether the station should perform the Bf counting.

  • The “busyTime” is the duration of the channel being busy.

  • The “msgDelay” is the duration of one message transmission.

  • The “Next Message Time (NMT)” is the time at which the station becomes ready to transmit its next message.

  • The “busy” to indicate the busy channel.

  • The “AIFS” is the number of slots for the AIFS waiting and it is given by the standard.

  • The “CW” is the number of slots for the Bf and it is given by the standard.

  • The “a Slot Time (ST)” is the duration of one slot time and it is given by the standard.

B Signal Reception Model

There are generally two methods used for physical layer (or PHY) modeling in network simulations, namely SINR threshold based and Bit Error Rate (BER) based [22]. Under the former method, the receiver accepts the message when the computed SINR value is above the SINR threshold for a particular modulation scheme. The method based on BER decides whether or not a message is received successfully based on the message length and bit error rate deduced by the pre-computed BER versus SINR curve for every modulation scheme at the receiver.

In our case, the signal reception model is taken from the NS-2 implementation of 802.11p [18], where the signal reception decision is based on SINR ratio. In this model, three basic signal threshold concepts play a role. The first one is a Power Sense Threshold, PsTh.Footnote 5 If any receiving signal is equal to or greater than PsTh, the PHY will try to decode the signal. In addition, any signal equal to or greater than PsTh is considered to be strong enough to interfere with any other signal. Therefore, such signal is added into the cumulative signal level of the receiver. The second threshold is the SINR threshold (or receiving threshold), SrTh. To receive a message successfully, the preamble must be received successfully. While a station is not transmitting nor receiving any signal, namely the PHY is constantly searching for a preamble and if a new signal arrives with a signal strength that is equal to or greater than SrTh with respect to all other interfering signals plus noise, then the station will start receiving the signal as the preamble. If this SINR ratio holds for the entire duration of the preamble length, the PHY can finish the preamble reception successfully. Once the preamble is received successfully, the PHY will inform the MAC layer that the PHY is receiving a message and will continue until the complete payload has been received regardless of whether the signal level is greater or less than SrTh, unless the frame capturing feature is enabled. Note, the preamble includes information about payload (the length of payload, modulation scheme etc.). In addition, if the receiving signal strength becomes less than SrTh during the payload reception, PHY layer puts an error in the payload such that when the MAC layer checks the CRC of the received message it will not send the message to the application layer.

The third threshold is a carrier sense threshold, CsTh. If the cumulative power level of the receiver is equal to or greater than CsTh, then the PHY layer will inform the MAC layer that the channel is busy. From this, we can see that the MAC layer is informed about the channel status in two different ways. First, no matter what if the cumulative power is equal to or greater than CsTh, then the MAC is informed the channel is busy. Second, if the PHY layer successfully receives a preamble viz., start receiving a payload, the MAC layer is informed the channel is busy.

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer New York

About this chapter

Cite this chapter

Batsuuri, T., Bril, R.J., Lukkien, J.J. (2015). Model, Analysis, and Improvements for Inter-Vehicle Communication Using One-Hop Periodic Broadcasting Based on the 802.11p Protocol. In: Benhaddou, D., Al-Fuqaha, A. (eds) Wireless Sensor and Mobile Ad-Hoc Networks. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2468-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-2468-4_9

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-2467-7

  • Online ISBN: 978-1-4939-2468-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics