Next Article in Journal
Generation of a Porous Scaffold with a Starting Composition in the CaO–SiO2–MgO–P2O5 System in a Simulated Physiological Environment
Next Article in Special Issue
Analysis of Low Cost Communication Technologies for V2I Applications
Previous Article in Journal
Hybrid Resonant Converter with Three Half-Bridge Legs for Wide Voltage Operation
Previous Article in Special Issue
Negotiation-Free Encryption for Securing Vehicular Unicasting Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks

1
Korea Railroad Research Institute, 176, Cheoldobakmulgwan-ro, Uiwang-si, Gyeonggi-do 16106, Korea
2
Department of Railroad Electrical & Electronic Engineering, Korea National University of Transportation, 157 Cheoldobakmulgwan-ro, Uiwang-si, Gyeonggi-do 16106, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(1), 311; https://doi.org/10.3390/app10010311
Submission received: 27 November 2019 / Revised: 21 December 2019 / Accepted: 29 December 2019 / Published: 31 December 2019
(This article belongs to the Special Issue Technologies and Applications of Communications in Road Transport)

Abstract

:

Featured Application

Platooning is a method for driving a group of vehicles together designed to increase the capacity of roads via an automated highway system. The proposed scheme in this work can improve the efficiency and the reliability of Vehicle-to-Vehicle (V2V) wireless communication which enables more aggressive platoon management so that the road capacity can be further increased.

Abstract

In this paper, a novel channel access scheme, Distributed Triggered Access (DTA), is proposed for distributed V2V Basic Safety Message (BSM) dissemination in future platooning environment. To meet the stringent delay requirements of platooning communications, the proposed scheme is designed to use Wireless Local Area Network (WLAN) multi-user channel access in a distributed manner. The proposed scheme leverages advanced Medium Access Control (MAC) layer features, such as Triggered Uplink Access and Multi-user Request-To-Send (RTS), introduced in the 6th generation mainstream WLAN standard, IEEE 802.11ax, based upon a conceptual Physical (PHY) layer frame structure for IEEE 802.11bd, the successor of IEEE 802.11p. The proposed scheme is analyzed by mathematical model and simulations from transmission delay and successful transmission rate perspective. The mathematical model includes a Markov chain analysis that models the Enhanced Distributed Channel Access (EDCA) backoff procedure of DTA considering the effect of resumed backoff procedure with empty buffer caused by triggered access. Also, a Markov arrival/General service distribution/1 service channel (M/G/1) queuing model is provided to analyze the transmission delay of a BSM under unsaturated traffic condition. The extensive simulation results corroborate that DTA effectively improves the transmission success rate and reduces the average BSM collecting delay in a highly congested environment.

1. Introduction

Traffic congestion is a persistently growing trend and has a great economic impact in terms of the time consumption of commuters and the fuel of vehicles [1]. To solve the traffic congestion problem, numerous studies have been conducted with a wide range of perspectives. Over the last few decades, the research on traffic management in the form of reducing traffic congestion by effectively distributing traffic on the roads has been mainly conducted [2,3,4]. In terms of improving the precision of traffic management techniques, developing more realistic traffic models and advanced traffic prediction tools has also been one of the key topics [5,6,7,8,9].
The introduction of wireless communication technology has allowed much wider and more sophisticated approaches in traffic management by means of providing timely information to drivers, vehicles, and systems. Wireless Sensor Networks (WSNs), which are capable of monitoring real-time traffic using low-cost communication devices such as ZigBee and Bluetooth devices, have gain increasing attention [10,11,12]. Also, there has been significant research on Cooperative Intelligent Transportation Systems (C-ITS) where each component on the road bidirectionally communicates to each other taking advantage of broadband wireless communication systems [13,14,15], such as Dedicated Short Range Communication (DSRC) [16] and 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) [17].
Lately, platooning, which combines autonomous driving and advanced communication techniques, has been spotlighted as a breakthrough technology and intensively studied [18,19,20,21]. In platooning, autonomous vehicles share their driving information among neighboring vehicles, and organize themselves into a set called a platoon. Since platooning can increase the road capacity by reducing the inter-vehicle distance, it is considered one of the most promising solutions for future congestion management.
To efficiently manage autonomous platoon without compromising safety aspect, cooperative awareness among platooning vehicles needs to be guaranteed. One of the most common ways to achieve the cooperative awareness is beaconing where all vehicles periodically broadcast their general information using V2V wireless communication. A beaconing message may include vehicles’ positioning information and driving information such as speed, accelerating/braking force and steering, peripheral information measured by sensors attached to vehicles. SAE J2735 [22] defines the format of the Basic Safety Message (BSM) as the application of beaconing message and is widely applied for numerous vehicular networks.
As a bearer of BSM messages, DSRC leveraging the IEEE 802.11p standard [23] has been mainly considered in the early stage of vehicular networks. The IEEE 802.11p standard is designed to operate in 5.850–5.925 GHz band and developed based on the IEEE 802.11a Wireless LAN PHY/MAC specification. There are couple of advantages using IEEE 802.11p standard in vehicular communications: (1) a centralized controlling entity is not required because each vehicle is allowed to access the medium in a distributed manner, (2) easy and low-cost deployment is possible since the network operates in unlicensed band, and also it does not require higher layer infrastructure.
Several DSRC-related pieces of research have been conducted to evaluate the performance of DSRC. Ma et al. [24] introduced the basic parameter space for one-dimensional IEEE 802.11p networks derived with the IEEE 802.11 Distributed Coordination Function (DCF) model. In [25], an analytical model for safety message broadcasting was proposed. The model took vehicles’ high mobility, hidden terminal problems, the transmission collisions from neighboring vehicles, and the channel fading in DSRC networks into account. In [26], an analytical model for delivering safety messages using prioritized Access Classes (ACs) was proposed to analyze the performance of EDCA considering virtual collisions, Arbitration Inter-frame Spacing (AIFS) differentiation, the retry limit and the difference among frame blocking probability, frame collision probability and channel busy probability into considerations. In [27], authors proposed an analytical model for DSRC networks where broadcast safety message and unicast non-safety message share the medium with different priorities.
According to the past research, IEEE 802.11p can provide a decent V2V communication quality in moderate network traffic condition. As network congestion increases; however, the delay performance of channel access degrades severely because the Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) incurs an excessive medium contention overhead in heavy traffic situation. Envisioning the future platooning environment, platooning application will require vehicles to exchange more various types of information with increased size to achieve more precise control of platoon driving. Furthermore, the adoption of platooning will possibly increase vehicle density which means that several contending nodes for channel access will also increase in the network. This rationale raises concerns that DSRC may not properly meet the requirements of future platooning.
Meanwhile, IEEE Standard Association (SA) has commenced to develop the successor of IEEE 802.11p recently. As the result of a year of studies on the Next Generation Vehicle (NGV) Vehicle-to-Everything (V2X) Wireless Local Area Network (WLAN), the IEEE 802.11bd Task Group (TG) was formed in January 2019. The main objective of IEEE 802.11bd is to improve throughput, transmission range, and positioning performance [28]. IEEE 802.11bd not only defines the PHY layer but also the MAC layer including congestion control. As IEEE 802.11p used to embrace many features defined in IEEE 802.11a, IEEE 802.11bd is considering adopting some advanced features from the latest main stream WLAN standard, IEEE 802.11ax [29].
The IEEE 802.11ax standard has been developed since 2014. The main objective of IEEE 802.11ax is to achieve high efficiency in dense network environment [30]. In order to solve the longstanding CSMA congestion problem, the IEEE 802.11ax standard has adopted a new channel access scheme, namely Triggered Uplink Access (TUA), which takes advantages of scheduling-based channel access scheme in contrast to the conventional CSMA/CA scheme. In [31], an analytic model to evaluate the channel use of TUA was proposed. Yang et al. proposed a Markov chain analysis of TUA Uplink Orthogonal Frequency Division Multiple Access (OFDMA) Random Access (UORA) in saturated traffic condition [32]. In [33], a V2I channel access scheme using TUA was proposed.
In this paper, we propose a novel channel access scheme for V2V BSM dissemination, called Distributed Triggered Access (DTA). In the proposed scheme, each vehicle that accesses the channel using EDCA to transmit a buffered BSM may solicit simultaneous transmission of nearby vehicles. Leveraging the new PHY layer numerology of the IEEE 802.11ax and the synchronization and instant scheduling features of TUA, the solicited vehicles can perform OFDM) transmission immediately. TUA was primarily proposed to be used in a Basic Service Set (BSS) environment, where a centralized Access Point (AP) device has better understanding on the associated devices and traffic situation so that it can schedule a TUA transmission properly. Since the characteristic of BSM traffic is easy to predict and vehicles are supposed to know the presence of nearby vehicles, in the proposed scheme, TUA is used in distributed manner. To the best of our knowledge, our work is the first attempt to apply TUA to distributed V2V networks and to provide an analytic model of TUA scheme including unsaturated traffic condition. In addition, we also apply the MU-RTS feature of IEEE 802.11ax to deal with the lengthened airtime caused by OFDMA transmission.
The proposed scheme is aiming to solve the following challenges in BSM dissemination scenario: (1) Preventing severe throughput degradation caused by medium access congestion in saturated traffic condition, (2) Decreasing the effect of hidden node problem in high vehicle density, (3) Increasing the successful packet delivery rate in ‘ACK-less’ broadcast situation.
The simulation results corroborate that DTA effectively deals with the aforementioned problems with enhanced BSM dissemination rate, reduced packet loss rate even under very high vehicle density and traffic conditions.
The rest of this paper is organized as follows. In Section 2, the proposed DTA scheme is described in detail including the background technologies. In Section 3, mathematical analysis is proposed using the Markov chain analysis and the M/G/1 queuing theory. Simulation results of the proposed scheme are presented in Section 4. Finally, Section 5 concludes the paper.

2. Proposed Scheme

In the proposed Distributed Triggered Access (DTA) scheme, vehicular stations (VSTAs) leverage the Triggered Uplink Access (TUA) scheme in the IEEE 802.11ax standard [29] in order to trigger simultaneous broadcast packet transmission from nearby multiple VSTAs under distributed V2V communication environment.
According to the IEEE 802.11ax standard, when an Access Point (AP) station obtains a transmission opportunity (TXOP) through channel access, it may transmit a Trigger Frame (TF) to initiate a TUA OFDMA transmission sequence. In TUA, since AP is assumed to have knowledge about stations’ (STAs) buffer status through buffer status report procedure, it solicits specific STAs by listing the STAs’ addresses in the TF. The proposed DTA scheme is carefully designed to work under distributed vehicular communication environments. In order to minimize the changes of the standard, DTA is designed on top of TUA. In order to explain the proposed scheme, the overview of TUA is presented in the following.
In TUA, the main purpose of TF is to share time synchronization information among scheduled stations as well as scheduling information for each scheduled station. The lack of resource reservation and periodic scheduling procedure makes WLAN difficult to implement uplink multi-user simultaneous transmission. With increased processing capability of station, IEEE 802.11ax implements uplink simultaneous transmission in a manner of immediate responding to the scheduling of triggering station within one TXOP, instead of resource reservation. The remaining challenges to enable the simultaneous uplink transmission as an immediate responding to the scheduling are: (1) making the uplink frame detectable, and (2) the synchronization of the uplink transmission timing. In order to do so, TF contains all necessary physical layer parameters so that all scheduled stations can construct an identical preamble. The Trigger Based (TB) PPDU is transmitted immediately Short Inter-frame Spacing (SIFS) after the reception of the preceding TF, and the triggered STAs calculate the transmission duration using the Modulation and Coding Scheme (MCS) and the PHY layer Service Data Unit (PSDU) length information contained in the TF. The format of TF is depicted in Figure 1.
The Common Info field contains general information which can be shared by all triggered stations such as the length and the total occupying bandwidth of the triggered PHY layer Protocol Data Unit (PPDU), the properties of the channel coding scheme and the transmit power of the triggering station. The User Info List field may contain multiple User Info fields as many as the number of scheduling Resource Units (RU). Each User Info field indicates the identification of the target triggered station and the scheduled RU as well as user-specific transmission parameters such as MCS, Forward Error Correction (FEC) coding type etc.
If a station receives a TF with valid scheduling information, the station responds with a data packet using the TB PPDU format. Upon the transmission of a TB PPDU, the station needs to construct the first part of the preamble as instructed in the Common Info field of the preceding TF. The first part of the preamble follows the legacy format of IEEE 802.11 PPDU preamble format and occupies the whole 10 MHz channel bandwidth using the conventional 64-FFT OFDM symbols for backward compatibility. Since all scheduled stations transmit an identical preamble signal at the same time, the recipient can detect the start of the PPDU and obtain the length information of the PPDU. For the latter part of the PPDU, each scheduled station transmits individual data packet using the allocated resource with novel 256-FFT OFDM numerology. In this case, all triggered stations need to align the duration of the transmitting PPDU to maintain the synchronization of the transmission sequence.
In the proposed scheme, we assume that the PPDU structure of TB PPDU and the PPDU for TF transmission for IEEE 802.11bd VSTAs follow the format of HE TB and HE SU PPDU defined in the IEEE 802.11ax standard, except that the subcarrier spacing is halved with increased OFDM symbol duration. Following the assumption, a triggering station can schedule up to 9 stations per single 10MHz bandwidth using the smallest RU size with 26 OFDM tones. In this paper, multi-channel transmission in [34] is not considered. The general format of the proposed TB PPDU is depicted in Figure 2.
In IEEE 802.11ax, TUA is also applied for a wide-range transmission protection scheme, called MU-RTS. In WLAN, in order to prevent collision, the transmitter and the receiver can perform RTS/CTS (Clear-To-Send) procedure, so that the nearby stations can set a Network Allocation Vector (NAV) and suspend any transmission until the time indicated in the NAV. However, if a transmission is performed by multiple transmitters simultaneously or a transmission is destined to multiple receivers, the protection that covers all communication range cannot be done unless all corresponding transmitters and receivers exchange RTS/CTS one by one sequentially. Thanks to the synchronization feature of TF, a triggering station can solicit simultaneous CTS transmission by transmitting an MU-RTS frame which is a variant of TF. Following the information included in the MU-RTS frame, such as the transmitting bandwidth, the scrambling seed and NAV information, all solicited stations can transmit an identical CTS frame simultaneously. Since the CTS frame follows the legacy OFDM PPDU format, all other stations within the range of simultaneous CTS frame can set a NAV properly. If a transmitted MU-RTS frame had collided with other frame, the transmitter may not receive any CTS frames from nearby stations. In this case, the transmitter release the TXOP and re-initiate an EDCA backoff procedure.
The proposed distributed multi-vehicle channel access scheme, DTA, fully exploits all the beneficial features of TUA and MU-RTS. Although the proposed scheme can accommodate all kinds of Outside the Context of Basic Service Set (OCB) traffics, for the sake of simplicity, Basic Safety Message (BSM), which is a broadcast traffic and the most common traffic in V2X communications, is used in the description of the proposed scheme.
In the proposed scheme, two types of channel access methods coexist. One is conventional EDCA, the other is Triggered Access (TA) in which VSTA accesses the channel triggered by another VSTA, independent from its own EDCA backoff procedure. Whenever a VSTA acquires a TXOP after finishing its backoff procedure, it plays a role of triggering VSTA. In order to solicit multiple VSTAs’ simultaneous BSM transmission, the triggering VSTA transmits a TF, which contains the scheduling information for multiple VSTAs, at the beginning of the TXOP.
Since broadcast BSM is destined to all nearby VSTAs, all VSTAs within the transmission range of each transmitting VSTAs needs to be protected. Thus, in the proposed scheme, a protection procedure using MU-RTS is proceeded ahead of multi-vehicle BSM transmission. Since the MU-RTS protection in DTA is always intended to all neighboring VSTAs, the Common Info field can contain all the necessary information for MU-RTS procedure without User Info List field. Furthermore, as the Common Info field information of the MU-RTS frame can be reused for the TF soliciting TB PPDU transmission of BSM, the TF for MU-RTS procedure and that for multi-vehicle BSM triggering can be merged into one unified TF. Thus, once a triggering VSTA transmits a TF, all VSTAs that receive the TF transmit simultaneous CTS immediately after the TF reception, following that a simultaneous TB PPDU transmission is made by the scheduled VSTAs. Within the User Info List field of the TF, RU scheduling information for multi-vehicle BSM transmission is included, and the triggering VSTA reserves one of the scheduled RUs for the BSM transmission of itself. If the triggering VSTA does not receive any CTS frame in response to the TF, the VSTA considers the TF transmission has failed and invokes another backoff procedure. In this case, however, the VSTA does not change the current contention window size as the previous backoff procedure was invoked by a broadcast frame. An example of the proposed DTA transmission sequence is described in Figure 3.
In the proposed BSM dissemination scenario, there exist a few issues that need to be resolved to improve the performance of DTA. First, a triggering VSTA should know which VSTA has a BSM to transmit. If a VSTA with empty buffer is triggered, the scheduled RU might be wasted resulting in poor channel use. However, if a network topology changes rapidly or the number of VSTAs is large, it is difficult for the triggering VSTA to maintain the information on the network traffic consistently. Secondly, the transmitting VSTA does not know if the transmission has succeeded as there is no acknowledgement from the receivers. As soon as a VSTA transmits a BSM, the VSTA removes the transmitted packet from the buffer. If a collision occurs in the channel, the BSM is lost and there is no way to recover it. This can be a very serious problem under high vehicle density since the collision probability increases rapidly as the density increases [35].
To overcome such difficulties, in the proposed scheme, VSTA manages its buffered BSMs with two categories, the active BSM and the non-active BSM. VSTA considers a BSM is active if it has not been transmitted yet. If a VSTA has an active BSM, it performs EDCA backoff procedure to actively acquire the channel. Once the VSTA transmits the active BSM by means of either EDCA or TA, the BSM is no longer active. If the VSTA has no additional active BSM in the buffer, the VSTA keeps the BSM as a non-active BSM, otherwise the BSM is discarded. The VSTA does not initiate an EDCA backoff procedure for the non-active BSM, but it can be transmitted by TA. By doing so, waste of RU can be prevented since all VSTAs always have BSM to transmit. Moreover, since BSMs can be retransmitted by TA, the BSM delivery rate can be improved without increasing the channel contention. As a triggering VSTA does not need to consider the buffer status of other VSTAs, in the proposed scheme, we assume that the triggering VSTA performs a round robin scheduling among VSTAs within a predefined triggering range based on the positioning information.
In the next section, a mathematical model for the analysis of the proposed scheme is provided.

3. Numerical Analysis

In this section, we provide the numerical analysis of the proposed DTA scheme. The goal of this section is to obtain the transmission delay of the proposed scheme. In order to do so, we provide the Markov chain analysis of the proposed scheme and the Probability Generating Function (PGF) of the service time of a BSM using M/G/1 queuing model.
In this paper, the impact of the mobility of VSTAs is not considered, since VSTAs are almost stationary within one packet transmission time in platooning communication. According to [36], high mobility of nodes (up to 120 mph) has very minor impact on the performance of the one-hop direct message broadcast network with high data rates. Also, in order to concentrate on the effect of the vehicle density and traffic intensity on the delay aspect and packet delivery rate of the proposed scheme, we only considers the packet collision and the hidden terminal effect and neglect the packet error rate as well as the capture effect [37] in this analysis.
In this paper, we consider a one-dimensional highway model for our numerical analysis as shown in Figure 4. For inter-VSTA distance, an exponential distribution is applied, assuming that the VSTAs are placed on the line according to a Poisson point process with network density β (in VSTAs per meter). From the definition of Poisson distribution, the probability of j VSTAs existing within length L, P ( j , β L ) , is given by
P v ( j , β L ) = ( β L ) j e ( β L ) j !
The IEEE 802.11 specification defines two types of carrier sensing: Preamble Detection (PD) and Energy Detection (ED). A channel is considered busy as PD, when the preamble of a PPDU, e.g., the Short Training Field (STF), is detected by the physical layer of the receiver. If a preamble is detected, the receiving VSTA can obtain necessary information to decode the MAC-layer Protocol Data Unit (MPDU) of the PPDU. Unless the Frame Check Sequence of the MPDU fails caused by the channel error, the transmission is regarded as success. Nevertheless, the received power of a PPDU is not sufficient to detect the preamble, the recipient may be aware of the presence of ongoing transmission on the channel. If an energy is detected and is greater than a threshold value, the receiving VSTA regards the channel as busy and waits until the energy level decreases less than the threshold.
Regarding the relationship between the radio range and transmission power, we apply the same approach as described in [24]. Assuming all VSTAs have the same transmission power and receiver sensitivity, the ED range of a transmission, L e d , is greater than the PD range, L p d . By assuming the interference range greater than L p d and less than L e d , the VSTAs within the region ( L e d , 2 · L p d ) , become hidden VSTAs of which the transmission might cause an interference to the tagged VSTAs if the transmission duration is overlapped to each other.
Based on the assumption, the average number of VSTAs in the triggering region, N t r , the PD region, N p d , the ED region, N e d , and the hidden region, N i n t , can be respectively obtained as the following:
N t r = 2 β L t r N p d = 2 β L p d N e d = 2 β ( L e d ) N i n t = 2 β ( 2 L p d L e d )
In DTA, VSTA can transmit a BSM using two methods: (1) EDCA: the VSTA becomes the TXOP holder by backoff contention and transmits a Trigger frame followed by a BSM transmission using a scheduled RU, (2) Triggered Access: transmitting a BSM in response to a Trigger frame from other VSTAs. Since all transmission sequences are initiated by the EDCA transmission, the backoff procedure needs to be analyzed first.
According to the IEEE 802.11 standard, broadcast frames, such as BSM, do not require an acknowledgement from the recipients, so the transmitter cannot determine whether the transmission has succeeded or not. As there is no change on the contention window size of the transmitter, the EDCA procedure with the fixed contention windows size, W, can be modeled as one-dimensional Markov chain model as depicted in Figure 5 [38]. In Figure 5, P a r r , P e m p and P b denote the probability of a packet arrival from the higher layer during a virtual time slot [39], T ω , the probability that no active BSM exists in the queue and the backoff blocking probability [40], respectively.
Denoting the rate of generating a BSM to λ , P a r r can be given by
P a r r = 1 e λ T ω
The backoff blocking probability, P b , is the probability that the backoff counter of the tagged VSTA is frozen by other VSTAs occupying the channel or by other ACs. In this paper, the target BSM message is supposed to use the highest AC, the impact of internal contention within a STA is not considered. By the definition of P b , we have
P b = 1 k = 0 ( 1 τ ) N e d 1 P v ( k , N e d 1 )
In (4), τ is the transmission probability that a VSTA transmits a frame in a randomly chosen time slot [38], and can be obtained by solving the Markov chain model of the proposed scheme in Figure 5.
According to the stationary distribution of the Markov model in Figure 5, we have
b k = W k + 1 W + 1 b 0 b I d l e = P e m p · b 0 + b I d l e ( 1 P a r r )
b 0 = W 2 ( 1 P b ) + P e m p + P a r r P a r r 1
Unlike conventional EDCA transmissions, in DTA, a VSTA may transmit an active BSM with non-zero backoff counter by the triggered access from other VSTAs. In this case, the backoff procedure is resumed after the triggered access, but the VSTA does not transmit a BSM when its counter reaches to zero unless there exists an active BSM in the buffer. In the proposed scheme, therefore, an EDCA transmission event occurs when one of the following conditions is met: (1) the VSTA has more than one active BSM, (2) the VSTA has one active BSM and no triggered access happens during the backoff procedure, (3) the only active BSM is transmitted by an triggered access during the backoff procedure, and another active BSM arrives before the counter reaches to zero. In this paper, we consider the probability that multiple triggered access scheduling events or packet arrival events occur during one backoff procedure is negligible. According to [41] the steady-state probability that k packets exist in the system, P q ( k ) is
P q ( k ) = ( 1 ρ ) ρ k ,
where ρ is the busy probability of the system which can be derived by
ρ = λ / μ
where μ is the average service rate of the proposed scheme.
Thus, denoting the probability that a VSTA has at least one active BSM to transmit when the counter reaches to zero as P a , we have
P a = 1 p q ( 0 ) p q ( 1 ) 1 p q ( 0 ) + p q ( 1 ) 1 p q ( 0 ) 1 W + 1 · k = 1 W ( 1 p t a ) k + j = 1 k p t a ( 1 p t a ) j 1 1 e λ ( k j + 1 ) T ω ,
and we can obtain P e m p and τ as
P e m p = 1 P a ,
and
τ = P a b 0
In (9), P t a , is the probability that a VSTA transmits a BSM by triggered access in an arbitrary virtual time slot. A VSTA transmits a BSM via triggered access when it successfully receives a TF containing the scheduling information of the VSTA which means that the received TF is transmitted within R t r and the VSTA is included in M, the number of RUs for triggering, out of N t r VSTAs. An EDCA transmission is regarded successful if only one VSTA transmits the Trigger frame within the ED range at the time slot, and no transmission occurs from the VSTAs in the hidden range during the vulnerable period [26]. Once a TF is transmitted successfully, all nearby VSTAs within L p d are supposed to transmit CTS frame simultaneously followed by the triggered access TB PPDU transmission of scheduled VSTAs. As long as the TF is not collided, the whole DTA transmission sequence will take place, so only the duration of the TF affects the vulnerable period. If we let P t r be the probability that a VSTA successfully transmits a TF in an arbitrary time slot, we have
P t r = τ k = 0 ( 1 τ ) k P v ( k , N e d 1 ) k = 0 ( 1 τ ) k P v ( k , N i n t ) T v u l t f / T ω = τ e N p d e τ ( N e d + N i n t · T v u l t f / T ω ) 1 ,
where T v u l t f denotes the vulnerable period of a TF that can be given by
T v u l t f = 2 T t f
where T t f is the duration of the PPDU containing the TF.
Then, the probability that the tagged STA successfully participate in a triggered access transmission, P t a , can be given by
P t a = M 1 N t r N t r 1 P t r
Now, we calculate the average virtual slot, T ω . Based on the procedure of the proposed scheme, there are three types of possible virtual slots: (1) empty slots where all VSTAs are in backoff procedure or idle, (2) DTA successful slot and (3) MU-RTS collision slot with the duration T ω ( 1 ) , T ω ( 2 ) and T ω ( 3 ) , respectively, and we have
T ω ( 1 ) = σ T ω ( 2 ) = T d t a = T t f + T s i f s + T c t s + T s i f s + T t b + T a i f s T ω ( 3 ) = T t f + T a i f s
where T a i f s , T s i f s , T c t s and T t b denotes the duration of AIFS, SIFS, the PPDU carrying a CTS frame and the TB PPDU containing multi-vehicle BSM frames, respectively.
Letting P ω ( 1 ) , P ω ( 2 ) and P ω ( 3 ) be the probabilities corresponding to the above slots, respectively, we have
P ω ( 1 ) = 1 k = 0 ( 1 τ ) N e d P v ( k , N e d ) P ω ( 2 ) = N e d τ k = 0 ( 1 τ ) N e d P v ( k , N e d 1 ) P ω ( 3 ) = 1 P ω ( 1 ) P ω ( 2 )
To simplify the analysis, in this paper, we neglect transmission events occurring outside of the interference range.
To calculate the service rate of the proposed scheme, μ , we model the transmission procedure of the proposed scheme as an M/G/1 queue with unlimited queue and apply the Probability Generating Function (PGF) approach. As treated in [24], the service time of a packet can be modeled as a non-negative random variable denoted by S, with the unit of the smallest time unit, σ .
We first provide the PGF of active BSM transmission procedure. Whenever a VSTA has an active BSM a backoff procedure is initiated. Therefore, the generalized state transition diagram of the service time of the BSM that has become the head of the queue can be modeled as depicted in Figure 6.
In Figure 6, Y ( z ) , X ( z ) and H ( z ) denote the PGF of the transmission sequence duration of a triggering VSTA, the PGF of the transmission duration of MU-RTS collision case and the PGF of the time that the backoff counter decrements by one, respectively.
By the definition of the model, Y ( z ) and X ( z ) can be given by
Y ( z ) = P t r τ z T ω ( 2 ) σ X ( z ) = ( 1 P t r ) τ z T ω ( 3 ) σ
Using (14), (15) and (16), H ( z ) can be given by
H ( z ) = P ω ( 1 ) z + ( P ω ( 2 ) P t a ) z T ω ( 2 ) σ + P ω ( 3 ) z T ω ( 3 ) σ
There are two main differences between the state transition model of the proposed scheme and the general EDCA model provided in [26,27]. First, the traffic can transition to end state from any state due to the triggered access, Second, the state-in probability from the start point is no longer uniformly distributed, because of the residual backoff counter after a triggered access.
In Figure 6, R ( z ) denotes the PGF of the transmission sequence duration of a triggered VSTA, and can be obtained as
R ( z ) = P t a z T ω ( 2 ) σ
If an active BSM in service is transmitted via triggered access during the backoff procedure and another active BSM exists in the queue, the next serving BSM can use the residual backoff counter so that the service time can be reduced. Therefore, whether a BSM initiates a backoff procedure or reuses the previous backoff procedure depends on the number of buffered BSM. Using the steady-state probability (7), we can calculate the initial state-in probability for state k, P i n ( k ) , as follows
P i n ( k ) = p q ( 1 ) 1 p q ( 0 ) 1 W + 1 + 1 p q ( 1 ) 1 p q ( 0 ) P r b o ( 0 ) W + 1 + P r b o ( k )
In (20), P r b o ( k ) is the probability that the residual backoff counter of the previous active BSM is k which can be given by
P r b o ( k ) = 1 W + 1 j = 0 W + 1 k P t a ( 1 P t a ) j
Applying Mason’s formula, there exists W + 1 loops in the proposed transition model. Since all loops in the model touch each other at least once, the determinant of the transition model, Δ can be given by
Δ = 1 X ( z ) W + 1 k = 0 W H ( z ) k
For state k, there exists k + 1 paths that exits the system via state k, and each path equally touches the right most W k + 1 loops sharing the same cofactor value of the determinant, Δ k . If we let Δ k be the cofactor value for the paths exiting the system via state k, we have
Δ 0 = 1 Δ 1 = 1 X ( z ) W + 1 Δ 2 = 1 X ( z ) W + 1 ( 1 + H ( z ) ) Δ 3 = 1 X ( z ) W + 1 ( 1 + H ( z ) + H ( z ) 2 ) Δ W = 1 X ( z ) W + 1 k = 0 W H ( z ) k 1
If we denote the sum of gains of all paths with respect to Δ k by G k ,
G 0 = Y ( z ) k = 0 W P i n ( k ) H ( z ) W k G 1 = R ( z ) k = 1 W P i n ( k ) H ( z ) W k G 2 = R ( z ) k = 2 W P i n ( k ) H ( z ) W k G W 1 = R ( z ) k = W 1 W P i n ( k ) H ( z ) W k G W = R ( z ) P i n ( W )
As a result, the PGF of the service time, S ( z ) , can be given by
S ( z ) = k = 0 W G k Δ k Δ
Finally, using the property of PGF, the average service time, S ¯ , can be derived as
S ¯ = 1 μ = S ( z ) | z = 1
According to the Pollaczek–Khintchine mean value formula [41] for M/G/1 queue, the average queuing delay, Q ¯ , can be derived by
Q ¯ = λ P S ( 1 ) + P S ( 1 ) 2 1 λ / μ
Thus, using (25)–(27), the average transmission delay D ¯ can be obtained by
D ¯ = Q ¯ + S ¯

4. Performance Evaluation

In this section, we discuss the performance evaluation of the proposed scheme is discussed. For the performance evaluation of the proposed scheme, an event-driven MAC level simulator has been developed in Matlab which implements IEEE 802.11 EDCA functions and IEEE 802.11ax TUA functions based on the proposed physical layer numerology of IEEE 802.11bd discussed in Section 2.
In the tested scenario, all VSTAs are located on a one-dimensional highway with the total length of 5000 m as depicted in Figure 4, and the performance is measured for the centered 3000 m. It is assumed that the VSTAs are equipped with a Global Positioning System (GPS) and the wireless communication module with parameters shown in Table 1. In the simulation, the rate of successful packet transmission of DTA and the conventional EDCA are compared. As discussed in Section 2, since an ideal physical channel condition is assumed, the packet error rate and the mobility of VSTAs are not considered, the main focus is the performance impact of packet collision given the VSTA density varies from 0.03 to 0.12. Following the typical characteristics of BSM traffic employed in related works [21,26,27,33,42], 200 Bytes payload size and 10 Hz arrival rate BSM traffic is considered to be moderate data traffic in the simulation. In addition, in order to emulate future platooning environments with higher requirements, 400 Bytes payload size and 20 Hz arrival rate BSM traffic is used for the simulation as heavy data traffic. To observe the trade-off between the number of multiplexed VSTAs and the airtime of the TB PPDU, 3 and 9 RUs per one DTA sequence are tested.
Figure 7 shows the active BSM transmission success rate of the proposed scheme that a BSM is transmitted and delivered to all receivers within the PD range. According to the figure, DTA always shows better performance than the legacy 802.11p EDCA scheme as long as the contention window size and the number of scheduled RUs per transmission is large enough. In case of low vehicle density, the proposed scheme guarantees successful delivery for greater than 90% of the generated BSMs, and in the most extreme case, high vehicle density (0.12) and heavy data traffic ( R B S M : 400 B, λ : 20 Hz), DTA successfully transmits more than 20% of the generated BSMs improving the transmission success rate by twice of EDCA performance.
One remark is that as soon as the EDCA channel access intensity dominates the effect of the contention window, the performance degrades fast because the extended duration of TB PPDU makes it more vulnerable from hidden VSTAs transmission. Therefore, setting an appropriate contention window size can be critical to fully exploit the advantages of DTA.
Figure 8 depicts the average BSM collecting delay for which a VSTA collects BSMs of all VSTAs within the PD range. How quickly VSTA can obtain the information of nearby vehicles can be one of the most important performance indicators in BSM dissemination scenario. Figure 8 shows that the proposed scheme greatly improves the collecting delay compare to the conventional scheme especially for extreme condition (high vehicle density 0.12) and heavy data traffic (BSM: 400 B, 20 Hz). In Figure 8b, the delay of the proposed scheme for the highest vehicle density is three times smaller than that of EDCA (0.92 and 2.69 s). Also, the proposed scheme with large contention window (CW: 2048) outperforms EDCA throughout the all measured vehicle density range.
The figure proves that our proposed scheme deals with heavy congestion very well. It is observed that the collecting delay of EDCA scheme increases drastically as the vehicle density increases for heavy traffic case, and the maximum difference of the collecting delay between the moderate traffic case (Figure 8a) and the heavy traffic case (Figure 8b) reaches to 1.9 s. On the other hand, the maximum difference of the proposed scheme remains less than 0.7 s when the contention window size is sufficiently high.
Furthermore, in low vehicle density condition, DTA allows VSTAs to collect all BSMs within very short period (58 ms), even shorter than the arrival rate of BSM (100 ms), since VSTA can obtain multiple BSMs from one TXOP. In EDCA, since BSM cannot be retransmitted, if a VSTA fails to receive a BSM it should wait until the next BSM is generated. For this reason, Thus, if a VSTA experiences consecutive transmission failures, the neighboring VSTAs might lose the tracking information for the VSTA increasing the probability of accident. By transmitting non-active BSM triggered by other VSTA, such problem can be avoided without increasing channel contention overhead.
Figure 9 depicts various performance statistics to provide better understanding on the performance results shown in Figure 7 and Figure 8.
Figure 9a shows that DTA (CW: 2048, RU: 9) tremendously improves the transmission success probability by 0.45 compare to EDCA with the same contention window. Consequently, nevertheless the transmission delay increases, the overall BSM delivery performance can be increased.
Focusing on the delay aspect, the result seems that a major portion of the transmission delay is caused by the queuing delay in high vehicle density case. In case the vehicle density is less than 0.09, since the total transmission delay is less than the packet arrival interval, only a very small amount of queuing delay occurs for all cases (except DTA with smaller contention window). On the other hand, as the transmission delay exceeds the arrival rate, the queuing delay starts increase rapidly. In this case, the increment of the proposed scheme is relatively greater than EDCA, because in DTA, as a transmitting VSTA can detect the failure of a TF by the MU-RTS procedure, it cancels the transmission and keep the serving BSM for new backoff procedure. Despite the increased transmission delay, the improvement of the transmission success probability effectively compensates for the overall performance of the proposed scheme.
When it comes to the number of RUs, the result shows a trade-off between the transmission success probability and the transmission delay. According to Figure 9a,b, DTA with smaller number of RUs shows better performance in terms of transmission success probability due to shorter PPDU duration. On the other hands, DTA with greater number of RUs has shorter transmission delay, as it can serve a greater number of BSMs with one medium contention. Therefore, the number of RUs needs to be optimized based on the characteristics of the target application in real world implementation.
Figure 10 depicts the ratio between DTA and EDCA among successful transmissions. The figure shows that in DTA, the number of EDCA transmission is greatly reduced as the number of RUs for scheduling increases. Even in non-saturated condition, where the vehicle density is low (0.3) and the BSM traffic is high (400 B, 20 Hz), the number of EDCA transmission is decreased by 71% while the total number of transmission success is greatly increased. This incurs that the scheduling of DTA efficiently relieves the channel access intensity of nearby VSTAs. Moreover, under extremely saturated condition (high vehicle density (0.12) and heavy data traffic ( R B S M : 400 B, λ : 20 Hz)), upto 87% of successful transmission is served by triggered access, while the transmission success rate is increased by 94% than legacy EDCA only case. The result proves that the proposed scheme effectively raise the channel use.
Figure 11 shows the portion of active and non-active BSM among successful transmission. The figure shows that non-active BSM takes a large portion of transmission success when the medium is not saturated. As we discussed before, non-active BSM helps VSTAs to collect BSMs much faster. Additionally, this can be advantageous since scheduled RU can be used adaptively depending on the situation. For example, if a platooning scenario requires VSTAs to maintain the neighbor information with short valid time, VSTAs can be configured to transmit non-active BSMs aggressively. On the other hand, if the BSM requirement is not demanding but VSTAs are running multiple applications, the non-active BSM portion can be used to transmit data which is lower prioritized than BSM.
Figure 12 shows the performance impact of the payload size and the arrival rate. Figure 12a depicts the transmission success rate of active BSM with variable payload size. According to the figure, with greater payload size ( R B S M : 400 B), DTA always outperforms EDCA, and the performance gap increases as the vehicle density increases. The result shows that DTA with greater payload size ( R B S M : 400 B) has almost same performance as EDCA with smaller payload size ( R B S M : 200 B).
Figure 12b also shows that DTA provides enhanced performance regardless of the arrival rate. From lower arrival rate case ( λ : 10 Hz), it is observed that DTA and EDCA have similar gradient in low vehicle density region. In such case, the probability that more than one VSTA accesses the channel at the same timeslot is extremely low. Therefore, it is expected that the performance gap is purely caused by the protection of MU-RTS from hidden VSTA. As the vehicle density increases, channel gets busier, so the performance gain from triggered access multiplexing increases as we already discussed in Figure 9.

5. Conclusions

In this paper, we have proposed a novel channel access scheme, Distributed Triggered Access (DTA), for distributed V2V BSM dissemination in future platooning environment.
The proposed scheme is designed based on the 802.11p DSRC standard. Envisioning the ongoing Next Generation V2X WLAN standard, 802.11bd, DTA takes advantage of advanced MAC features of the IEEE 802.11ax standard, such as TUA and MU-RTS, with modified PHY layer frame structure proposed for 802.11bd.
Applying TUA to distributed V2V networks, the proposed scheme allows a VSTA to trigger simultaneous broadcast BSM transmissions from neighboring VSTAs whenever the VSTA grants a TXOP. Since triggered VSTAs can transmit the serving BSM before they finish their backoff procedure, the channel contention intensity can be relieved effectively. By introducing the concept of active/non-active BSM, DTA not only allows a triggering VSTA to maximize the channel use of its TXOP without complicated scheduling procedures, but also allows triggered VSTAs to improve the successful delivery rate of ack-less broadcast BSM frames. In order to protect the long airtime of broadcast multiplexed data, DTA suggests exploiting MU-RTS with reduced overhead.
To analyze the delay characteristics, we have presented the mathematical model of the proposed scheme using Markov chain analysis and M/G/1 queuing model, taking backoff resumption and unsaturated data traffic into account.
The simulation results have shown that DTA outperforms the conventional EDCA in the overall measurement environments. The MU-RTS feature effectively improves the transmission success probability and the triggers access procedure and (non-)active BSM scheduling greatly reduces the average BSM collecting delay especially with highly congested channel condition.

Author Contributions

Conceptualization, W.A.; Data curation, W.A.; Formal analysis, W.A.; Funding acquisition, R.Y.K.; Investigation, W.A. and R.Y.K.; Methodology, W.A.; Project administration, R.Y.K.; Software, W.A.; Supervision, R.Y.K.; Validation, R.Y.K.; Writing—original draft, W.A.; Writing—review & editing, R.Y.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2017R1A2B4003987).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Schrank, D.; Eisele, B.; Lomax, T. Urban Mobility Report; Technical Report February; Texas A&M Transportation Institute: College Station, TX, USA, 2019. [Google Scholar]
  2. Jayakrishnan, R.; Mahmassani, H.S.; Hu, T.Y. An evaluation tool for advanced traffic information and management systems in urban networks. Transp. Res. Part C Emerg. Technol. 1994, 2, 129–147. [Google Scholar] [CrossRef]
  3. Leontiadis, I.; Marfia, G.; Mack, D.; Pau, G.; Mascolo, C.; Gerla, M. On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE Trans. Intell. Transp. Syst. 2011, 12, 1537–1548. [Google Scholar] [CrossRef] [Green Version]
  4. Zambrano-Martinez, J.L.; Calafate, C.T.; Soler, D.; Lemus-Zúñiga, L.G.; Cano, J.C.; Manzoni, P.; Gayraud, T. A Centralized Route-Management Solution for Autonomous Vehicles in Urban Areas. Electronics 2019, 8, 722. [Google Scholar] [CrossRef] [Green Version]
  5. Zambrano-Martinez, J.; Calafate, C.; Soler, D.; Cano, J.C. Towards realistic urban traffic experiments using DFROUTER: Heuristic, validation and extensions. Sensors 2017, 17, 2921. [Google Scholar] [CrossRef] [Green Version]
  6. Hoogendoorn, S.P.; Bovy, P.H. State-of-the-art of vehicular traffic flow modelling. Proc. Inst. Mech. Eng. Part I J. Syst. Control Eng. 2001, 215, 283–303. [Google Scholar] [CrossRef]
  7. Harri, J.; Filali, F.; Bonnet, C. Mobility models for vehicular ad hoc networks: A survey and taxonomy. IEEE Commun. Surv. Tutor. 2009, 11, 19–41. [Google Scholar] [CrossRef] [Green Version]
  8. Nellore, K.; Hancke, G.P. A survey on urban traffic management system using wireless sensor networks. Sensors 2016, 16, 157. [Google Scholar] [CrossRef] [Green Version]
  9. Ma, X.; Yu, H.; Wang, Y.; Wang, Y. Large-scale transportation network congestion evolution prediction using deep learning theory. PLoS ONE 2015, 10, e0119044. [Google Scholar] [CrossRef]
  10. Hamedi, M.; Fish, R.L.W.; Haghani, A. Freeway dynamic message sign evaluation using bluetooth sensors: A case study. In Proceedings of the 17th ITS World Congress, Busan, Korea, 25–29 October 2010. [Google Scholar]
  11. Chakraborty, G.; Naik, K.; Chakraborty, D.; Shiratori, N.; Wei, D. Analysis of the Bluetooth device discovery protocol. Wirel. Netw. 2010, 16, 421–436. [Google Scholar] [CrossRef]
  12. Lees-Miller, J.; Wilson, R.E.; Box, S. Hidden markov models for vehicle tracking with bluetooth. In Proceedings of the 92nd Annual Meeting Transportation Research Board, Washington, DC, USA, 13–17 January 2013. [Google Scholar]
  13. Festag, A. Cooperative intelligent transport systems standards in Europe. IEEE Commun. Mag. 2014, 52, 166–172. [Google Scholar] [CrossRef]
  14. Seo, H.; Lee, K.D.; Yasukawa, S.; Peng, Y.; Sartori, P. LTE evolution for vehicle-to-everything services. IEEE Commun. Mag. 2016, 54, 22–28. [Google Scholar] [CrossRef]
  15. Boban, M.; Kousaridas, A.; Manolakis, K.; Eichinger, J.; Xu, W. Connected roads of the future: Use cases, requirements, and design considerations for vehicle-to-everything communications. IEEE Veh. Technol. Mag. 2018, 13, 110–123. [Google Scholar] [CrossRef]
  16. Kenney, J.B. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
  17. 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2; 3GPP TS 36.300; 3GPP: Valbonne, France, 2017. [Google Scholar]
  18. Swaroop, D.; Hedrick, J.K. Constant spacing strategies for platooning in automated highway systems. J. Dyn. Syst. Meas. Control 1999, 121, 462–470. [Google Scholar] [CrossRef]
  19. Fax, J.A.; Murray, R.M. Information flow and cooperative control of vehicle formations. IEEE Trans. Autom. Control 2004, 49, 1465–1476. [Google Scholar] [CrossRef] [Green Version]
  20. Zheng, Y.; Li, S.E.; Wang, J.; Cao, D.; Li, K. Stability and scalability of homogeneous vehicular platoon: Study on the influence of information flow topologies. IEEE Trans. Intell. Transp. Syst. 2015, 17, 14–26. [Google Scholar] [CrossRef] [Green Version]
  21. Aslam, A.; Santos, P.M.; Santos, F.; Almeida, L. Empirical Performance Models of MAC Protocols for Cooperative Platooning Applications. Electronics 2019, 8, 1334. [Google Scholar] [CrossRef] [Green Version]
  22. SAE. Dedicated Short Range Communications (DSRC) Message Set Dictionary; SAE Std.: Pittsburgh, PA, USA, 2009. [Google Scholar]
  23. IEEE. IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems Local And Metropolitan Area Networks Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments (Amendment to IEEE Std. 802.11-2007 as Amended by IEEE Std. 802.11k-2008, IEEE Std. 802.11r- 2008, IEEE Std. 802.11y-2008, IEEE Std. 802.11n-2009, and IEEE Std. 802.11w-2009); IEEE: Piscataway, NJ, USA, 2010. [Google Scholar]
  24. Ma, X.; Zhang, J.; Wu, T. Reliability analysis of one-hop safety-critical broadcast services in VANETs. IEEE Trans. Veh. Technol. 2011, 60, 3933–3946. [Google Scholar] [CrossRef]
  25. Hafeez, K.A.; Zhao, L.; Ma, B.; Mark, J.W. Performance analysis and enhancement of the DSRC for VANET’s safety applications. IEEE Trans. Veh. Technol. 2013, 62, 3069–3083. [Google Scholar] [CrossRef]
  26. Yao, Y.; Rao, L.; Liu, X. Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE Trans. Veh. Technol. 2013, 62, 4198–4212. [Google Scholar] [CrossRef]
  27. Song, C. Performance analysis of the IEEE 802.11p multichannel MAC protocol in vehicular ad hoc networks. Sensors 2017, 17, 2890. [Google Scholar] [CrossRef] [Green Version]
  28. IEEE. P802.11bd, Project Authorization Request. IEEE Standard Association. 2018. Available online: https://standards.ieee.org/project/802_11bd.html (accessed on 30 December 2019).
  29. IEEE. Draft Standard for Information Technology— Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks— Specific Requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 1: Enhancements for High Efficiency WLAN; IEEE: Piscataway, NJ, USA, 2019. [Google Scholar]
  30. IEEE. P802.11ax, Project Authorization Request. IEEE Standard Association. 2017. Available online: https://standards.ieee.org/project/802_11ax.html (accessed on 30 December 2019).
  31. Ahn, W.; Kim, Y.; Kim, R. An energy efficient multiuser uplink transmission scheme in the next generation WLAN for internet of things. Int. J. Distrib. Sens. Netw. 2016, 12. [Google Scholar] [CrossRef] [Green Version]
  32. Yang, H.; Deng, D.J.; Chen, K.C. Performance Analysis of IEEE 802.11ax UL OFDMA-Based Random Access Mechanism. In Proceedings of the 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  33. Ahn, J.; Kim, Y.Y.; Kim, R.Y. A Novel WLAN Vehicle-To-Anything (V2X) channel access scheme for IEEE 802.11p-based next-generation connected car networks. Appl. Sci. 2018, 8, 2112. [Google Scholar] [CrossRef] [Green Version]
  34. IEEE 1609 Working Group. IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation; IEEE Std.: Piscataway, NJ, USA, 2016; p. 1609-4. [Google Scholar]
  35. Eichler, S. Performance evaluation of the IEEE 802.11 p WAVE communication standard. In Proceedings of the 2007 IEEE 66th Vehicular Technology Conference, Baltimore, MD, USA, 30 September–3 October 2007; pp. 2199–2203. [Google Scholar]
  36. Ma, X.; Chen, X.; Refai, H.H. On the broadcast packet reception rates in one-dimensional MANETs. In Proceedings of the IEEE GLOBECOM 2008—2008 IEEE Global Telecommunications Conference, New Orleans, LO, USA, 30 November–4 December 2008; pp. 1–5. [Google Scholar]
  37. Lee, J.; Kim, W.; Lee, S.J.; Jo, D.; Ryu, J.; Kwon, T.; Choi, Y. An experimental study on the capture effect in 802.11a networks. In Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, WiNTECH ’07, Co-located with the ACM MobiCom 2007 Conference, Montréal, QC, Canada, 10 September 2007; pp. 19–26. [Google Scholar] [CrossRef]
  38. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  39. Dong, X.J.; Varaiya, P. Saturation throughput analysis of IEEE 802.11 wireless LANs for a lossy channel. IEEE Commun. Lett. 2005, 9, 100–102. [Google Scholar] [CrossRef]
  40. Kosek-Szott, K.; Natkaniec, M.; Pach, A. A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions. Comput. Netw. 2011, 55, 622–635. [Google Scholar] [CrossRef]
  41. Gross, D. Fundamentals of Queueing Theory; John Wiley & Sons: Hoboken, NJ, USA, 2008. [Google Scholar]
  42. Zhang, R.; Schmutz, F.; Gerard, K.; Pomini, A.; Basseto, L.; Hassen, S.B.; Jaiprakash, A.; Ozgunes, I.; Alarifi, A.; Aldossary, H.; et al. Increasing traffic flows with dsrc technology: Field trials and performance evaluation. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 6191–6196. [Google Scholar]
Figure 1. Trigger frame format.
Figure 1. Trigger frame format.
Applsci 10 00311 g001
Figure 2. The general format of the proposed TB PPDU.
Figure 2. The general format of the proposed TB PPDU.
Applsci 10 00311 g002
Figure 3. An example of the proposed distributed triggered access scheme.
Figure 3. An example of the proposed distributed triggered access scheme.
Applsci 10 00311 g003
Figure 4. One-dimensional highway model.
Figure 4. One-dimensional highway model.
Applsci 10 00311 g004
Figure 5. Markov chain model for the backoff procedure.
Figure 5. Markov chain model for the backoff procedure.
Applsci 10 00311 g005
Figure 6. The generalized state transition diagram for the proposed scheme.
Figure 6. The generalized state transition diagram for the proposed scheme.
Applsci 10 00311 g006
Figure 7. Active BSM transmission success rate.
Figure 7. Active BSM transmission success rate.
Applsci 10 00311 g007
Figure 8. Average BSM collecting delay.
Figure 8. Average BSM collecting delay.
Applsci 10 00311 g008
Figure 9. Performance statistics in heavy data traffic.
Figure 9. Performance statistics in heavy data traffic.
Applsci 10 00311 g009
Figure 10. Ratio between DTA and EDCA.
Figure 10. Ratio between DTA and EDCA.
Applsci 10 00311 g010
Figure 11. Ratio between active BSM and non-active BSM.
Figure 11. Ratio between active BSM and non-active BSM.
Applsci 10 00311 g011
Figure 12. Performance impact of the payload size and the arrival rate.
Figure 12. Performance impact of the payload size and the arrival rate.
Applsci 10 00311 g012
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Highway length5000 m
Vehicle density ( β )0.03, 0.06, 0.09, 0.12 (vehicle/meter)
PD range ( L p d )300 m
ED range ( L e d )400 m
Triggering range ( L t r )100 m
BSM arrival rate ( λ )10, 20 Hz
Transmission bandwidth10 MHz
11p data subcarrier48 subcarriers
11p OFDM symbol duration8 μs
Number of RUs for DTA3, 9 RUs
11bd data subcarriers per RU72 (9 RUs), 24 (3 RUs)
11bd OFDM symbol duration32 μs
Legacy preamble duration40 μs
11bd preamble duration48 μs
Data rate12 Mbps
Trigger frame MAC payload38 Bytes
CTS frame MAC payload17 Bytes
BSM MAC payload ( R B S M )200, 400 Bytes
Slot time13 μs
SIFS32 μs
AIFS58 μs
Contention window size256, 2048

Share and Cite

MDPI and ACS Style

Ahn, W.; Kim, R.Y. Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks. Appl. Sci. 2020, 10, 311. https://doi.org/10.3390/app10010311

AMA Style

Ahn W, Kim RY. Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks. Applied Sciences. 2020; 10(1):311. https://doi.org/10.3390/app10010311

Chicago/Turabian Style

Ahn, Woojin, and Ronny Yongho Kim. 2020. "Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks" Applied Sciences 10, no. 1: 311. https://doi.org/10.3390/app10010311

APA Style

Ahn, W., & Kim, R. Y. (2020). Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks. Applied Sciences, 10(1), 311. https://doi.org/10.3390/app10010311

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop