Next Article in Journal
Development of a Sequential Injection Analysis System for the Determination of Saccharin
Previous Article in Journal
Consistently Sampled Correlation Filters with Space Anisotropic Regularization for Visual Tracking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

College of Science and Information, Qingdao Agricultural University, Qingdao 266109, China
Sensors 2017, 17(12), 2890; https://doi.org/10.3390/s17122890
Submission received: 7 November 2017 / Revised: 4 December 2017 / Accepted: 6 December 2017 / Published: 12 December 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

1. Introduction

Vehicular Ad Hoc Networks (VANETs) serve as one of the most important wireless communication technologies to implement all kinds of applications related to vehicles, road traffic, drivers, passengers and pedestrians [1]. It is considered that VANETs play an important part of the Intelligent Transportation System (ITS). VANETs consist of a set of vehicles equipped with communication devices, called On Board Units (OBUs), and a set of stationary units along the roads, called Road Side Units (RSUs). Through Vehicle To Vehicle (V2V) and Vehicle To Infrastructure (V2I) communications, vehicles can exchange information to support safety applications, such as emergency brake, cooperative collision avoidance, and automatic notification of crash on roads, and non-safety applications, such as infotainment, Internet access, video streaming, etc. [1,2,3].
IEEE 802.11p protocol [4] has been ratified as a standard to provide Wireless Access in Vehicular Environments (WAVE), which is based on the prioritized Enhanced Distributed Channel Access (EDCA) [5], and can support kinds of ITS applications by providing different level Quality of Service (QoS). The US Federal Communication Commission (FCC) has allocated 75 MHz in the 5.9 GHz band for Dedicated Short Range Communications (DSRC) to be used exclusively for V2V and V2I communications. The overall bandwidth is divided into seven 10-MHz channels, as shown in Figure 1. They include one Control Channel (CCH) for transmitting safety-related messages (e.g., emergency messages and periodic beacon messages) and control messages such as WAVE Service Advertisement (WSA), and six Service Channels (SCHs) for non-safety applications (e.g., comfort and infotainment). IEEE 1609.4 protocol [6] extends Medium Access Control (MAC) layer operation of the IEEE 802.11p and defines a channel switching mechanism to enable to operate efficiently on seven DSRC channels. According to the IEEE 1609.4 protocol, nodes alternately perform the transmissions of safety-related messages on one CCH and the transmissions of non-safety messages on six SCHs during the fixed CCH Interval (CCHI) and SCH Interval (SCHI), respectively. Therefore, based on multichannel architecture, both safety-related and non-safety applications can be supported [7,8].
On the CCH, each vehicle broadcasts two kinds of safety-related messages: periodic beacon and emergency (event-driven) message. Vehicles periodically broadcast beacons to perform cooperative vehicle collision avoidance such as cooperative collision warning and lane change warning [9], and under dangerous situations such as car accidents or emergency brake, the emergency messages will be triggered to disseminate to neighboring vehicles. In addition, the control messages such as WSA messages are also disseminated on the CCH, which are used to perform negotiations and reservations of the SCHs. On the other hand, the non-safety messages are transmitted on the SCHs. The traffic of safety messages has stringent requirements on highly reliable and real-time transmissions, while the non-safety applications require efficient and high throughput. Due to high vehicle mobility, ever-changing vehicle density and the requirements of different level QoS, the alternating feature of multichannel operation specified in the IEEE 1609.4 protocol leads to high packet losses on the CCH and low throughput on the SCHs [10]. Based on the EDCA mechanism, messages have different Access Categories (ACs) in a node with different priorities according to degree of emergency. In this paper, we only consider two types of ACs. Each AC on the CCH is as follows [7,11,12]: (1) A C 0 (with the higher priority) concerns the safety-related messages including periodic beacons and emergency (event-driven) messages; and (2) A C 1 (with the lower priority) concerns the control messages such as WSA messages. In VANETs, the direct broadcast on the CCH is an effective method to inform the neighborhood of safety-related messages. In addition, the reliable and efficient transmissions of WSA messages, as well as the ratio between CCHI and SCHI affect the throughput and utilization of SCHs.
This paper focuses on the performance analysis of the IEEE 1609.4 multichannel MAC protocol including the broadcast of safety-related messages on the CCH and the transmission of non-safety messages on the SCHs under a VANETs environment. We enhance the existing work by taking the following aspects into model considerations.
(1)
We present two Markov chain models under both unsaturated and saturated conditions: one-dimensional Markov chain model for higher priority A C 0 and two-dimensional Markov chain model for lower priority A C 1 to analyze the real-time and reliability of safety-related messages broadcast and the WSA messages unicast on the CCH, respectively. Two M/G/1 queuing models are leveraged to derive more accurate analytical results.
(2)
We take virtual collision, Arbitration Inter Frame Space (AIFS) differentiation, Contention Window (CW), the retry limit, channel switch, and the difference among frame collision probability, frame failure probability, frame blocking probability, and channel busy probability into design consideration.
(3)
We calculate the Packet Reception Rate (PRR) and packet transmission delay by considering the internal virtual collisions, the collisions caused by the concurrent transmissions in the carrier-sensing range and hidden terminal range, and the packet error by fading channel.
(4)
We calculate the throughput of SCHs to analyze the CCH bottleneck problem and the utilization problem of SCHs, and then give the direction of design and research of multichannel in VANETs.

2. Related Works

VANETs are the key components for provisioning safety-critical applications and non-safety (traffic efficient and comfort) applications on the road [13]. VANETs employ multiple channels (seven) to support these services.
The transmissions of safety-related messages are employed broadcast mode on the CCH in VANETs, and there are many works studying the broadcast performance of the safety-related messages. The work in [14] explored a large parameter space to model IEEE 802.11-based 1-D VANETs, which is derived with consideration of the IEEE 802.11 Distributed Coordination Function (DCF), and to analyze the reliability performance of one-hop safety-critical broadcast services in VANETs. Hafeez et al. [15] proposed a Markov chain model to analyze the backoff procedure of beacon and emergency message, and then the probability and throughput of packets are derived and evaluated. In [16], an analytical model for performance and reliability of safety message broadcasting was proposed. The model takes into account the vehicles’ high mobility, hidden terminal problems, the transmission collisions from neighboring vehicles, and the channel fading in VANETs. The simulation and analytical results show that the model is pretty accurate in evaluating the system reliability. In [17], an analytical model for delivering DSRC safety messages within V2V communication was proposed. Two Markov chains for different priority ACs are established to analyze the delay distribution of the safety message broadcast. Yao et al. [18] proposed two Markov chains to study the performance and the reliability of the IEEE 802.11p safety communication on the CCH. Safety-related messages are classified as four ACs with different priorities based on the degree of emergency. The PRR and packet delay are detailed analysis by taking virtual collisions, AIFS differentiation, the retry limit and the difference among frame blocking probability, frame collision probability and channel busy probability into considerations.
Some works study the safety service performance in VANETs under multichannel conditions. Campolo et al. in [19,20] analyzed the performance of periodic broadcasting of beacons and WSAs in the IEEE 802.11p by joint the feature of multichannel switch and the prioritization of messages broadcast on the CCH. The model calculates packet delivery probability as a function of CW and the number of vehicles and quantitatively characterizes the negative impact of channel switching on the performance of VANETs. An analytical model on the basis of interacting semi-Markov process which incorporates the influence of multichannel operation was designed to assess both MAC and application level performance and reliability of safety messages [21]. An optimized scheduling method was proposed to avoid synchronization collision, and channel fading is considered in the model to simulate practical communication environments. The mean transmission delay, PRR and awareness probability are derived. The work in [22] introduced a stochastic model to evaluate the delivery performance of event-driven safety messages by considering the traffic differentiation, event-driven messages lifetime, channel switching and channel error. Analytical and simulation results show that the larger CCHI can bring higher the successful delivery probability of event-driven messages.
Nevertheless, all above performance analysis are modeled for only safety-related messages on CCH, and performance of non-safety messages is not discussed. In VANETs, driven by both safety concerns and commercial interests, one of the key services offered by VANETs is popular content distribution [23,24]. The interval used to transmit safety messages at each synchronization interval is a critical parameter that directly impacts and limits the SCHI for transmitting non-safety messages [24]. The unique characteristics of the VANETs, such as highly dynamic topology, ever-changing vehicle density, unstable and variable nature of wireless links, make multichannel synchronization, coordination and access particularly challenging [25]. Wang and Hassan in [26] proposed a methodology to derive the CCHI according to requirements of safety applications, and they have analyzed the share of non-safety applications as the function of safety performance requirements and traffic density. They have found that, under high density vehicular network environments, the non-safety applications may have to be severely restricted. Misic et al. [27] investigated the performance of networks built from single-channel devices in vehicular environments. Analysis and simulation results show that channel switching causes synchronization of backoff processes, which increases the frame collision probability, in particular for small sizes of contention windows. In [28], Xiong et al. studied the relationship among the number of vehicles, packets loss ratio on the CCH, throughput of SCHs, and the duration of CCHI and SCHI. Through simulation and analysis, they found that the switch operation between fixed CCHI and SCHI cannot satisfy reliability requirement of safety applications on the CCH and high throughput requirement of non-safety applications on the SCHs. They introduce a multichannel coordination algorithm to adaptively adjust the ratio between CCHI and SCHI to achieve better performance. However, these models do not consider the effect of combined virtual collisions, fading channel and hidden terminal problem on the performance of safety and non-safety services, and these parameters are the main factors affecting the performance of the these two applications.
In this paper, we propose two analytical models for the analysis of safety and non-safety service in the IEEE 802.11p multichannel MAC protocol, taking into account virtual collisions, the retry limit, channel switch, concurrent collisions, hidden terminal problem, channel fading, unsaturated conditions, and the difference among frame collision probability, frame failure probability, frame blocking probability, and channel busy probability. We derive the transmission delay and PRR of safety-related messages to analyze the timeliness and reliability of safety-related messages transmission, and derive the throughput of non-safety messages to analyze the effectiveness of non-safety messages transmission and the utilization of SCHs. The impact of virtual collisions, channel switch, concurrent collisions, hidden terminal problem, channel fading and the length of CCHI and SCHI are evaluated by provide deeper understandings on how various factors influence safety and non-safety message delivery. The simulation and analysis results can be used to guide design of adaptive multichannel protocol in VANETs. To the best of our knowledge, this is the first attempt to model the IEEE 802.11p multichannel MAC protocol to jointly analyze the transmission delay and PRR on the CCH, and the throughput and utilization of SCHs by considering the most influential factors. The detailed comparison of different models is given in Table 1.

3. Background

In this section, the relevant aspects of the IEEE 802.11p and IEEE 1609.4 protocols are illustrated.

3.1. MAC Sublayer in IEEE 802.11p

The IEEE 802.11p protocol employ EDCA mechanism in IEEE 802.11e [5] for contention-based prioritized QoS support. According to EDCA mechanism, a station (node) can implement up four ACs with different priorities corresponding to voice, video, best effort and background traffic. Each AC has an independent MAC queue entity, which can be identified by a set of distinct channel access parameters, including CW, AIFS and Arbitrary Inter-Frame Space Number (AIFSN[AC]). The AIFSN[AC] is used to determine the duration of AIFS[AC] according to
AIFS [ AC ] = S I F S + AIFSN [ AC ] × σ
where AIFSN[AC] 2 corresponds to Distributed Inter-Frame Space (DIFS) of IEEE 802.11, and S I F S and σ represent the duration of a Short Inter-Frame Space (SIFS) and a slot time, respectively. The default EDCA parameters setting for ACs in IEEE 802.11p is shown in Table 2 where A C 0 corresponds to the highest priority and A C 3 corresponds to the lowest priority.
The operation of IEEE 802.11e EDCA backoff procedure described in [5] is illustrated in Figure 2. Each station has four AC queues acting as four independent stations. Note that, in this paper, we only consider two types of ACs. Each frame from the higher layer arrives at the MAC layer with a specific priority value, and enters a specific queue. The EDCA mechanism relies on the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) technique to contend and access channel which a station must probe the channel before transmission to determine whether it is busy or idle. On one hand, if only one AC queue has backlogged data at a time in a station, and the station will sense the channel idle for the duration of AIFS[AC] as in Equation (1) before attempting to transmit it. If the channel is sensed as busy, then the station defer its transmission of an additional backoff interval. The backoff interval is calculated as a random number of slot times uniformly selected from [0, CW[AC]]. At the first transmission attempt, the backoff interval for an AC in EDCA is randomly selected from [0, CWmin[AC]], and it is doubled at every retransmission with an upper limit equal to CWmax[AC]. The smaller is AIFS[AC] or CWmin[AC], the higher is the priority in channel access. On the other hand, since each station has four different AC queues, there is a probability that more than one AC queue initiates a transmission at the same time. Therefore, an internal collision occurs inside a station, also called virtual collision. We will discuss this issue in detail in Section 4.2.

3.2. IEEE 1609.4 Standard

The IEEE 1609.4 standard (protocol) is the standard of multichannel operation in VANETs. In the IEEE 1609.4 protocol, the channel time is divided into multiple Synchronization Intervals (SIs) with a fixed length of 100 ms for each SI. An SI consists of a 50 ms CCHI and a 50 ms SCHI as shown in Figure 3. Each CCHI and SCHI begins with a 4 ms guard interval which is allowed for nodes switch among channels, and it is used for precise synchronization among different nodes. All vehicles need tune to CCH during the CCHI for the transmissions of safety-related messages or WSA messages, while during the SCHI, vehicles can optionally tune to the specific SCH to deliver non-safety messages. Periodical and synchronous switching (alternating) between CCH and SCH is mandatory for single-radio transceivers and operates on one radio channel at a time.
Due to high vehicle mobility and ever-changing vehicle density, the current version of the IEEE 1609.4 standard dose not provide high QoS guarantee [7,11,30]. On the one hand, for safety-related messages, due to the mandatory channel switching and fixed duration of CCHI and SCHI specified in the IEEE 1609.4 standard, vehicular networks suffer from low reliability especially in situations of high vehicle density. On the other hand, when the traffic is sparse but heavy non-safety messages such as digital map and media downloading are required, the CCH only needs a little time to transmit a small amount of safety-related messages, and thus, the CCHI may be left idle for a significant periods of time. On the contrary, the 50 ms SCHI is not enough to transmit bulk non-safety messages. These conditions will lead to low throughput and underutilization of SCHs.
In addition, since, in the IEEE 1609.4 standard, nodes cannot specifically determine the starting time of their transmission on the SCH during the negotiation process on the CCH, there may be collisions on the SCHs. In our next analysis, we relax this condition, and assume that nodes can determine the starting time of their transmission on SCHs after their negotiation on the CCH. Base on this assume, we analyze the performance of the IEEE 1609.4 multichannel MAC protocol under a variety of vehicular environments.

4. Analytical Model and Performance Analysis

In this section, we propose an analytical model. The proposed analytical model takes two kinds of messages with different priorities, different packet arrival rate, unsaturated conditions, hidden terminal problem, channel switch, channel fading into account. The main symbols together with their significances used in our analytical model are given in Table 3.
To give a tractable yet reasonable model to characterize the performance of the IEEE 802.11p multichannel MAC protocol, we give some definitions and assumptions.

4.1. Definitions and Assumptions

In this paper, the IEEE 802.11p and IEEE 1609.4 protocols work under highway scenario with one lane in each direction, as shown in Figure 4. However, we can easily extend our analysis with the M l n -lanes in each direction on the highway by multiplying M l n by the N t r , N c s and N i n t , respectively. Since the communication range is much larger than the road’s width, we simplify the network in each direction as one-dimensional VANETs.
The specific work environment is as follows:
Assumption 1 (Poisson distribution of vehicles on road).
Statistic analysis of the empirical data in [31] proves that an exponential distribution is a good fit for highway vehicle traffic according to inter-vehicle distance. Assuming that the vehicle nodes are placed on the line according to a Poisson point process with network density β (in vehicles per meter), the probability of j vehicles existing within length l, P ( j , l ) , is given by
P ( j , l ) = ( β l ) j e β l j !
Definition 1 (Transmission/receiving range).
The transmission/receiving range R of a node represents the range within which a packet can be successfully received, if there exists no collisions from other nodes. R mainly depends on the transmission power, the data transmission rate and channel propagation characteristic. The average number of nodes within R of a tagged node, N t r , can be given by
N t r = 4 β R
Definition 2 (Carrier-sensing range).
The carrier-sensing range L c s denotes the range within which a node can detect other nodes’ transmission. It is usually determined by the transmission power and antenna sensitivity. Give the tagged node is in origin, as shown in Figure 4, as long as the nodes in [ L c s , L c s ] are transmitting, the tagged node will not initiate any transmission at that moment. The average number of nodes within carrier-sensing range of a tagged node, N c s , can be given by
N c s = 4 β L c s
Definition 3 (Interfering range/hidden terminal range).
The interfering range L int is the range within which nodes in a receiving mode interfere with transmissions from other nodes. The nodes’ transmissions in [ 2 R , L c s ] and [ L c s , 2 R ] cannot be detected by the tagged node, but interfere with the packets receiving of nodes in [ R , R ] from the tagged node. The number of hidden terminal of a tagged node, N int , can be given by
N int = 4 β ( 2 R L c s )
In this paper, the capture effect is not considered, and all nodes have the same R, L c s and L int .
Assumption 2 (Poisson way of packet arrival rate).
The generated packets arrive at the MAC layer in a Poisson way with rate λ. According to the IEEE 1609.4 protocol [6], the safety packets and WSA packets are sent on the CCH only during the CCHI. If the packets are generated during the SCHI, they have to wait in the MAC layer queues until the next CCHI to be transmitted. At the beginning of the next CCHI, many nodes contending the CCH, which may lead to synchronized collision [20]. To avoid synchronized collision, the considered application layer has to schedule these packets to arrive at the MAC layer queue by delaying 50 ms (a CCHI). Therefore, in this paper, the synchronized collision issue is not considered. Each node has two queues for each AC: CCHI queue and SCHI queue. CCHI queue is for the packets arriving at the MAC layer during the CCHI, and SCHI queue is for the packets arriving at the MAC layer during the SCHI. For each AC, these two queues have the same arrival rate λ. The sum of two independent Poisson processes with rate λ is the Poisson process with rate 2 λ . Therefore, the packets arrival rate for safety traffic and WSA traffic during the CCHI are 2 λ e and 2 λ s , respectively.
Assumption 3 (Unlimited length of queue).
Each AC has two independent queues (CCHI queue and SCHI queue) at the MAC layer with unlimited length for each, which means that the packet dropping caused by the queue overflow is not taken into consideration. These two queues can be considered one virtual queue with rate 2 λ . Therefore, each node have two virtual M/G/1 queues with a common server: one virtual queue for safety packets and the other virtual queue for WSA packets, as shown in Figure 5. To simplify, the following queues refer to virtual queues.
Assumption 4 (Erroneous channel Bit Error Rate (BER)).
In VANETs, V2V communications present environment with unfavorable characteristic of channel fading, i.e., multiple reflecting objects able to degrade the strength and quality of the received signal. In addition, high mobility makes worse Doppler spread on Orthogonal Frequency Division Multiplex (OFDM), which leads to higher BER. To simply the discuss, we follow the similar assume in [32] that control packet such as Acknowledgement (ACK) packet and frame headers (the header of both physical layer and MAC layer) of both safety and WSA packet are error free. The channel fading leads to packet error probability P e , e r r and P s , e r r for a safety packet and a WSA packet, respectively, which can be given by
P e , e r r = 1 ( 1 p b e r ) E [ L e ] P s , e r r = 1 ( 1 p b e r ) E [ L s ]
where p b e r , E [ L e ] and E [ L s ] denote the probability of BER, the average payload of a safety packet and the average payload of a WSA packet, respectively. p b e r can be numerically evaluated for a Rician fading channel [33] or Nakagami-m fading channel [34].
Assumption 5 (Neglecting the impact of vehicle mobility on the performance).
The impact of vehicle mobility on reliability, timeliness and throughput are not considered in the model. In fact, it is illustrated in [35] that the high mobility of vehicles (up to 120 km/h) has a very small impact on the performance of the direct packet transmission with high data rate (e.g., ≥ 12 Mbps/s). In addition, the number of one-hop neighboring nodes of a tagged node does not significantly change in the short time span of our interest (a CCH interval) [36]. For example, in 50 ms, when vehicles travel in the same direction, vehicles move a very few meters forward (typically, less than 1 m in a city and less than 2 m on a highway). Even considering vehicles moving in opposite directions, for example, on a highway, vehicles travelling at 130 km/h move 3.6 m apart in 50 ms.
We also assume that transmission rate on the CCH and SCHs are constant and are the same. The non-safety messages on the SCHs have the same size, which means that all the non-safety messages occupy the same length of transmission time.

4.2. Virtual Collision Handing in EDCA

According to the specification in IEEE 1609.4 standard [6], each station has four AC queues (virtual queues) acting as four independent virtual stations. Each frame is mapped into an AC queue with a specified priority. When more than one AC queue (virtual queue) of a station initiates a transmission at the same time, the virtual collision occurs. The frame with highest priority is scheduled and transmitted, and the frames with lower priorities enter another backoff stage with doubled CW immediately. If the number of the retransmissions reaches the retry limit, the packet will be dropped. Note that we only discuss two kinds of packets such as safety-related packet with higher priority mapped into A C 0 queue and WSA packet with lower priority mapped into A C 1 queue on the CCH in this paper, as shown in Figure 5 . Each virtual queue corresponding to one AC i ( i [ 0 , 1 ] ) , and the packets are coming from two queues: CCHI queue and SCHI queue.
Collision may occur among different ACs in the same station (node) called virtual collision, and collision may occur among different nodes called external collision [37]. Let P i , v c represent the virtual collision probability of an i ( i [ e , s ] ) (i.e., e and s denote safety-related and WSA, respectively, and the following is the same) packet, and P o c represent external collision probability. Therefore, the collision probability of an i ( i [ e , s ] ) packet, P i , c , can be expressed as
P i , c = P i , v c + ( 1 P i , v c ) P o c
Let τ i be the internal transmission probability that the probability of transmission attempt for access class i ( i [ e , s ] ) in a random time slot observed by the other ACs inside a station. A virtual collision occurs if there are higher priority ACs attempt to transmit in the same station, we have
P e , v c = 0 P s , v c = τ e
Let η i be the external transmission probability that the probability of transmission attempt for access class i ( i [ e , s ] ) observed by other stations. η i can be expressed by
η e = τ e ( 1 P e , v c ) = τ e η s = τ s ( 1 P s , v c ) = τ s ( 1 τ e )
Therefore, the total transmission probability of a station, η t o t a l , is calculated by
η t o t a l = η e + η s
For a tagged vehicle, if one of the following conditions is not satisfied, the external collision occurs: (1) when the tagged vehicle is transmitting, no vehicles within its carrier-sensing range delivery packets at the same time slot; and (2) when the tagged vehicle is transmitting, no hidden terminals start transmission during the vulnerable period T v u l n [18,38,39], as shown in Figure 6. Each hidden terminal has chance to fail the transmission of the tagged vehicle to the target vehicle: the tagged vehicle starts sending while a hidden terminal is transmitting, or a hidden terminal starts sending while the tagged vehicle is transmitting. The vulnerable period T v u l n is the duration that, during this period, a collision caused by hidden terminals could happen, and it is the interval from the time instance when a hidden terminal is involved in an ongoing communication before the tagged vehicle starts its transmission to the time instance when the tagged vehicle completes its transmission. Therefore, T v u l n consists of two parts: packet transmission time of the hidden terminal and packet transmission time of the tagged vehicle. Let T e ( T s ) and E [ L e ] ( E [ L s ] ) denote the transmission delay and the average payload of a safety (WSA) packet, respectively, we have
T e = H P H Y + H M A C + E [ L e ] R d + δ T s = H P H Y + E [ L s ] R d + δ
where R d , H M A C , H P H Y and δ denote the transmission data rate on the CCH, the header length of MAC-layer, the header length of physical-layer and the propagation delay, respectively. Because there are two kinds of packets (safety-related packet with broadcast mode and WSA packet with unicast mode on the CCH), T v u l n can be calculated by [38]:
T v u l n = 2 · max ( T e , T s )
Therefore, the external collision probability P o c is calculated by
P o c = 1 k = 0 ( 1 η t o t a l ) k ( N c s 1 ) k k ! e ( N c s 1 ) × k = 0 ( 1 η t o t a l ) k N int k k ! e N int T v u l n / T v i r t = 1 e ( N c s 1 ) η t o t a l e N int η t o t a l T v u l n / T v i r t
where T v i r t denotes the average duration of a virtual time slot [40], and the expression is given in Equation (37).

4.3. Markov Chain for Safety-Related Message and WSA Message

In our analytical model, each EDCA node can deliver two kinds of messages on the CCH: A C 0 and A C 1 corresponding to safety-related message and WSA message, respectively. Due to the broadcast mechanism of the transmission of the safety-related message without ACK, the sender cannot detect the external collision, and thus no retransmission will be trigged by the external collision. Therefore, the backoff procedure of safety-related message is modeled as a one-dimensional Markov chain, as shown in Figure 7a. On the other hand, the nodes use a pair of control messages such as WSA and ACK to perform negotiations on the CCH, and retransmission will be trigged due to the missing ACK. Thus, a two-dimensional Markov chain model is utilized to analyze the backoff procedure of WSA message, as shown in Figure 7b. We use Figure 7a,b to obtain the stationary internal probability τ e and τ s , respectively. In our analytical model, unsuccessful transmission happens in two cases: (1) transmission collision due to virtual (internal) collision with the higher AC inside the same station or due to external collision with other stations; and (2) transmission error due to the unfavorable channel fading. We assume that the transmission collision or transmission error is constant and independent of the number of collisions or the number of errors of this packet has suffered in the past.
Probabilities used in two Markov chain models are listed as follows:
P i , arr : The arrival probability of i ( i [ e , s ] ) packets. We assume that the generated packets arrive at the MAC queues follow Poisson distributions, and the probability of receiving at least one packet in a virtual slot T v i r t is:
P i , a r r = 1 e 2 λ i T v i r t
P i , emp : The probability of i ( i [ e , s ] ) queue being empty. P i , e m p can be calculated by:
P i , e m p = 1 ρ i
where ρ i is the probability that at least one packet stays in i ( i [ e , s ] ) queue, and it also stands for the busy probability of server for i queue. ρ i can be derived by:
ρ i = 2 λ i i [ e , s ] μ i
where μ i is the average service rate of virtual i ( i [ e , s ] ) queue (in terms of packets per second).
P i , b : The backoff blocking probability (i.e., frame blocking probability defined in [18]). If a node senses the channel is busy due to other nodes or the other AC queues in the same node occupying the channel, the backoff timer is frozen (suspended). We have [37]
P i , b = 1 [ k = 0 ( 1 η t o t a l ) k ( N c s 1 ) k k ! e ( N c s 1 ) · j [ e , s ] j i ( 1 τ j ) ] AIFSN [ i ] AIFSN [ 0 ] + 1 = 1 e ( N c s 1 ) η t o t a l · j [ e , s ] j i ( 1 τ j ) AIFSN [ i ] AIFSN [ 0 ] + 1
Note, in term AIFSN[i], i = e denotes AIFSN[0], and i = s denotes AIFSN[1].
P i , f : The transmission failure probability of an i ( i [ e , s ] ) packet. A successful packet transmission occurs only if there no collision and no bit error during the transmission attempt. Therefore, P i , f can be derived as [32,41]:
P i , f = 1 ( 1 P i , c ) ( 1 P i , e r r )
Note that the interpretation of P i , f ( i [ e , s ] ) is different from p in [29], as it also accounts for the possibility of unsuccessful transmission caused by bit errors.
P s , drop : The probability that a WSA packet is dropped due to more than retransmission limit m. It can be calculated by
P s , d r o p = P s , f m + 1
P busy : The channel busy probability. The channel sensed busy means that there is at least one node transmitting any type of packets in the carrier-sensing range L c s . Thus, P b u s y can be calculated by
P b u s y = 1 k = 0 ( 1 η t o t a l ) k N c s k k ! e N c s = 1 e η t o t a l · N c s
We analyze both one-dimensional and two-dimensional Markov chains to find the one-step transition probabilities. Let b e ( t ) denote a stochastic process representing the backoff timer value of safety traffic at time t. Since the transmission mode of safety packets is broadcast without backoff stages, so the fixed CW is denoted by W e . The state of safety packet is described by k ; k [ 0 , W e 1 ] . I e , i d l e stands for an idle state of an EDCA node with an empty safety queue. The stationary distribution of the idle state and the backoff state k are denoted by b I e and b e , k , respectively. According to Figure 7a, the one-step transition probabilities are:
P k | k + 1 = 1 P e , b 0 k W e 2 P k | 0 = 1 P e , e m p W e 0 k W e 1 P k | k = P e , b 0 k W e 1 P I e , i d l e | 0 = P e , e m p P I e , i d l e | I e , i d l e = 1 P e , a r r P k | I e , i d l e = P e , a r r W e 0 k W e 1
The meaning of each line in Equation (21) is as follows:
(1)
If the channel is idle, the backoff timer subtracts one.
(2)
If the backoff timer value is zero and the queue is not empty, then the backoff timer is initially uniformly chosen in [0, W e 1 ].
(3)
If the channel is sensed busy, the backoff timer is frozen.
(4)
If the backoff timer value is zero and the queue is empty, the node is under idle state.
(5)
If no packets are to be sent in the queue and no generated packet arrives at the queue, then the node stays in the idle state.
(6)
If the queue is empty, a new arriving packet makes the backoff timer uniformly chosen in [0, W e 1 ].
The backoff process of WSA traffic with A C 1 is modeled as a two-dimensional Markov chain with discrete-time evolved from [7,18,29,37,41,42,43], as shown in Figure 7b. Let s ( t ) and b ( t ) be a stochastic process standing for the backoff stage and backoff timer of WSA traffic, respectively. Let the state I s , i d l e represent that the A C 1 queue of an EDCA node is empty. The maximum retransmission number and the CW in the ith backeoff stage are denoted by m and W s , i ( i [ 0 , m ] ), respectively. CW is set to the minimum value W s , 0 for the first transmission attempt. When collision is detected, CW is doubled and then retransmission is started for the first m steps. While the CW remains unchanged for ( m m ) steps. To sum up, if W s , i is the CW size in the ith step:
W s , i = 2 i W s , 0 2 m W s , 0 i m m < i m
Let b s , i , k = lim t s ( t ) = i , b ( t ) = k , 0 i m , 0 k W s , i 1 be the stationary distribution of the chain of WSA traffic in Figure 7b. The stationary distribution of the idle state and the backoff state are denoted by b I s and b s , i , k , respectively. The one-step transition probabilities are:
P i , k | i , k = P s , b 0 k W s , i 1 , 0 i m P i , k 1 | i , k = 1 P s , b 1 k W s , i 1 , 0 i m P i , k | i 1 , 0 = P s , f W s , i 0 k W s , i 1 , 1 i m P s , f W s , m 0 k W s , m 1 , m < i m P 0 , k | i , 0 = ( 1 P s , f ) ( 1 P s , e m p ) W s , 0 0 k W s , 0 1 , 0 i m 1 1 P s , e m p W s , 0 0 k W s , 0 1 , i = m P 0 , k | I s , i d l e = P s , a r r W s , 0 0 k W s , 0 1 P I s , i d l e | i , 0 = ( 1 P s , f ) P s , e m p 0 i m 1 P s , e m p i = m P I s , i d l e | I s , i d l e = 1 P s , a r r
The meaning of each line in Equation (23) is as follows:
(1)
If the channel is busy, the backoff timer is frozen.
(2)
If the channel is free, the backoff timer will subtract one.
(3)
Within m backoff stage, transmission failure makes backoff stage increase and CW double. Otherwise, transmission failure makes CW remain 2 m W s , 0 .
(4)
If a WSA packet is successfully transmitted or a WSA packet reaches its maximum retransmission number m, backoff stage is reset.
(5)
If an EDCA node is in state I s , i d l e , a new arrived WSA packet makes it enter backoff stage 0, and then node uniformly chooses backoff timer value in [0, W s , 0 1 ].
(6)
After every successful transmission of the WSA packet or a WSA packet reaches its maximum retransmission number m, an EDCA node enters state I s , i d l e with a probability of P s , e m p .
(7)
Without a new WSA packet arriving, an EDCA node’s idle state I s , i d l e remains unchanged.
According to the Markov chain regularities in the steady state, we derive the following relationships:
b e , k = W e k W e ( 1 P e , b ) b e , 0 , 1 k W e 1 b I e = P e , e m p b e , 0 + b I e ( 1 P e , a r r )
b s , i , k = W s , i k W s , i ( 1 P s , b ) b s , i , 0 = 2 i W s , 0 k 2 i W s , 0 ( 1 P s , b ) b s , i , 0 , 0 i m , 1 < k W s , i 1 2 m W s , 0 k 2 m W s , 0 ( 1 P s , b ) b s , i , 0 , m < i m , 1 < k W s , i 1 b I s = ( 1 P s , f ) P s , e m p i = 0 m 1 b s , i , 0 + P s , e m p b s , m , 0 + b I s ( 1 P s , a r r ) b s , i 1 , 0 P s , f = b s , i , 0 b s , i , 0 = P s , f i b s , 0 , 0 , 0 < i m
According to the stationary distribution of the Markov chain, we express the total probability as:
b I e + k = 0 W e 1 b e , k = 1
b I s + i = 0 m k = 0 W s , i 1 b s , i , k = 1
Using Equations (24) and (26), internal transmission probability τ e of a safety-related packet in a randomly slot time is
τ e = b e , 0 = W e 1 2 ( 1 P e , b ) + P e , e m p + P e , a r r P e , a r r 1
Combining Equations (25) and (27), we get
b s , 0 , 0 = [ W s , 0 1 ( 2 P s , f ) m + 1 2 ( 1 P s , b ) ( 1 2 P s , f ) 1 P s , f m + 1 2 ( 1 P s , b ) ( 1 P s , f ) + P s , e m p P s , a r r + 1 P s , f m + 1 1 P s , f ] 1 , m m W s , 0 1 ( 2 P s , f ) m + 1 2 ( 1 P s , b ) ( 1 2 P s , f ) + 2 m W s , 0 ( P s , f m + 1 P s , f m + 1 ) + P s , f m + 1 1 2 ( 1 P s , b ) ( 1 P s , f ) + P s , e m p P s , a r r + 1 P s , f m + 1 1 P s , f ] 1 , m > m
As any transmission occurs when the backoff timer is equal to zero, regardless of the backoff stage, the internal transmission probability τ s that a node transmits a WSA packet in a random time slot can be given by
τ s = i = 0 m b s , i , 0 = i = 0 m P s , f i b s , 0 , 0 = 1 P s , f m + 1 1 P s , f b s , 0 , 0
Now, we calculate average virtual slot T virt [40]. Let T e , s u c ( T e , c o l ) and T s , s u c ( T s , c o l ) denote the time of successful transmission (transmission collision) of a safety packet and the time of successful reservation (transmission collision) of a WSA packet, respectively. Due to our Assumption 4 in Section 4.1, the time for transmission collision equals to the time for transmission bit error, and thus, for simplification, T e , c o l ( T s , c o l ) also denotes the time for transmission bit error of safety (WSA) packet. We have
T e , s u c = T e , c o l = T e + AIFS [ 0 ]
T s , s u c = T s + AIFS [ 1 ] + S I F S + T A C K + δ T s , c o l = T s + AIFS [ 1 ]
where L A C K and T A C K = E [ L A C K ] / R d denote the packet size of an ACK packet and the time for transmitting an ACK packet, respectively.
Let P e , s u c v and P s , s u c v be the probability that the transmission attempt of an safety packet and a WSA packet are successful, respectively, which have no collisions caused by: the transmissions of higher ACs within the same station, concurrent transmissions of the other stations within the sensing-carrier range, the hidden terminal problem and the packets dropped due to more than retransmission limit for WSA packet, conditioned on the fact that at least one station transmits in the considered time slot. By definition,
P e , s u c v = N t r × η e × k = 0 ( 1 η t o t a l ) k ( N c s 1 ) k k ! e ( N c s 1 ) P b u s y × k = 0 ( 1 η t o t a l ) k N int k k ! e N int T v u l n / T v i r t = N t r × η e × e η t o t a l ( N c s + N int T v u l n / T v i r t 1 ) P b u s y P s , s u c v = N t r × η s × k = 0 ( 1 η t o t a l ) k ( N c s 1 ) k k ! e ( N c s 1 ) P b u s y × k = 0 ( 1 η t o t a l ) k N int k k ! e N int T v u l n / T v i r t × ( 1 P s , d r o p ) = N t r × η s × e η t o t a l ( N c s + N int T v u l n / T v i r t 1 ) P b u s y × ( 1 P s , d r o p )
Let P c o l be the probability that a transmission fails due to a collision given that there is at least one other station transmits in the considered time slot, we have [37]
P c o l = P b u s y P b u s y i [ e , s ] P i , s u c v
Based on our Assumption 4 in Section 4.1, there are six types of virtual slots : empty slots (all nodes are in backoff procedure or idle), safety packet error slots, successful transmitting safety packet slots, WSA packet error slots, successful transmitting WSA packet slots, collision slots from only emergency packets, only WSA packets or both, and let T 1 , T 2 , T 3 , T 4 , T 5 and T 6 be the duration, let P 1 , P 2 , P 3 , P 4 , P 5 , and P 6 be the probabilities, corresponding to the above slots, respectively. Their durations and probabilities are expressed by Equations (35) and (36), respectively.
T 1 = σ T 2 = T e , c o l T 3 = T e , s u c T 4 = T s , c o l T 5 = T s , s u c T 6 = max ( T e , c o l , T s , c o l )
P 1 = 1 P b u s y P 2 = P b u s y P e , s u c v 1 1 p b e r E [ L e ] P 3 = P b u s y P e , s u c v 1 p b e r E [ L e ] P 4 = P b u s y P s , s u c v 1 1 p b e r E [ L s ] P 5 = P b u s y P s , s u c v 1 p b e r E [ L s ] P 6 = P c o l
Therefore, T v i r t can be expressed as
T v i r t = i = 1 6 P i T i
Using Equations (2)–(15), (17)–(20), (22) and (28)–(37), variables τ e , τ s , P e , b , P s , b , P e , f and P s , f can be solved by the numerical methods as in [29], where 0 < τ e , τ s , P e , b , P s , b , P e , f , P s , f < 1 .
Our Markov chain models are derived from the fundamental developments of the models by Giuseppe Bianchi [29], and extend the Bianchi’s models to prioritized scheme by introducing multiple ACs with distinct parameters setting. Moreover, we also take into account virtual collisions, the retry limit, channel switch, channel fading, unsaturated conditions, and the difference among frame collision probability, frame failure probability, frame blocking probability, and channel busy probability.
Note that if P e , e m p = 1 ρ e = 1 or P s , e m p = 1 ρ s = 1 , it means that there is no packet to transmit and it is the extreme unsaturated condition. This is similar to the Markov chain model proposed in [17,18] under bit error free conditions. On the other hand, if P e , e m p = 1 ρ e = 0 or P s , e m p = 1 ρ s = 0 , it implies that there is always packet to transmit and it is the saturated condition. This is similar to the Markov chain model proposed in [37] under saturation and bit error free conditions. Thus, our model covers the extreme unsaturated, intermediate unsaturated, and saturated conditions by taking the queuing status ( P e , e m p , P s , e m p ) into account. The value of P e , e m p and P s , e m p will be derived later in the next section. Besides, our proposed analytical model considers the impact of bit error caused by fading channel which is an unfavorable characteristics of VANETs due to highly mobility of vehicles and constantly changing topology of vehicular network [44].

4.4. Performance Analysis

4.4.1. Packet Transmission Delay

Definition 4 (Packet transmission delay).
The packet transmission delay is the time duration between the time instant that a packet arrives at the queue and the time instant that this packet is successful transmitted or dropped. There are two cases for packet dropped: on case is that for a safety packet, the packet is dropped due to expiration. The other case is that a WSA packet is dropped due to reaching the maximum retransmission number.
Due to the channel switching, each packet arriving at the MAC queue during SCHI has to wait, until the end of SCHI to be transmitted. Since the time of packets arriving at the MAC queue is random, the delay in the SCHI can be approximated by half of SCH interval. On the other hand, when a node contends for CCH (a common server) to transmit a packet during the CCHI, the average transmission delay of an i ( i [ e , s ] ) packet in the CCHI consists of service time T S i and queuing time T Q i . Let D e , D s and T S C H I denote the total transmission delay of a safety packet, the total transmission delay of a WSA packet and the duration of SCH interval, respectively, we have
D e = T S C H I 2 + T S e + T Q e D s = T S C H I 2 + T S s + T Q s
Now, we calculate T S e ( T S s ) and T Q e ( T Q s ).
Definition 5 (Service time).
The service time T S i is the duration from the time instant when an i ( i [ e , s ] ) packet becomes the head of the queue to the time instant when this packet is transmitted or dropped. The service time is important to examine the performance of higher protocol layer [39]. Since the smallest time unit of backoff timer is a time slot σ, the service time of packets is a nonnegative random variable whose distribution is a discrete probability distribution. In this paper, by following the similar approach in [39,45], we model each entity as an M/G/1 queue with unlimited length and apply the Probability Generating Function (PGF) approach to transform the Markov chain into the z domain, as shown in Figure 8. Let q i , k be the steady state probability of i ( i [ e , s ] ) packets that the packet service time is t s i , k · σ . Let P T S i denote the PGF of q i , k , which is expressed as
P T S i ( z ) = k = 0 q i , k z t s i , k
The service time includes the backoff time and the transmission time. In the EDCA backoff procedure, for a safety packet, the backoff timer will be decremented by a time slot ( σ ) with probability (1 − P e , b ), while it is frozen for a period of time when the channel is busy. There are five cases making backoff timer frozen: safety packet error with probability P 2 , successful transmission a safety packet with probability P 3 , WSA packet error with probability P 4 , successful transmission a WSA packet with probability P 5 , collision slots from only emergency packets, only WSA packets or both with probability P e , b P 2 P 3 P 4 P 5 . Let S e ( z ) and C e ( z ) be the PGF of T e , s u c and T e , c o l , respectively, we have
S e ( z ) = C e ( z ) = z T e , s u c σ
where · is a function to round floating point numbers to integers. Therefore, the PGF of the time that the backoff timer of safety packet decrements by one can be expressed by
H e ( z ) = ( 1 P e , b ) z + P 2 C e ( z ) + P 3 S e ( z ) + P 4 C s ( z ) + P 5 S s ( z ) + ( P e , b i = 2 5 P i ) · max [ C e ( z ) , C s ( z ) ]
where S s ( z ) and C s ( z ) represent the PGF of T s , s u c and T s , c o l , respectively, and the expressions are given in Equation (43). According to Figure 8a, we can use Mason formula to solve the transfer function from the “Start" point to the “End" point, i,e., the PGF of service time of T S e . We have
P T S e ( z ) = k = 0 q e , k z t s e , k = S e ( z ) W e k = 0 W e 1 [ H e ( z ) ] k
In VANETs, nodes use two-way handshake to make SCH reservations. Service provider sends a WSA packet and piggybacks with service information and the selected SCH. Service user responds to the WSA packet with an ACK. The PGF of T s , s u c and T s , c o l , S s ( z ) and C s ( z ) can be given by
S s ( z ) = z T s , s u c σ C s ( z ) = z T s , c o l σ
The backoff timer will be decremented by one time slot ( σ ) with probability ( 1 P s , b ). The backoff timer will be frozen if the channel is busy due to the following cases: safety packet error with probability P 2 , successful transmission a safety packet with probability P 3 , WSA packet error with probability P 4 , successful transmission a WSA packet with probability P 5 , collision slots from only emergency packets, only WSA packets or both with probability P s , b P 2 P 3 P 4 P 5 . Therefore, the PGF of the time that the backoff timer of WSA packet decrements by one can be expressed by
H s ( z ) = ( 1 P s , b ) z + P 2 C e ( z ) + P 3 S e ( z ) + P 4 C s ( z ) + P 5 S s ( z ) + ( P s , b i = 2 5 P i ) · max [ C e ( z ) , C s ( z ) ]
The backoff process B s , i ( z ) at stage i of WSA packets can be expressed by
B s , i ( z ) = 1 W s , i k = 0 W s , i 1 [ H s ( z ) ] k , i m 1 W s , m k = 0 W s , m [ H s ( z ) ] k , m i m
As we defined before, the random variable T S s is the duration of time taken for a state transition from the start state (when a WSA packet is reaching the head of its queue and beginning to be served) to the end state (being transmitted successfully or discarded after maximum m times retransmission failures). When nodes use WSA packets to make SCH reservations, transmission failure will incur the increasement of backoff stage with doubled CW. The transmission failure includes two cases: transmission collision and transmission bit error. Due to our Assumption 4, these two cases thus have equal time. As shown in Figure 8b, the PGF of T S s , P T S e ( z ) can be expressed by
P T S s ( z ) = ( 1 P s , f ) S s ( z ) i = 0 m P s , f C s ( z ) i j = 0 i B s , j ( z ) + ( P s , f C s ( z ) ) m + 1 j = 0 m B s , j ( z )
Finally, based on Equations (42) and (46), we can derive the arbitrary nth moment of service time by differentiation. the average service time can be calculated by
T S i = 1 μ i = k = 0 q i , k · ( t s i , k · σ ) = P T S i ( z ) | z = 1
Now, we can derive the service time distribution and to solve the values of variables P e , e m p and P s , e m p . However, P e , e m p and P s , e m p depend on the duration of service time. We employ an iterative algorithm to solve P e , e m p and P s , e m p . The detailed iterative steps are as follows:
Step 1:
Initialize P e , e m p and P s , e m p according to the network condition, and assign initial values for them (ranging from 1 to 0), for example, if the network is under the unsaturated condition, it is better to set the value close to 1.
Step 2:
Solve the multivariate nonlinear equation to calculate P i , v c , τ i , η i , P i , b , P i , f and P i , a r r ( i [ e , s ] ) according to Equations (8), (9), (14), (17), (18), (28) and (30).
Step 3:
Calculate the average service time T S e and T S s according to Equations (40)–(47).
Step 4:
If ( 2 λ e + 2 λ s ) / ( μ e + μ s ) 1 , P e , e m p = 1 2 λ e / ( μ e + μ s ) , P s , e m p = 1 2 λ s / ( μ e + μ s ) , otherwise, P e , e m p = P s , e m p = 0 .
Step 5:
If both P e , e m p and P s , e m p converge with previous values, then stop the algorithm; otherwise, go to Step 2 with new P e , e m p and P s , e m p .
Definition 6 (Queuing delay).
The queuing delay T Q i is the duration from the time instant when an i ( i [ e , s ] ) packet arrives at the MAC layer queue to the time instant when it becomes the queue head. According to the Pollaczek–Khintchine mean value formula [46] for M/G/1, the expected queuing delay can be derived by
T Q e = 2 λ e [ P T S e ( 1 ) + P T S e ( 1 ) ] 2 [ 1 2 λ e / ( μ e + μ s ) ] T Q s = 2 λ s [ P T S s ( 1 ) + P T S s ( 1 ) ] 2 [ 1 2 λ s / ( μ e + μ s ) ]

4.4.2. PRR for Safety Packets and WSA Packets

Definition 7 (Packet Reception Rate (PRR)).
The PRR is the percentage of packets that successfully received to the number of packets transmitted [39]. To determine that the transmitted packets by the tagged vehicle are successfully received by any other vehicles within its transmission range, the following conditions must be met: (1) no higher ACs in the same node attempt to transmit; (2) when the tagged vehicle is transmitting, no other vehicles within its carrier-sensing range deliver packets at the same time slot; (3) when the tagged vehicle is transmitting, no hidden terminals start to transmit during the vulnerable period T v u l n ; (4) no transmission errors occur during the packet transmission; and (5) no packets are dropped due to exceeding the retransmission limit. Combined with the above conditions, we can calculate the probability of successful reception of safety packets and WSA packets, P R R e and P R R s , respectively, as
P R R e = ( 1 P e , v c ) × k = 0 1 η t o t a l k ( N c s 1 ) k k ! e ( N c s 1 ) × k = 0 ( 1 η t o t a l ) k N int k k ! e N int T v u l n / T v i r t × ( 1 P e , e r r ) = ( 1 P e , v c ) × e η t o t a l ( N c s + N int T v u l n / T v i r t 1 ) × ( 1 P e , e r r ) P R R s = ( 1 P s , v c ) × k = 0 1 η t o t a l k ( N c s 1 ) k k ! e ( N c s 1 ) × k = 0 ( 1 η t o t a l ) k N int k k ! e N int T v u l n / T v i r t × ( 1 P s , e r r ) × ( 1 P s , d r o p ) = ( 1 P s , v c ) × e η t o t a l ( N c s + N int T v u l n / T v i r t 1 ) × ( 1 P s , e r r ) × ( 1 P s , d r o p )

4.4.3. Throughput Analysis

In this section, we analyze the throughput of non-safety packets on the SCHs. According to the specification in IEEE 1609.4 standard, a dedicated CCH is used to provide a unique rendezvous for nodes to transmit, gather, and share information such as safety-related messages and SCH reservation information through exchange WSA/ACK messages. The nodes rendezvous on the CCH only during the CCHI. Note, we assume that nodes can determine the starting time of their transmissions on SCHs after their negotiations on the CCH. However, the fixed switch mechanism between CCH and SCH defined in IEEE 1609.4 standard may come with a drawback: When a larger number of nodes is present to communicate with each other under a density vehicular environment, the single CCH can be highly congested and limited CCHI makes nodes having no enough time to performance SCH reservations, and thus CCH becomes a performance bottleneck. Beside, considering the delivery of non-safety packets only during SCHI and the unique feature of multichannel operation in the IEEE 1609.4 standard such as periodical and synchronous fixed switching between CCH and SCH, the throughput of SCHs is thus lower and the SCHs are not fully utilized. We first calculate the number of successful exchange the WSA/ACK packets on the CCH, and then discuss the control channel bottleneck and the SCHs utilization issue.
Let N s c h denote the number of SCHs available under the vehicular environments. According to the specification defined in the IEEE 1609.4 standard, we have
T S Y N C = T C C H I + T S C H I
Let G 1 represent the average number of successful exchange WSA/ACK packets during the CCHI on the CCH. To observe how the length of CCHI affects G 1 which in turn affects the throughput of SCHs, we define a variable γ to represent the ratio of CCHI to SI, and we call this scheme γ -varying multichannel scheme. Thus, the γ is defined as
γ = T C C H I T S Y N C , 0 < γ < 1
According to the fixed switch scheme defined in the IEEE 1609.4 standard, γ is equal to 1 / 2 . We derive the expression of G 1 as
G 1 = T C C H I × ( P b u s y P s , s u c v ) T v i r t = γ T S Y N C × ( P b u s y P s , s u c v ) T v i r t , 0 < γ < 1
Let G 2 be the number of non-safety packets which can be transmitted on all N s c h SCHs during the SCHI, we have
G 2 = ( 1 γ ) T S Y N C T d a t a N s c h , 0 < γ < 1
where T d a t a be the duration of successful transmission of a non-safety packet, and it is calculated by
T d a t a = D I F S + H P H Y + H M A C + E [ L d a t a ] R d + S I F S + T A C K + 2 δ
where D I F S and E [ L d a t a ] represent the duration of a DIFS and the payload of a non-safety packet. Note, we still use D I F S instead of AIFS for clarity and simplicity when calculating T d a t a .
On the one hand, when G 1 G 2 , it means when a sender and a receiver are performing SCH reservation, there are always free SCHs. Thus, the SCH reservation is successful as long as the transmission of WSA/ACK packet is successful. In other words, a successful transmission of WSA/ACK means a successful transmission of non-safety message. Under this circumstance, the CCH becomes a performance bottleneck and the SCHs are under utilization.
On the other hand, when the available N s c h or SCHI is limited, G 1 is greater than G 2 , and thus the successful transmission of WSA/ACK packets cannot perform successfully transmission of non-safety packets on the SCHs. The throughput of SCHs also decreases. Under this circumstance, the SCHs becomes a performance bottleneck. Therefore, based on the above analysis, the average total throughput of SCHs can be expressed as
S d a t a = G 1 E [ L d a t a ] T S Y N C , G 1 G 2 G 2 E [ L d a t a ] T S Y N C , G 1 > G 2 = γ ( P b u s y P s , s u c v ) E [ L d a t a ] T v i r t , G 1 G 2 ( 1 γ ) N s c h E [ L d a t a ] T d a t a , G 1 > G 2
Let S d a t a 1609.4 be the throughput of non-safety packets transmitted on the SCHs in the IEEE 1609.4 standard. Due to the fixed channel switch between CCHI and SCHI defined in the IEEE 1609.4 standard, during a synchronization interval, only half of T S Y N C is used to transmit the non-safety packets, and thus S d a t a 1609.4 can be expressed as Equation (55) when γ is equal to 1/2.

5. Model Validation and Numerical Analysis

In this section, the proposed analytical model is applied to a specific VANETs environment for the evaluation of the performance of reliability and effectiveness of the multichannel defined in the IEEE 1609.4 standard, in terms of packet transmission delay, PRR and throughput. We adopt VISSIM [47] and NS-2 simulator [48] for road traffic and network simulations, respectively. Moreover, we implement 802.11e EDCA [49] developed by the TKN group in the Technical University of Berlin. Some parts of original codes have been modified according to the IEEE 802.11p and the IEEE 1609.4 standard.
The simulation scenario is on a 6-km-long highway with one lane in each direction as shown in Figure 4. Every vehicle has a GPS and a single-radio WAVE communication device with parameters shown in Table 4. With regard to ACs assignment to safety-related packets and WSA packets, we refer to [20] to set the values of W e , W s , 0 , AIFSN[0] and AIFSN[1]. The simulation scenario description is given in Table 5. All nodes can act as both service providers and service users. The vehicle density is varied from 0.01 to 0.08. Due to the performance analysis in terms of throughput, this model focuses on the effect of fixed switching defined in the IEEE 1609.4 standard on throughput versus the γ -varying multichannel scheme, and thus we set p b e r equal to zero on the SCHs.
Figure 9 shows the packet transmission delay and PRR on the CCH, and the throughput on the SCHs under varied vehicle density. We change the channel data rate, packet arrival rate, bit error rate and the payload of safety-related packets. The parameter configurations are: ➀ R d = 6 Mbps, λ e = λ s = 5 packets/s, p b e r = 10 5 , L e = 200 Bytes, L s = 160 bits, L d a t a = 2000 Bytes; ➁ R d = 12 Mbps, λ e = λ s = 5 packets/s, p b e r = 10 5 , L e = 200 Bytes, L s = 160 bits, L d a t a = 2000 Bytes; ➂ R d = 12 Mbps, λ e = λ s = 10 packets/s, p b e r = 10 5 , L e = 100 Bytes, L s = 160 bits, L d a t a = 2000 Bytes; and ➃ R d = 6 Mbps, λ e = λ s = 5 packets/s, p b e r = 0 , L e = 200 Bytes, L s = 160 bits, L d a t a = 2000 Bytes. It can be seen that analytical and simulation results match well. According to the results in Figure 9, we can observe that the packet transmission delay for the safety-related messages meets the real-time requirement, however, the PRR for the safety-related messages and the throughput for the non-safety messages rapidly decreases when the vehicle density changes from smooth to jammed.
Figure 10 analyzes the performance of safety and WSA messages on the CCH and the performance of non-safety messages on the SCHs in detail. The configurations parameters are: R d = 6 Mbps, λ e = λ s = 5 packets/s, p b e r = 10 5 , L e = 200 Bytes, L s = 160 bits, L d a t a = 2000 Bytes, L c s = 400 m, safety-related packet: AIFSN[0] = 3, W e = 8 and WSA packet: AIFSN[1] = 6, W s , 0 = 16.
Figure 10a–c shows the packet transmission delay and PRR of safety-related and WSA packets with different parameters on the CCH, and the throughput of non-safety packets with different parameters on the SCHs in the IEEE 1609.4 standard. We can observe the following: (1) A higher channel data rate can reduce transmission delay greatly and enhance reliability, at the same time, improve the throughput greatly. On the one hand, this is due to the fact that a higher channel data rate can shorten the packet transmission time, and thus reduce the chances of contentions on the CCH which the conflict probability on the CCH is reduced ultimately. On the other hand, a higher channel data rate can transmit more packets on the SCHs in a short time. (2) With the decrease in the packet arrival rate, the PRR increases significantly, and the packet transmission delay is also reduced. Moreover, the throughput enhances greatly with the decrease of the packet arrival rate. This is due to the fact that the lower packet arrival rate decrease the collision probability and shortens the backoff blocking time, and thus nodes have more opportunities to make SCH reservation and the number of successful reservations rises. (3) Increasing the bit error rate can decrease the PRR sharply, and the throughput also is cut down. This is because the length of a safety-related packet is greater than that of a WSA packet, and thus the effect of bit error rate on the transmissions of safety-related packets is greater than that of WSA packets according to Equation (6). The increase of the bit error rate has no effect on the packet transmission delay. (4) The decrease in the size of safety-related packets has a positive effect on both the packet transmission delay and the reliability. However, the performance gain in terms of throughput increases with the increase of non-safety packet size, and this is because each transmission of non-safety packet with long payload carries more data than that of non-safety packet with short payload. (5) With the increase in the carrier sensing range, both the PRR and the throughput rise significantly, however, the packet transmission delay increases. On the one hand, this is because that the larger carrier sensing range can handle the hidden terminal problem effectively, however, the tagged vehicle also has to supervise more nodes, and thus, leads to a longer service time of packets. On the other hand, the increasing PRR can suppress the packet transmission delay which matter less to the number of successful SCH reservations as the increase of the carrier sensing range, which leads to the increase of throughput on the SCHs ultimately.
Figure 10d,e shows how the CW and AIFSN affect the reliability and performance of the network. We give the reference curves with parameters: safety-related packet: AIFSN[0] = 3, W e = 8 and WSA packet: AIFSN[1] = 6, W s , 0 = 16, m = 2, m = 4. It can be observed that bigger CW size and bigger AIFSN help improve the reliability and also increase the packet transmission delay. This is because that bigger CW size and bigger AIFSN generate fewer contentions and reduce the collision probability, and also increase packet service time.
Figure 10f,g gives the comparison of probabilities of external collision, virtual collision, collision and transmission failure under unsaturated condition ( λ e = λ s = 2 packets/s) and saturated condition ( λ e = λ s = 500 packets/s. Note that the real packets arrival rate for safety traffic and WSA traffic are 2 λ e (1000 packets/s) and 2 λ s (1000 packets/s) on the CCHI, respectively. It can be observed that the virtual collision probabilities are very small under both conditions. Although the safety-related packet has higher priority than WSA packet, the probabilities of collisions of safety-related packets almost are equal to the probabilities of collisions of WSA packets. This is due to that the external collision probability has a primary impact on PRR. In the figure, it can be seen that the transmission failure probabilities of safety-related packets are slightly bigger than that of WSA packets since a safety-related packet size is bigger than that of a WSA packet which incurs the safety-related packet having higher packet error probability. In this case, we need to decrease the packet error probability due to bit error rate, especially in dynamic mobile networks, and this is our future work.
Figure 10h gives the comparison of throughout on the SCH: IEEE 1609.4 standard versus γ -varying multichannel scheme. In order to facilitate the comparison between IEEE 1609.4 standard and γ -varying multichannel scheme, we set p b e r = 0 . It can be observed that, in the IEEE 1609.4 standard, the throughput rises at first and then reduces (or keep maximum values for a small segment length and then reduces) when the vehicle density rises further. The reason is that, taking λ e = λ s = 5 packets/s for example, when the vehicle density is less than 0.04 vehicles/m, due to the longer CCHI and the shortage of WSA packets, the CCH is idle for a while, and then the throughput is lower. When the vehicle density is more than 0.04 vehicles/m, higher vehicle density generates more contentions and requires more CCHI to make SCH reservations. Under the above two conditions, the SCHs are starved state, and the SCHs is under utilized. From Figure 10h, it can be seen when the ratio of CCHI to SI, γ , increases within the range of 0.7, the maximum throughput vales of γ -varying multichannel scheme also increases. While when γ increases from 0.7 to 1, the throughput of γ -varying multichannel scheme deceases. This is because that, when γ ≤ 0.7, due to the effect of factors such as virtual collision, channel fading and hidden terminals, the number ( G 1 in Equation (52)) of successful SCH reservations is smaller, and then the SCHs are idle for a long time. Therefore, the SCH throughput is lower and the SCHs are under utilized, and the CCH is the performance bottleneck. On the other hand, when γ > 0.7, due to the shortage of SCHI, the number ( G 2 in Equation (53)) of non-safety packets which can be allowed to be transmitted on the SCHs is smaller ( G 2 < G 1 ). Under this condition, SCH is the performance bottleneck, and the CCH is under utilized. In these cases, we need to determine the γ dynamically based on the vehicle density so as to obtain an efficient and optimal throughput.

6. Conclusions and Future Work

In this paper, we proposed two Markov chain models for safety-related messages and WSA messages to analyze the real-time and reliability of broadcasting of safety-related messages on CCH and to analyze the efficiency of throughput and utilization of SCHs under both unsaturated and saturated conditions. We analyze in detail packet transmission delay, PRR and throughput by considering virtual collision, AIFS differentiation, CW, the retry limit, frame blocking probability, channel busy probability, frame failure probability and channel switch. We employ M/G/1 queuing model to derive a more accurate analytical result.
By simulations, we validate the proposed models, and the analytical and simulation results match well. From the proposed analytical models and the numerical results, in addition to some straightforward observations, we obtained several important conclusions: (1) Under vehicular environments, IEEE 1609.4 standard is able to meet the transmission delay requirement of safety-related messages, however, it is difficult to meet the reliability requirement due to the transmission collision and harsh channel fading. (2) Hidden terminal problem is the main factor affecting the external collision which degrades the PRR significantly. (3) High channel data rate leads to higher reliability for transmitting both safety-related and WSA packets. (4) IEEE 1609.4 standard results in inefficient utilization of both CCH and SCH, i.e., utilization cannot inherently exceed 50%. (5) The fixed channel switching between CCH interval and SCH interval prohibits adaptive and intelligent allocation of time interval in response to variable traffic demands, and thus, leads to inefficiency throughput and underutilization of SCHs. (6) On the one hand, the potential ways to improve reliability for broadcast safety-related messages on the CCH include using bigger CW to reduce the possibility of concurrent transmissions, choosing larger carrier-sensing range to mitigate the hidden terminal problem, increasing the transmission data rate, increasing the number of packet retransmission, etc. On the other hand, the potential ways to improve the throughput and utilization of SCHs include employing the higher transmission data rate, increasing the number of SCHs, using the larger non-safety packet payload to carry more data, increasing the SCH interval, providing the contention-free transmission, etc.
In our future research, we will focus on how to ensure the reliable transmission of safety-related messages, and improve the throughput and utilization of SCHs by adjusting system parameters dynamically. we will also exploit an efficient method to solve the hidden terminal problem, and explore appropriate method to decrease the BER caused by fading channel. Finally, the proposed model performance under real field test will be considered.

Acknowledgments

This work was supported in part by the Online Research Fund of Ministry of Education Research Center for Online Education under Grant 2017YB135, in part by the Feature Prestigious Construction Project-College Quality Course under Grant XJP2013032, and in part by the Project of Shandong Province Higher Educational Science and Technology Program under Grant J17KA154.

Author Contributions

Caixia Song researched the literature, conceived the study concepts, designed and analyzed the model, and took charge of the entire manuscript.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  2. Cheng, H.T.; Shan, H.; Zhuang, W. Infotainment and road safety service support in vehicular networking: From a communication perspective. Mech. Syst. Signal Process. 2011, 25, 2020–2038. [Google Scholar] [CrossRef]
  3. Hadded, M.; Muhlethaler, P.; Laouiti, A.; Zagrouba, R. TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 2461–2492. [Google Scholar] [CrossRef]
  4. IEEE. IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments; IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, IEEE Std 802.11n-2009, and IEEE Std 802.11w-2009); IEEE: Piscataway, NJ, USA, 2010; pp. 1–51. Available online: https://standards.ieee.org/findstds/standard/802.11p-2010.html (accessed on 1 November 2017).
  5. IEEE. IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements; IEEE Std 802.11e-2005 (Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003); IEEE: Piscataway, NJ, USA, 2005; pp. 1–212. [Google Scholar]
  6. IEEE. 1609.4-2016—IEEE Standard for Wireless Access in Vehicular Environments (WAVE)—Multi-Channel Operation. Available online: http://ieeexplore.ieee.org/document/7435228/ (accessed on 1 November 2017).
  7. Song, C.; Tan, G.; Yu, C.; Ding, N.; Zhang, F. APDM: An adaptive multi-priority distributed multichannel MAC protocol for vehicular ad hoc networks in unsaturated conditions. Comput. Commun. 2017, 104, 119–133. [Google Scholar] [CrossRef]
  8. Song, C.; Tan, G.; Yu, C. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks. Sensors 2017, 17, 2293. [Google Scholar] [CrossRef] [PubMed]
  9. Fallah, Y.P.; Huang, C.L.; Sengupta, R.; Krishnan, H. Analysis of Information Dissemination in Vehicular Ad-Hoc Networks With Application to Cooperative Vehicle Safety Systems. IEEE Trans. Veh. Technol. 2011, 60, 233–247. [Google Scholar] [CrossRef]
  10. Wang, Q.; Leng, S.; Fu, H.; Zhang, Y. An IEEE 802.11p-Based Multichannel MAC Scheme With Channel Coordination for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2012, 13, 449–458. [Google Scholar] [CrossRef]
  11. Song, C.; Tan, G.; Ding, N.; Bu, J.; Zhang, F.; Liu, M. Application oriented cross-layer multi-channel MAC protocol for VANET. J. Commun. 2016, 37, 95–105. [Google Scholar]
  12. Kim, Y.; Lee, M.; Lee, T.J. Coordinated Multichannel MAC Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2016, 65, 6508–6517. [Google Scholar] [CrossRef]
  13. Papadimitratos, P.; Fortelle, A.D.L.; Evenssen, K.; Brignolo, R.; Cosenza, S. Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 2009, 47, 84–95. [Google Scholar] [CrossRef]
  14. Ma, X.; Zhang, J.; Wu, T. Reliability Analysis of One-Hop Safety-Critical Broadcast Services in VANETs. IEEE Trans. Veh. Technol. 2011, 60, 3933–3946. [Google Scholar] [CrossRef]
  15. Hafeez, K.A.; Zhao, L.; Liao, Z.; Ma, N.W. Performance Analysis of Broadcast Messages in VANETs Safety Applications. In Proceedings of the 2010 IEEE Global Communications Conference (GLOBECOM 2010), Miami, FL, USA, 6–10 December 2010; pp. 1–5. [Google Scholar]
  16. Hafeez, K.A.; Zhao, L.; Ma, B.; Mark, J.W. Performance Analysis and Enhancement of the DSRC for VANET’s Safety Applications. IEEE Trans. Veh. Technol. 2013, 62, 3069–3083. [Google Scholar] [CrossRef]
  17. Yao, Y.; Rao, L.; Liu, X.; Zhou, X. Delay analysis and study of IEEE 802.11p basedDSRC safety communication in a highway environment. In Proceedings of the 2013 IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 1591–1599. [Google Scholar]
  18. Yao, Y.; Rao, L.; Liu, X. Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment. IEEE Trans. Veh. Technol. 2013, 62, 4198–4212. [Google Scholar] [CrossRef]
  19. Campolo, C.; Vinel, A.; Molinaro, A.; Koucheryavy, Y. Modeling Broadcasting in IEEE 802.11p/WAVE Vehicular Networks. IEEE Commun. Lett. 2011, 15, 199–201. [Google Scholar] [CrossRef]
  20. Campolo, C.; Molinaro, A.; Vinel, A.; Zhang, Y. Modeling Prioritized Broadcasting in Multichannel Vehicular Networks. IEEE Trans. Veh. Technol. 2012, 61, 687–701. [Google Scholar] [CrossRef]
  21. Yin, X.; Ma, X.; Trivedi, K.S.; Vinel, A. Performance and Reliability Evaluation of BSM Broadcasting in DSRC with Multi-Channel Schemes. IEEE Trans. Comput. 2014, 63, 3101–3113. [Google Scholar] [CrossRef]
  22. Campolo, C.; Molinaro, A.; Vinel, A.; Zhang, Y. Modeling Event-Driven Safety Messages Delivery in IEEE 802.11p/WAVE Vehicular Networks. IEEE Commun. Lett. 2013, 17, 2392–2395. [Google Scholar] [CrossRef]
  23. Wang, T.; Song, L.; Han, Z.; Jiao, B. Dynamic Popular Content Distribution in Vehicular Networks using Coalition Formation Games. IEEE J. Sel. Areas Commun. 2013, 31, 538–547. [Google Scholar] [CrossRef]
  24. Wang, Z.; Hassan, M. Context-Aware Channel Coordination for DSRC. In Proceedings of the 2008 IEEE Globecom Workshops, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6. [Google Scholar]
  25. Campolo, C.; Molinaro, A. Multichannel communications in vehicular Ad Hoc networks: A survey. IEEE Commun. Mag. 2013, 51, 158–169. [Google Scholar] [CrossRef]
  26. Wang, Z.; Hassan, M. How Much of DSRC is Available for Non-safety Use? In Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET ’08), San Francisco, CA, USA, 15 September 2008; ACM: New York, NY, USA, 2008; pp. 23–29. [Google Scholar]
  27. Misic, J.; Badawy, G.; Misic, V.B. Performance characterization for IEEE 802.11 p network with single channel devices. IEEE Trans. Veh. Technol. 2011, 60, 1775–1787. [Google Scholar] [CrossRef]
  28. Xiong, K.; Chen, X.; Rao, L.; Liu, X.; Yao, Y. Solving the performance puzzle of DSRC multi-channel operations. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 3843–3848. [Google Scholar]
  29. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  30. Han, C.; Dianati, M.; Tafazolli, R.; Liu, X. A Novel Distributed Asynchronous Multichannel MAC Scheme for Large-Scale Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2012, 61, 3125–3138. [Google Scholar] [CrossRef]
  31. Bai, F.; Krishnamachari, B. Spatio-temporal variations of vehicle traffic in VANETs: Facts and implications. In Proceedings of the ACM International Workshop on Vehicular Internetworking, Beijing, China, 25 September 2009; pp. 43–52. [Google Scholar]
  32. Zheng, Y.; Lu, K.; Fang, D.W. Performance Analysis of IEEE 802.11 DCF in Imperfect Channels. IEEE Trans. Veh. Technol. 2006, 55, 1648–1656. [Google Scholar] [CrossRef]
  33. Farhadi, G.; Beaulieu, N.C. Connectivity and bit error rate analysis of mobile ad hoc wireless networks. In Proceedings of the 2006 IEEE 64th Vehicular Technology Conference (VTC-2006 Fall), Montreal, QC, Canada, 25–28 September 2006; pp. 1–5. [Google Scholar]
  34. Simon, M.K.; Alouini, M.S. Digital Communication over Fading Channels; John Wiley & Sons: Hoboken, NJ, USA, 2005; Volume 95. [Google Scholar]
  35. Ma, X.; Chen, X. Delay and Broadcast Reception Rates of Highway Safety Applications in Vehicular Ad Hoc Networks. In Proceedings of the 2007 Mobile Networking for Vehicular Environments, Anchorage, AK, USA, 11 May 2007; pp. 85–90. [Google Scholar]
  36. Kim, B.; Kang, I.; Kim, H. Resolving the Unfairness of Distributed Rate Control in the IEEE WAVE Safety Messaging. IEEE Trans. Veh. Technol. 2014, 63, 2284–2297. [Google Scholar] [CrossRef]
  37. Huang, C.; Liao, W. Throughput and delay performance of IEEE 802.11e enhanced distributed channel access (EDCA) under saturation condition. IEEE Trans. Wirel. Commun. 2007, 6, 136–145. [Google Scholar] [CrossRef]
  38. Hung, F.; Pai, S.; Marsic, I. Performance Modeling and Analysis of the IEEE 802.11 Distribution Coordination Function in Presence of Hidden Stations. In Proceedings of the MILCOM 2006—2006 IEEE Military Communications Conference, Washington, DC, USA, 23–25 October 2006; pp. 1–7. [Google Scholar]
  39. Ma, X.; Chen, X.; Refai, H.H. Performance and reliability of DSRC vehicular safety communication: A formal analysis. EURASIP J. Wirel. Commun. Netw. 2009, 2009. [Google Scholar] [CrossRef]
  40. Dong, X.J.; Varaiya, P. Saturation throughput analysis of IEEE 802.11 wireless LANs for a lossy channel. IEEE Commun. Lett. 2005, 9, 100–102. [Google Scholar] [CrossRef]
  41. Khatua, M.; Misra, S. D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks. IEEE Trans. Mob. Comput. 2016, 15, 322–335. [Google Scholar] [CrossRef]
  42. Ziouva, E.; Antonakopoulos, T. CSMA/CA performance under high traffic conditions: Throughput and delay analysis. Comput. Commun. 2002, 25, 313–321. [Google Scholar] [CrossRef]
  43. Patel, P.; Lobiyal, D.K. A Simple but Effective Collision and Error Aware Adaptive Back-Off Mechanism to Improve the Performance of IEEE 802.11 DCF in Error-Prone Environment. Wirel. Pers. Commun. 2015, 83, 1477–1518. [Google Scholar] [CrossRef]
  44. Yao, Y.; Chen, X.; Rao, L.; Liu, X.; Zhou, X. LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle-to-Vehicle Safety Communications. IEEE Trans. Veh. Technol. 2017, 66, 2499–2512. [Google Scholar] [CrossRef]
  45. Zhai, H.; Kwon, Y.; Fang, Y. Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wirel. Commun. Mob. Comput. 2004, 4, 917–931. [Google Scholar] [CrossRef]
  46. Trivedi, K.S. Probability and Statistics with Reliability, Queuing and Computer Science Applications; John Wiley & Sons: Hoboken, NJ, USA, 2008; pp. 47–57. [Google Scholar]
  47. PTV Simulation VISSIM 5.30, PTV Planung Transport Verkehr AG: Karlsruhe, Germany, 2009.
  48. NS2. Available online: http://www.isi.edu/nsnam/ns/ (accessed on 6 November 2017).
  49. Wiethölter, S.; Emmelmann, M.; Hoene, C.; Wolisz, A. TKN EDCA Model for ns-2; Technical Report TKN-06-003; Telecommunication Networks Group; Technische Universität: Berlin, Germany, 2006. [Google Scholar]
Figure 1. Frequency channel layout of a 5.9-GHz WAVE system.
Figure 1. Frequency channel layout of a 5.9-GHz WAVE system.
Sensors 17 02890 g001
Figure 2. EDCA backoff procedure for two kinds of priority.
Figure 2. EDCA backoff procedure for two kinds of priority.
Sensors 17 02890 g002
Figure 3. IEEE 1609.4 multichannel alternating operation.
Figure 3. IEEE 1609.4 multichannel alternating operation.
Sensors 17 02890 g003
Figure 4. One-dimensional highway VANETs model.
Figure 4. One-dimensional highway VANETs model.
Sensors 17 02890 g004
Figure 5. Virtual collision inside a station.
Figure 5. Virtual collision inside a station.
Sensors 17 02890 g005
Figure 6. Hidden terminal vulnerable period.
Figure 6. Hidden terminal vulnerable period.
Sensors 17 02890 g006
Figure 7. Markov chain backoff procedure: (a) one-dimensional Markov chain model for higher priority A C 0 ; and (b) two-dimensional Markov chain model for lower priority A C 1 .
Figure 7. Markov chain backoff procedure: (a) one-dimensional Markov chain model for higher priority A C 0 ; and (b) two-dimensional Markov chain model for lower priority A C 1 .
Sensors 17 02890 g007
Figure 8. Generalized state transition diagram: (a) safety-related packets with higher priority A C 0 ; and (b) WSA packets with lower priority A C 1 .
Figure 8. Generalized state transition diagram: (a) safety-related packets with higher priority A C 0 ; and (b) WSA packets with lower priority A C 1 .
Sensors 17 02890 g008
Figure 9. Average packet transmission delay and PRR on the CCH, and throughput on the SCHs: (a) packet transmission delay on parameter configurations ➀; (b) packet transmission delay on parameter configurations ➁; (c) packet transmission delay on parameter configurations ➂; (d) packet transmission delay on parameter configurations ➃; (e) PRR on parameter configurations ➀; (f) PRR on parameter configurations ➁; (g) PRR on parameter configurations ➂; (h) PRR on parameter configurations ➃; (i) throughput on parameter configurations ➀; (j) throughput on parameter configurations ➁; (k) throughput on parameter configurations ➂; and (l) throughput on parameter configurations ➃.
Figure 9. Average packet transmission delay and PRR on the CCH, and throughput on the SCHs: (a) packet transmission delay on parameter configurations ➀; (b) packet transmission delay on parameter configurations ➁; (c) packet transmission delay on parameter configurations ➂; (d) packet transmission delay on parameter configurations ➃; (e) PRR on parameter configurations ➀; (f) PRR on parameter configurations ➁; (g) PRR on parameter configurations ➂; (h) PRR on parameter configurations ➃; (i) throughput on parameter configurations ➀; (j) throughput on parameter configurations ➁; (k) throughput on parameter configurations ➂; and (l) throughput on parameter configurations ➃.
Sensors 17 02890 g009aSensors 17 02890 g009b
Figure 10. Numerical analysis: (a) packet transmission delay of safety-related and WSA message with different parameters; (b) PRR of safety-related and WSA message with different parameters; (c) throughput on the SCHs: IEEE 1609.4 standard with different parameters of safety-related and WSA message; (d) packet transmission delay of safety-related and WSA message with different CW and AIFSN; (e) PRR of safety-related and WSA message with different CW and AIFSN; (f) comparison of probability of external collision, virtual collision, the collision and transmission failure ( λ e = λ s = 2 packets/s); (g) comparison of probability of external collision, virtual collision, the collision and transmission failure ( λ e = λ s = 500 packets/s); and (h) comparison of throughput on the SCHs: IEEE 1609.4 standard versus γ -varying multichannel scheme.
Figure 10. Numerical analysis: (a) packet transmission delay of safety-related and WSA message with different parameters; (b) PRR of safety-related and WSA message with different parameters; (c) throughput on the SCHs: IEEE 1609.4 standard with different parameters of safety-related and WSA message; (d) packet transmission delay of safety-related and WSA message with different CW and AIFSN; (e) PRR of safety-related and WSA message with different CW and AIFSN; (f) comparison of probability of external collision, virtual collision, the collision and transmission failure ( λ e = λ s = 2 packets/s); (g) comparison of probability of external collision, virtual collision, the collision and transmission failure ( λ e = λ s = 500 packets/s); and (h) comparison of throughput on the SCHs: IEEE 1609.4 standard versus γ -varying multichannel scheme.
Sensors 17 02890 g010aSensors 17 02890 g010bSensors 17 02890 g010cSensors 17 02890 g010d
Table 1. Comparison of different models.
Table 1. Comparison of different models.
ModelProtocolMAC TypeMarkov ChainH/EBBPBSIPADVCCSNetwork ConditionTraffic TypeD, T PRRYear
Bianchi [29]802.11aDCF2-DH/×Equal to 1FCP×SU×, T/×2000
Wang et al. [24,26]802.11pDCF × / × NSB/U × , × /PRR2008
Ma et al. [14]802.11pDCF1-DH/×Equal to 1×NSB×, ×/PRR2011
Misic et al. [27]802.11pEDCA2-D×/EFBPFFPNS/SUD, ×/×2011
Hafeez et al. [15,16]802.11pEDCA1-DH/EFCP××NSBD, T/PRR2013
Yao et al. [17,18]802.11pEDCA1-D/2-DH/×FBPFVCP×NS/SBD, ×/PRR2013
Campolo et al. [19,20,22]802.11pDCF × / × NSB×, ×/PRR2013
Yin et al. [21]802.11pDCFH/ECBPNSBD, ×/PRR2014
Xiong et al. [28]802.11pEDCA1-D/2-DH/ECBPFVCP××NS/SB/U×, T/PRR2015
Proposed Model802.11pEDCA1-D/2-DH/EFBPFFPNS/SB/UD, T/PRR2017
Note: H/E: Hidden terminal/Erroneous channel, BBP: Backoff Blocking Probability, BSIP: Backoff Stage Increase Probability, AD: AIFS Differentiation, VC: Virtual Collision, CS: Channel Switch, D: Delay, T: Throughput, PRR: Packet Reception Rate, NS/S: Non-saturation/Saturation, B/U: Broadcast/Unicast, FCP: Frame Collision Probability, FBP: Frame Blocking Probability, FVCP: Frame Virtual Collision Probability, FFP: Frame Failure Probability, CBP: Channel Busy Probability.
Table 2. Default EDCA parameters in IEEE 802.11p.
Table 2. Default EDCA parameters in IEEE 802.11p.
ACCWminCWmaxAIFSN[AC]
3CWminCWmax9
2CWminCWmax6
1(CWmin + 1)/2 − 1CWmin3
0(CWmin + 1)/4 − 1(CWmin + 1)/2 − 12
Table 3. Summary of important symbols.
Table 3. Summary of important symbols.
SymbolDefinition
β The vehicle density on the highway (vehicles/m).
RThe transmission range of a node.
L c s The carrier-sensing range of a node.
L i n t The interfering range of a node.
N t r The number of nodes within the transmission/receiving range of tagged node.
N c s The number of nodes within the carrier-sensing range of tagged node.
N i n t The number of nodes within the interfering range of tagged node.
P ( j , l ) The probability that j vehicles exist within length l of the highway.
P i , a r r The arrival probability of i packets.
P i , e m p The probability that the type of i queue is empty.
ρ i The probability that at least one packet waits in the type of i queue.
P i , s u c The probability that a transmission attempt of an i packet is successful.
P i , b The backoff blocking probability that other nodes or other ACs in the same node is occupying the channel.
P i , f The probability that transmission of an i packet is failing.
P o c The external collision probability that an i packet collides with other nodes while accessing the channel.
P i , v c The virtual collision probability that an i packet collides with the higher priorities inside a node.
P i , c The collision probability of an i packet.
P i , e r r The i packet error probability caused by channel fading.
p b e r The bit error rate.
τ i The internal transmission probability that the probability of transmission attempt for access class i in a random time slot observed by the other ACs of the same station.
η i The external transmission probability that the probability of transmission attempt for access class i observed by other node.
η t o t a l The total transmission probability of a station.
P s , d r o p The probability that a WSA packet is dropped due to more than retransmission limit.
P b u s y The probability that the channel is busy in a time slot.
P i , s u c v The probability that the transmission attempt of an i packet is successful, conditioned on the fact that at least one station transmits in the considered time slot.
P c o l The probability that a transmission fails due to a collision given that there is at least one station transmits in the considered time slot.
P R R i The packet reception rate is the percentage of packets that successfully received to the number of packets transmitted.
T i , s u c The duration for successful transmitting an i packet.
T i , c o l The duration for a transmission collision caused by i traffic.
AIFS[i]The duration of AIFS of i traffic.
S I F S The duration of an SIFS.
m The maximum times the CW can be doubled.
mThe maximum retransmission number.
M l n The number of lanes in each direction on the highway.
δ The propagation delay.
σ A time slot.
T v u l n Vulnerable period during which the transmission of the tagged node may be subjected to hidden terminal interference.
T v i r t The average duration of a virtual time slot.
T S Y N C The duration of a synchronization interval.
T C C H I The duration of CCH interval.
T S C H I The duration of SCH interval.
T i The transmission delay of an i packet.
T i , s u c The time of successful transmission of an i packet.
T i , c o l The time of transmission collision of an i packet.
T A C K The time for transmitting an ACK packet.
H M A C The header length of MAC-layer of a packet.
H P H Y The header length of physical-layer of a packet.
L i The payload of an i packet.
L A C K The packet size of an ACK packet.
R d The transmission data rate on the CCH and SCH.
W e The CW size for safety packets.
W s , i The CW size for WSA packets in the ith backoff stage.
b I i The stationary distribution of idle state for i traffic.
b e , k The stationary distribution of backoff state k for safety traffic.
b s , i , k The stationary distribution of the backoff state k in stage i for WSA traffic.
1 μ i The average service time of i packets.
T Q i The queuing delay that the duration from the time instant when an i packet arrivals at the MAC layer queue to the time instant when it becomes the head of queue.
T S i The service time is the duration from the time instant when an i packet becomes the head of the queue to the time instant when this packet is transmitted or dropped.
D i The transmission delay is the time duration between the time instant that an i packet arrives at the queue to the time instant that this packet is successful transmitted or dropped.
γ The ratio of CCHI to SI.
N s c h The number of available SCHs in VAENTs.
G 1 The average number of successful SCHs reservation made on CCH.
G 2 The number of non-safety packets transmitted on all N s c h SCHs.
S d a t a The average total throughput of SCHs.
Note: i except W s , i and b s , i , k stands for e and s which means emergency (safety) and WSA, respectively.
Table 4. Parameter for communications in DSRC.
Table 4. Parameter for communications in DSRC.
ParameterValue
Frequency5.9 GHz
ModulationQPSK, 16QAM
Signal bandwidth10 MHz
Channel data rate ( R d )6, 12 Mbps
W e 8
W s , 0 16
AIFSN[0]3
AIFSN[1]6
m 2
Retry limit (m)4
S I F S 32 μ s
D I F S 64 μ s
Slot time ( σ )13 μ s
Propagation delay ( δ )1 μ s
Table 5. Parameter for road traffic.
Table 5. Parameter for road traffic.
ParamenterValue
Highway length6000 m
Number of lanes1 lane in each direction
Vehicle density ( β )0.01 to 0.08 vehicles/m
Transmission range (R)300 m
Carrier sensing range ( L c s )400 m
Packet arrival rate ( λ e ), ( λ s )5 packets/s
The bit error rate ( p b e r ) 10 5
MAC-layer header length ( H M A C )256 bits
Physical-layer header length ( H P H Y )192 bits
An ACK packet size ( L A C K ) H P H Y + 112 bits
The payload of a safety packet ( L e )200 Bytes
The payload of a WSA packet ( L s )160 bits
The payload of a non-safety packet ( L d a t a )2000 Bytes

Share and Cite

MDPI and ACS Style

Song, C. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks. Sensors 2017, 17, 2890. https://doi.org/10.3390/s17122890

AMA Style

Song C. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks. Sensors. 2017; 17(12):2890. https://doi.org/10.3390/s17122890

Chicago/Turabian Style

Song, Caixia. 2017. "Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks" Sensors 17, no. 12: 2890. https://doi.org/10.3390/s17122890

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop