Conference PaperPDF Available

A Directional Broadcast Protocol for Emergency Message Exchange in Inter-Vehicle Communications

Authors:

Abstract and Figures

Broadcast is an effective approach for safety-related information exchange to achieve cooperative driving in vehicular ad hoc network (VANET). However, it suffers from several fundamental challenges such as message redundancy, link unreliability, hidden terminal and broadcast storm, etc., which degrade the efficiency of the network greatly. To address these issues, this paper proposes a position based multi-hop broadcast protocol (PMBP) for emergency message dissemination in inter-vehicle communications. By adopting a cross-layer approach considering both the MAC and Network layers in the proposed scheme, the candidate vehicle for forwarding an emergency message is selected according to its distance from the source vehicle in the message propagation direction. Analysis and simulation results show that PMBP can not only quickly deliver emergency messages, but also reduce broadcast message redundancy significantly.
Content may be subject to copyright.
A Directional Broadcast Protocol for Emergency Message Exchange in
Inter-Vehicle Communications
Yuanguo Bi1,2, Hai Zhao1and Xuemin (Sherman) Shen2
1. Department of Computer Science and Technology, Northeastern University, Shenyang, 110004, China
2. Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada
Email: {ygbi, xshen}@bbcr.uwaterloo.ca, zhhai@neuera.com
Abstract Broadcast is an effective approach for safety-related
information exchange to achieve cooperative driving in vehicular
ad hoc network (VANET). However, it suffers from several funda-
mental challenges such as message redundancy, link unreliability,
hidden terminal and broadcast storm, etc., which degrade the
efficiency of the network greatly. To address these issues, this
paper proposes a position based multi-hop broadcast protocol
(PMBP) for emergency message dissemination in inter-vehicle
communications. By adopting a cross-layer approach considering
both the MAC and Network layers in the proposed scheme,
the candidate vehicle for forwarding an emergency message
is selected according to its distance from the source vehicle
in the message propagation direction. Analysis and simulation
results show that PMBP can not only quickly deliver emergency
messages, but also reduce broadcast message redundancy signif-
icantly.
I. INTRODUCTION
Inter-vehicle communications (IVC) [1] have recently drawn
much attention from government, academic community and
auto industry due to its support of safety related applica-
tions such as congestion avoidance, accident warning, and
comfort applications, e.g. entertainment, online game, weather
report and traffic data sharing, etc.. For instance, the U.S.
Federal Communications Commission (FCC) has approved
75MHz bandwidth for Dedicated Short-Range Communica-
tions (DSRC) systems in support of Intelligent Transportation
Systems (ITS) applications [2].
In IVC, how to effectively deliver emergency messages
to nearby and remote vehicles with low time latency in the
absence of topology information and roadside infrastructure is
a challenging research topic. Broadcast plays an important role
for information advertisements in traditional ad hoc network.
Nevertheless, it poses a series of problems to IVC. First,
lots of redundant messages may be exchanged, and a node
(the terms “node” and “vehicle” are used interchangeably
throughout the paper) could receive duplicate messages from
different neighboring nodes, which incurs a significant waste
of the limited network bandwidth. Second, since there are no
acknowledgements to broadcast messages, packet lost can’t
be neglected due to packet collisions, and consequently it is
probable that a node close to the accident spot may not be
able to receive the warning message. Similarly, hidden terminal
problem can also induce packet collisions due to the lack
of RTS/CTS handshake [3]. As a result, the unreliability of
broadcast messages would lead to more accidents. Finally,
This work was supported by China Scholarship Council (CSC) and the
Natural Science and Engineering Research Council (NSERC) of Canada.
without any rebroadcast control mechanisms, a node will
straightforward rebroadcast the received broadcast message.
This gives rise to the broadcast storm problem [4], which
would greatly consume bandwidth resource, and the network
collapses eventually.
To address the aforementioned issues, we propose a direc-
tional broadcast protocol, named PMBP, for multi-hop emer-
gency message dissemination. The highlights of the proposed
scheme includes: i) by a cross layer approach, the current
relaying node selects the neighboring node with the farthest
distance from the source node in the message propagation
direction as the next relaying node, which ensures emergency
messages can be delivered to remote nodes with the least
time latency; ii) At each hop, the emergency message is only
broadcast once, therefore, redundant broadcast messages are
greatly reduced; iii) by adopting revised RTS/CTS handshake,
there is no hidden terminal problem in PMBP, and it ensures
every node could correctly receive the emergency message,
which makes the scheme more reliable; and iv) the emergency
message has the highest priority to access the channel, and
it guarantees the emergency message be broadcast as soon as
possible.
The remainder of this paper is organized as follows. We
briefly review the related work in Sec. II. PMBP is proposed
in Sec. III. After introducing several important performance
metrics, we give detailed derivation of them in Sec. IV. The
simulation results are shown in Sec. V, followed by conclusions
in Sec. VI.
II. RELATED WORK
In [5], broadcast protocols in mobile ad hoc network
(MANET) are classified into four categories: i) simple flood-
ing [6,7], in which a node will directly rebroadcast the message
that is received at the first time, and finally all the connected
nodes receive this message; ii) probability based methods,
in which protocols are divided into two classes: a) a node
will rebroadcast the received broadcast message according to
a predefined probability, and this scheme falls into simple
flooding if the probability is set 1.0; b) a node decides whether
to rebroadcast a message based on the number of the same
messages received from neighboring nodes in a constant time
interval; iii) area based method, in which a node that can cover
more additional area is selected to rebroadcast the received
broadcast message; and iv) neighbor knowledge method, in
which a node makes a decision on forwarding the received
message according to the knowledge of its one-hop or two-
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings
978-1-4244-3435-0/09/$25.00 ©2009 IEEE
Authorized licensed use limited to: Yuan-Ze University. Downloaded on May 20,2010 at 05:49:20 UTC from IEEE Xplore. Restrictions apply.
hop neighbors. However, the protocols mentioned in [5] are
aimed to reduce redundant messages on the network layer, and
they don’t take hidden terminal problem, packet collisions, etc.
into consideration on the MAC layer. Therefore, they can’t
be directly applied to IVC, in which reliable broadcast for
emergency messages must be guaranteed.
Recently, some broadcast protocols have been proposed for
VANET. In [8], a node selects the farthest neighboring node
as the next hop relaying node. Nevertheless, each node must
maintain a neighboring node list which needs to be updated
frequently due to the fast movement of vehicles. In [9], a black
burst broadcast protocol is proposed for multi-hop emergency
messages exchange. On receiving a revised RTS packet, a node
sends channel jamming signal (black-burst) with the duration
proportional to the distance from the current relaying node,
and thus the farthest neighboring node wins the opportunity
to access channel. Another black-burst based scheme is also
proposed to provide deterministically prioritized access for
voice traffic in [10]. Nevertheless, the jamming signal greatly
consumes the channel resource, and the throughput of the
network drops eventually.
III. PROPOSED PMBP
In this paper, we adapt the priority based IEEE802.11e
protocol to support reliable emergency message broadcast in
IVC. By obtaining the position information (we assume that
each vehicle in the system is equipped with a GPS device)
from the revised RTS packet, PMBP selects the neighboring
node with the farthest distance from the source node in the
propagation direction as the next relaying node at each hop.
This process repeats until all nodes in the system get the
emergency message.
A. BRTS/BCTS handshake
In the proposed scheme, an emergency message is protected
by BRTS/BCTS handshake. As shown in Fig. 1, we add fields
position x,position y,em info into the traditional RTS
packet, and (position x,position y) is the position of the
current relaying node that prepares to broadcast the emergency
message. The field em info takes the information of the
source node which initially transmits the emergency message,
and it is constituted by: i) the source node address init addr,
the emergency message sequence number em seq, and the
source node position (init x,init y). Other fields in the BRTS
packet are the same as those in the RTS packet. Let Rrepresent
the transmission range of a node, and it is divided into a series
of distance block denoted by dis slot (actually its value should
be the average length of vehicles). Therefore, the value of the
duration eldinBRTSis:
tbrts d=tsif s +(R
dis slot )·tslot +tbcts +tsif s
+tdata +tsifs +tbrts
=3tsif s +tbcts +(R
dis slot )·tslot +tdata +tbrts ,
(1)
where tbrts,tbcts and tdata are the time for transmitting a
BRTS packet, a BCTS packet and an emergency message,
respectively, and tsif s,tslot denote SIFS interval and time slot.
A node with an emergency message broadcasts a BRTS packet
frame_control duration em_infoposition_yposition_x fcs
source_addrdestination_addr
init_addr init_yinit_xem_seq
Figure 1. Format of the BRTS packet.
first, and then starts the BRTS retransmission timer, the value
of which could be calculated by:
tbrts r=tbrts +tsif s +(R
dis slot )·tslot +tbcts.(2)
If there is no BCTS packet response within tbrts r, the node
will rebroadcast the BRTS packet until the rebroadcast time
reaches rmax. A neighboring node receives a BRTS packet,
and decides whether to reply a BCTS packet according to
the position information in the BRTS packet. If its position
is between the source node and the current relaying node, it
won’t reply a BCTS message and drop this BRTS message.
Otherwise it will start a defer timer and prepare to reply a
BCTS message. If a neighboring node at (x,y) prepares to reply
a BCTS packet, the time of the defer timer tdis set according
to both the distance to the source node at (init x,init y)
and the distance to the current relaying node at (position x,
position y), and denoted by:
d1=(xinit x)2+(yinit y)2,(3)
d2=(position xinit x)2+(position yinit y)2,
(4)
td=tsifs +((R(d1d2))
dis slot )·tslot,d
2<d
1.(5)
Therefore, the farthest neighboring node from the source node
defers the least time, and has the highest priority to reply a
BCTS packet. If other neighboring nodes that have already
started their defer timer hear a BCTS packet replying the
same BRTS packet, they will perform the following procedure:
i) stop the defer timer; ii) drop their BCTS packets; and
iii) update their network allocation vectors (NAVs) according
to the time duration included in the received BCTS packet.
After replying a BCTS packet, a node starts its retransmission
timer which would arouse a retransmission process (refer to
Sec.II.E). The duration field in a BCTS packet is used for up-
dating NAVs of the neighboring nodes to avoid hidden terminal
problem, and its value tbcts d=tsifs +tdata +tsif s +tbrts.
The time intervals tsifs ,tbrts are used to reserve channel for
the next hop BRTS broadcast as illustrated in Sec. II.C.
B. Emergency message broadcast
If the current relaying node successfully receives a BCTS
packet, it will broadcast the emergency message after a SIFS
interval. The farthest neighboring node that has just replied a
BCTS packet becomes the next relaying node after receiving
the emergency message, and it will broadcast a BRTS packet to
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings
Authorized licensed use limited to: Yuan-Ze University. Downloaded on May 20,2010 at 05:49:20 UTC from IEEE Xplore. Restrictions apply.
acknowledge this message after a SIFS interval. Every node
in the system has a list that is used to record all received
emergency messages, and each element of the list keeps the
address of the source node, and the sequence number of the
emergency message. Each node that receives an emergency
message will check the list to decide whether to drop this
message or receive it.
C. Multi-hop emergency messages relaying
To achieve delivering the emergency message as quickly as
possible, the proposed scheme adopts a cross layer method,
and the relaying node is selected by BRTS/BCTS handshake.
On receiving an emergency message, the farthest neighboring
node broadcasts a BRTS packet after a SIFS interval, which has
twofold objectives: i) it acknowledges the received emergency
message, and the relaying node considers that the emergency
message has been successfully received after receiving the
BRTS packet from its farthest neighboring node; and ii) it
selects next hop relaying node. Since the farthest neighboring
node has already reserved the channel by its previous BCTS
packet, it directly broadcasts its BRTS packet after a SIFS
interval on receiving the emergency message. A neighboring
node that hears this BRTS packet decides whether to reply a
BCTS packet according to the principle illustrated in Sec. II.A.
TAB LE I
PARAMETERS FOR DIFFERENT SERVICES
Service AC CWmin CWmax AIFSN
Best effort 0CW MIN CW MAX 2
Video probe 1CW MIN CW MAX 1
Vid eo 2(CW MIN+1)/2-1 CW MIN 1
Voice 3(CW MIN+1)/4-1 (CW MIN+1)/2-1 1
Safety 4(CW MIN+1)/8-1 (CW MIN+1)/4-1 1
D. Priority
In PMBP, we adapt the IEEE802.11e to support safety
related applications in IVC. Services in the system are divided
into five classes, and different classes of services have different
priorities to access the channel based on the access categories
(AC), as shown in Table I. The values of CW MIN and
CW MAX are defined the same as those in IEEE802.11b.
Complying with IEEE802.11e, after sensing the channel idle
for arbitration inter-frame space (AIFS) interval, a node will
start its backoff timer, and the computation of AIFS and
contention window (CW) are the same as IEEE802.11e. They
are:
AI F S[AC]=tsif s +AIF S N ·tslot,(6)
CW[AC ] = min (CW[AC ]+1)·PF,CWmax[AC].(7)
The value of persistence factor (PF) is set to 2.0 for all
services, and emergency messages have the highest priority to
access the channel by adjusting AIFS, CWmin and CWmax.
E. BCTS packet collisions
It is possible that two nodes in the same distance block
reply the same relaying node, therefore, BCTS packet colli-
sions occur. In the proposed scheme, a node starts a BCTS
retransmission timer after delivering a BCTS packet. If it has
not received an emergency message until the timer overflows,
it will start the backoff timer and retransmit the BCTS packet.
However, since the value of distance block is set to the average
length of vehicles, different vehicles can’t locate in the same
distance slot, and the probability of BCTS packet collisions
could be disregarded.
IV. PERFORMANCE ANALYSIS
In this section, to make the proposed scheme tractable, we
make the following assumptions:
1) All vehicles enter into a one-dimension highway from
the same entrance, and move in the same direction.
2) All vehicles run at the velocity v.
3) The number of vehicles that run into the entrance is
Poisson distributed, and λdenotes its mean value per
time unit.
4) The physical channel is reliable and error-free.
A. Number of informed nodes per hop
Let xdenote the random variable of vehicles that enter into
the highway between time [0, t], therefore the probability mass
function (PMF) of xcan be represented:
Pr
x(k)=(λ·t)k·e(λ·t)
k!,(8)
E(x)=λ·t. (9)
Since the number of vehicles that get into the entrance is Pois-
son distributed, the time interval between two adjacent vehicles
denoted by random variable yis exponential distribution with
parameter λ, and we have Pr
y(m)=λ.eλ·m. Let random
variable zrepresent the space between two adjacent vehicles,
and it is equal to v.y. We assume two adjacent vehicles are
within each other’s transmission range, so zR, and we have:
Pr(zn|zR)= 1e(λ·n
v)
1e(λ·R
v),(10)
E(z)= v
λR
e(λ·R
v)1.(11)
Finally, the average number of neighboring vehicles within
the transmission range of the current relaying node in the
emergency message propagation direction is:
E(w)=R
E(z)=R.λ ·(e(λ·R
v)1)
v·(e(λ·R
v)1) λ·R.(12)
B. End to end delay
The end to end delay defines the time taken from the source
vehicle to the last one. When a node detects an accident, it
will immediately initiate an emergency message and contend
for channel access, and consequently the first hop emergency
message exchange is contention based. However, from the
second hop, the emergency message exchange is contention
free since the current relaying node has reserved channel
resource for its BRTS packet by replying a BCTS packet to its
former relaying node. As a result, the time taken by delivering
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings
Authorized licensed use limited to: Yuan-Ze University. Downloaded on May 20,2010 at 05:49:20 UTC from IEEE Xplore. Restrictions apply.
an emergency message at the first hop is longer than that at
the following hops, and the end to end emergency message
delay Teis:
s=E(x)1
E(w),(13)
Te=Tf+(s1) ·T+Tl,s1,(14)
where Tfis the time taken at the first hop, and Tdenotes
one-hop delay at intermediate hops, and Tlrepresents the
time spent at the last hop. For the emergency message at the
first hop, Tf=AI F S(4) +B(4) +T(4)
d, where AI F S(4)
is arbitration inter-frame space, T(4)
dis the time taken for
exchanging an emergency message, while B(4) is the sum
of time taken in the backoff process, neighboring nodes’
collisions and neighboring nodes’ successful transmissions. We
can easily get the value of AIF S (4) from Eq. (6) and TABLE
I. As to T(4)
d, it includes the time of BRTS/BCTS handshake
and the time for broadcasting an emergency message. So, it
can be calculated as:
Td(4) =tbrts +tsif s +(RE(z)·E(w)
dis slot )·tslot
+tbcts +tsifs +tdata
=(RE(z)·E(w)
dis slot )·tslot
+2tsifs +tbrts +tbcts +tdata,(15)
B(4) is the time taken by the source node to access the
channel, and it has already been studied in many previous
work. Followed the analysis of the access delay in [11], B(4)
could be represented as:
B(4) =
rmax
1
j=0
((1 c4).c4j·E(Bj(4))
1c4rmax ),(16)
where c4is the collision probability of BRTS packets,
E(Bj(4))is the total time taken in the backoff process, defer-
ment due to neighboring nodes’ successful transmissions, and
delay caused by neighboring nodes’ collisions on backoff stage
j. Detailed derivation of c4and E(Bj(4))can be found in [11].
From the second hop of the emergency message exchange, the
relaying node only waits a SIFS interval to broadcast its BRTS
packet because it has reserved the channel by its previous
BCTS packet. So, T=tsifs +Td(4) . Since the number of
vehicles at the last hop may be less than E(w), consequently
Tlis probably larger than T, and it can be denoted:
Tl=tsifs +tbrts +tsif s +tbcts +tsif s +tdata
+(E(z)·(E(x)1) E(z)·E(w)·s)
dis slot )·tslot
=3tsif s +tbrts +tbcts +tdata
+(E(z)·(E(x)1E(w)·s)
dis slot )·tslot.(17)
When s=0, all vehicles are within the transmission range of
the source node, and the end to end delay can be obtained
from Tf.
C. Ratio of informed nodes to broadcasting nodes
In IVC, emergency messages should be broadcast as quickly
and reliable as possible with the least bandwidth consumption.
In other words, there should be less relaying nodes to rebroad-
cast the emergency message for covering all the nodes in the
system. Therefore, the ratio of informed nodes to broadcasting
nodes is an important metric to evaluate the performance of
IVC. In PMBP, there is only one relaying node to forward the
emergency message at each hop, and consequently the ratio is
1/E(w).
TAB L E I I
PARAMETERS IN SIMULATION
Parameter Value Parameter Value Parameter Value
tsifs 16 µsRTS 20byte dis slot 5m
tslot 16 µsCTS 14byte rmax 3
basic rate 2M BRTS 29byte v20m/s
data rate 11M BCTS 16byte CW MIN 31
R250m Emergency 100 byte CW MAX 1023
V. SIMULATION RESULTS
In this section, we consider the scenario where all vehicles
enter the highway from the entrance with the same velocity,
and after some time interval, the first vehicle initiates an emer-
gency message and delivers it to all other vehicles. To evaluate
the performance of the proposed protocol, we introduce several
important metrics as follows: i) end to end delay, which
defines the time taken by an emergency message from the first
vehicle to the last vehicle; ii) channel occupancy time, which
is the total time that channel is occupied for broadcasting an
emergency message to vehicles in the system; iii) informed
vehicles to broadcasting vehicles. We implemented PMBP in
NS2, and thoroughly evaluate the performance of PMBP. We
also implemented simple flooding for comparison, and the
parameters adopted in simulations are listed in TABLE II.
Fig.2 shows the comparison of end to end delay among
analysis of PMBP, simulation of PMBP and simulation of
simple flooding, and we have several observations. Firstly, at
the beginning, the delay in PMBP is slightly higher than that
in simple flooding, but with the increasing number of vehicles,
the delay in simple flooding is much greater than that in PMBP.
In PMBP, a vehicle detecting an accident must contend for
channel access at the first hop, and it also has overhead such
as BRTS, BCTS packets. Consequently its end to end delay is
higher than that in simple flooding. However, from the second
hop, a relaying node only waits a SIFS interval to deliver
its BRTS packet after receiving an emergency message, since
it has already reserved the channel by the previous BCTS
packet to the former relaying node. Nevertheless, in simple
flooding a relaying node must queue the received emergency
message, and then contend for channel access. Thus, its delay
is much higher than that in PMBP for multi-hop emergency
message propagation. Secondly, because from the second hop
the time spent at each hop is much less than that at the
first hop, the delay in PMBP doesn’t rise sharply with the
number of vehicles increasing. Finally, sometimes the delay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings
Authorized licensed use limited to: Yuan-Ze University. Downloaded on May 20,2010 at 05:49:20 UTC from IEEE Xplore. Restrictions apply.
decreases with the number of vehicles increasing in PMBP.
This is because that a neighboring node closer to the relaying
node takes longer time to reply the broadcasting BRTS packet
than a farther neighboring node, and consequently the delay
sometimes decreases with the number of vehicles increasing.
The channel occupancy time represents how long the chan-
nel would be occupied by the emergency message to be
received by remote vehicles. As shown in Fig. 3, the channel
occupancy time in simple flooding is much higher than that
in PMBP especially in large number of vehicles scenario. In
simple flooding, a node rebroadcasts the emergency message
which is received at the first time, and the channel resource is
wasted by lots of redundant packets. However, there is only
one relaying node to broadcast the emergency message at each
hop in PMBP. As a result, its channel occupancy time is much
less than that in simple flooding.
The proportion of informed vehicles to broadcasting vehi-
cles reflects the utilization of channel resource, and our goal
is to inform vehicles in the system with the least relaying
nodes. From Fig. 4, we can observe that the number of
broadcasting nodes in simple flooding is much larger than that
in PMBP. In simple flooding, the number of informed nodes
is equal to the number of relaying nodes, and the efficiency
of the network degrades obviously in dense vehicle scenario.
However, the number of relaying nodes in PMBP doesn’t have
any relationship with the number of informed nodes, and only
one node is selected to broadcast the emergency message in
each hop. As a result, PMBP works efficiently especially with
high node density.
Figure 2. End to end emergency message delay.
VI. CONCLUSIONS
In this paper, we proposed a position based multi-hop
broadcast protocol (PMBP) for emergency messages exchange.
Simulation and analysis results demonstrate that PMBP can
quickly deliver the emergency message with the less resource
consumption, and effectively reduce redundant messages. Fur-
thermore, PMBP has successfully resolved hidden terminal
problem and increased the reliability for safety applications.
For future work, we will consider complicate mobility models
which are more realistic, and other performance metrics will
be also evaluated.
Figure 3. Channel occupancy time.
Figure 4. Informed nodes to broadcasting nodes.
REFERENCES
[1] J. Luo and J. P. Hubaux, “A Survey of Inter-Vehicular Communication,”
Technical Report IC/2004/24, School of Computer and Communication
Sciences, PFL, 2004.
[2] Dedicated Short Range Communications Working Group, [Online],
Available: http://grouper.ieee.org/groups/scc32/dsrc/.
[3] L. X. Cai, X. Shen, J. W. Mark, L. Cai and Y. Xiao, Voice Capacity
Analysis of WLAN with Unbalanced Traffic, IEEE Trans. Veh. Technol,
vol.55, no.3, pp. 752-761, 2006.
[4] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, “The Broadcast Storm
Problem in a Mobile Ad Hoc Network,” Wireless Networks, vol. 8, no.
2/3, pp. 153-167, 2002.
[5] B. Williams and T. Camp, “Comparison of Broadcasting Techniques for
Mobile Ad Hoc Networks,” In Proc. of MobiHoc’02, pp. 194-205, Jun.
2002.
[6] C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath. “Flooding for Reli-
able Multicast in Multi-hop Ad Hoc Networks,” In Proc. of DIALM’99,
pp. 64-71, Aug. 20, 1999.
[7] J. Jetcheva, Y. Hu, D. Maltz, and D. Johnson. A Simple Protocol for
Multicast and Broadcast in Mobile Ad Hoc Networks. Internet Draft:
draft-ietf-manetsimple-mbcast-01.txt, Jul. 20, 2001.
[8] L. Briesemeister and G. Hommel, “Role-based Multicast in Highly
Mobile but Sparsely Connected Ad Hoc Networks,” In Proc. IEEE/ACM
Workshop MobiHOC, pp. 45-50, Aug. 2000.
[9] G. Korkmaz, E. Ekici, F. Ozguner, “Black-Burst-Based Multihop Broad-
cast Protocols for Vehicular Networks”, IEEE Trans. Veh. Technol,vol.
56, no. 5, pp. 3159-3167, Sept. 2007.
[10] P. Wang, H. Jiang, and W. Zhuang, “IEEE 802.11e Enhancements for
Voice Service,” IEEE Wireless Communications, vol. 13, no. 1, pp. 30-
35, Feb. 2006.
[11] D. X. Xu, T. Sakurai, H. L. Vu, “MAC Access Delay in IEEE 802.11e
EDCA,” In Proc of VTC’06 Fall, pp. 1-5, Sept. 2006.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings
Authorized licensed use limited to: Yuan-Ze University. Downloaded on May 20,2010 at 05:49:20 UTC from IEEE Xplore. Restrictions apply.
... Some of the requirements are needed in any network; however some of them are application-specific. For example, reliability is needed for broadcasting of the safety messages in every topology, however, dissemination of the messages in some directions are application-dependent [6] [7]. During this survey, we found that broadcasting protocols should satisfy as many of the following requirements as possible as follows . ...
... This issue can be obtained by minimizing the one-hop delay or the number of relay hops. 6. Independency of centralized station: due to the decentralized nature of VANET, the broadcasting protocol should not be based upon a centralized station. ...
... 1-2 Channel occupancy time is the total time that the channel is occupied while broadcasting an emergency message to vehicles in the system [6]. ...
Preprint
Full-text available
Broadcasting in vehicular ad hoc networks (VANETs) has become an active area of research. VANET applications are inherently broadcast-oriented and require the underlying communication protocols to be reliable and scalable. On the other hand, the conventional broadcast mechanism may lead to the so called broadcast storm problem, a scenario in which there is a high level of contention and an excessive number of broadcast packets suffer from collision, which will affect heavily both the reliability and scalability of the protocols. Recently, numerous papers have proposed different methods to solve the broadcast storm problem in vehicular ad hoc networks. In this paper, we survey these message dissemination techniques and classify them into various groups. Also, we explain the different topologies and scenarios used in each of these groups.
... alerts about emergencies or hazardous traffic conditions). These safety awareness systems involve collision warning systems, emergency message propagation systems and information systems specified [16][17][18]. Specifying vehicular syntax and semantic information, the hybrid system, like Vehicular Information Transfer Protocol (VITP), uses both of the pull and push models to generate distributed services in VANET. ...
... This mechanism enabled vehicles to dynamically handoff from V2V to V2I whenever the switchover decision allowed. Depending on the wireless access in vehicular environments system, the research in [16] addressed packet error rates for a normal V2X transmission mode. But it did not explore the connectivity process and reliability of the message propagation. ...
Article
Full-text available
Through Vehicular Ad-hoc Networks (VANET), Vehicle-to-Everything (V2X) contributes information communications for the cooperative driving in Vehicle Cyber Physical Systems (VCPS) at a traffic intersection vicinity. But the message propagation is often unreliable and slow due to the rapid change in network topologies and the high velocities or long distances among inter-vehicular in VANET. In order to achieve a reliable and fast message propagation for the cooperative driving in VANET, this study develops Seamless Connectivity-based Message Propagation Mechanism (SC-MPM), it is an opportunistic choice mode in VANET. This proposed mechanism can offer the seamless connectivity-based switchover procedure with a low-delay data optimization in V2X communications. The experimental analyses show that SC-MPM can recline message redundancy, increase message propagation velocity, and enhance data transmission reliability and validity in different traffic densities.
... The farthest node is whose timer expires first. PMBP [22] selects the farthest forwarding node according to its distance to the sender. However, these schemes in [11] [19][21] [22][23] may result in unreliability. ...
... PMBP [22] selects the farthest forwarding node according to its distance to the sender. However, these schemes in [11] [19][21] [22][23] may result in unreliability. This is because the time gap between beacon sending time of a neighboring node and the time at which that node becomes a forwarder may be very long. ...
Article
Reliability is a key requirement of multi-hop safety message broadcasting. DSRC/802.11p MAC layer has strict reliability requirement for ITS safety applications. In city environment, transmission in wireless medium is vulnerable to packet collisions and interferences. Cross channel interference is quite predominant in the presence of high rise buildings and concurrent transmissions. Achieving high reliability (e.g., 0.99) in the presence of all kinds of communication vulnerabilities is a major challenge in urban environments. To the best of our knowledge, none of the existing emergency message dissemination schemes, in the literature, achieves high reliability in lossy channel. In this paper, we propose a novel scheme that achieves high reliability for message dissemination while satisfying delay requirements, for various channel conditions. This paper proposes a new broadcast scheme, called Bayesian networks and unipolar orthogonal Code based Reliable multi-hop Broadcast (BCRB) to address this issue. Our objective is to guarantee strict reliability requirement (e.g., 99%) in each hop using broadcast repetitions. We propose an approach, based on using Bayesian networks, that exploits periodic beacons to accurately infer 802.11p link reception quality at each hop. Using this information, a sender determines an optimal number of repetitions, multiple forwarders and their positions. To combat interference, during broadcast repetitions, BCRB uses Uni-Polar Orthogonal Codes (UPOC). For multi-hop transmissions, multiple forwarders cooperatively communicate at each hop with the objective to achieve high broadcast reliability in next hop. Simulation results show that BCRB achieves very high reliability. Furthermore, BCRB satisfies delay requirements for time-sensitive vehicular applications with relatively low overhead. BCRB achieves 35-40% improvement in comparison to existing schemes.
... Different from the probabilistic channel access in IEEE802.11p, a deterministic channel access can guarantee an access to node at least once especially for non-delay-tolerant application. Distributed channel access schemes such as token ring strategy are presented for vehicular environment [16], [17]. Indeed, reference [17] focused on the inter-vehicle communication (IVC). ...
... We note that multi-hop data relaying or delivery was implicitly supported in all simulations. We used, through simulations, the communication density metric given by equation (16), [15] to study the performance of our scheme. ...
Article
Full-text available
High electric vehicles (EVs) penetration is expected to increase smart grid solicitation especially with various EV charging demands. As result, the EV charging process at the supply station has to be managed in the way to promote the EV satisfaction level while preserving smart grid stability. In this paper, the bidirectional power flow between EV and grid; Grid-to-Vehicle (G2V) and Vehicle-to-Grid (V2G), is exploited. We make a profit from the unused electric power of EVs and we present an EV load management technique based on EV charging and EV discharging coordination. We propose a peak load management model (PLM) used to schedule EVs for charging or discharging service according to the power demand with the timing and location where each EV need to be served. Also, we propose an Electric Vehicle Supply Equipment (EVSE) selection model to guide EVs to the supply station. We develop a mathematical formalism for handling requests for EV charging/discharging at EVSE based on queuing theory. Those models are evaluated while considering the mobility of vehicles in an urban scenario and time-of-use-pricing (TOUP). Finally, extensive matlab simulations are conducted to validate the proposed approach and demonstrate its effectiveness.
... Thus, the sender remains unaware of message dissemination and starts rebroadcasting. PMBP [32] selects the farthest forwarding node according to its distance to the sender. Similarly, ROFF [33] selects the farthest node using distance to the sender. ...
... However, one-hop broadcast reception rate is lower in farthest positions due to channel fading [20]. As a result, ROFF [33], PMBP [32] 3P3B [35], "Abiding Geocast" [6] and PAB [7] perform multiple timer-based retransmissions which do not satisfy delay requirements of safety-related applications. CLBP [34] selects a single forwarding node and makes use of BRTS/BCTS packets to prevent hidden terminal problem. ...
Article
Vehicular safety applications based on DSRC/802.11p have strict reliability requirement (greater than 0.99). However, it is difficult to achieve high reliability in wireless medium as the transmission is vulnerable to various wave propagation issues. To the best of our knowledge, none of the existing emergency message dissemination schemes, in the literature, achieves a predefined reliability in lossy channel. In this paper, we propose a novel scheme, called Reliable Emergency Message Dissemination scheme (REMD), that achieves a predefined reliability for message dissemination while satisfying delay requirements, for various channel conditions. We aim to guarantee very high reliability (e.g., 99%) in each hop, with low control overhead while keeping low end-to-end latency for time critical applications. We employ zero-correlated unipolar orthogonal codes (UPOC) to combat hidden terminal problem. We exploit periodic beacons, to accurately estimate reception quality of 802.11p wireless link in each cell; then, we use this information to determine optimal number of broadcast repetitions in each hop. In addition, to ensure reliability in multi-hop, we utilize cooperative communication. Simulation results show that REMD outperforms existing well-known schemes in the literature.
... However, the existing works focus on the scenarios of the intersection and the straight road, and few contributes to the relay-node selection on the curve road. In [7] and [8], Bi [10], which can be applied on both the straight road and the intersection. Moreover, in our earlier works [11]- [13], we developed an exponential partition mechanism and designed two methods which are suitable to the scenarios of the above two road structures, respectively. ...
... The vehicles are distributed on the road following Poisson distribution [7], [8], [10], and the probability of the vehicle number X on the road of the length l is given as ...
Article
Full-text available
In vehicular networks, the selection of the relay-node determines the message dissemination through the vehicle-to-vehicle communication. However, the irregular shape of the curve road makes it difficult to design and analyze the relay-node selection on the curve road. In this paper, a relay-node selection on the curve road is first proposed, which aims to a fast message delivery and a complete coverage of the curve road, namely the complete relay-node selection. Additionally, after defining a metric of the curving rate, the models are constructed to analyze the performances of our proposal in terms of the message dissemination speed and packet delivery rate. Simulations on a realistic mountain road are conducted. Moreover, the up-to-date relay-node selection methods are adapted to suit the scenario of the curve road for the comparison. The results of the simulations prove the validation of the analytic models and the significant performances improvement of our proposal. The attractive benefits include not only the stable performance against the vehicle density in terms of the message dissemination speed and packet delivery rate but also the improvements of at least 16.20% gain compared with these adapted methods in terms of the message dissemination speed as well as the packet delivery rate of more than 99.7%.
... The opportunistic data dissemination where each node collects the mobility pattern for the distant nodes of their vicinity and selects the next forwarding node. This mechanism avoids the intermittent connectivity and increases the packet delivery ratio [21,22]. ...
Article
The safety information dissemination plays a vital role in the VANET communication. It is a technique of transmitting the information at scheduled intervals or during road hazards by detecting the events using onboard system and interfaces. Information is shared between vehicles and road side units which are further used to predict vehicle collisions, road line crossings, environmental warnings, traffic data and road hazards. Interestingly the risk of lateral collisions and dense traffic for vehicles can be avoided by accomplishing fast data dissemination i.e. warning alerts by event detection. Vehicular technology which supports the safe mode of transportation is growing faster due to the deployment of new automated technology in the intelligent transportation system (ITS). The different scenarios used in vehicular communication are Vehicle to Vehicle (V-V), Vehicle to Infrastructure (V-I) and Vehicle to Internet. Some of the important characteristics of vehicular communications are the mobility, frequent changes in topology, varying transmission power of antennas, intermittent connectivity. ITS providing the solutions for most critical transportation issues and inspiring the researchers for the betterment of road safety. In this paper, we propose a multi agent based safety information dissemination scheme for vehicle to vehicle communication. The proposed algorithm performs the safety information dissemination with help of intelligent agents by optimizing the channel access techniques, message encoding and selection of intermediate nodes. Here the communication between source and destination is achieved with fever number of intermediate links by selecting the nodes in the special zone. Short interval codes which represent safety information are effectively transmitted in the intermittent nature of wireless connectivity. This proposed work describes the details of algorithm with associated network environment, multi agent functions and dissemination mechanism to illustrate the improvement in end to end delay, PDR, energy constraints etc. This method reduces the problem of broadcast storm by delivering the information to intended node. Simulation of the proposed work gives the improved results on PDR, latency and connection overhead.
Article
The design of the emergency communication vehicle is centered around the overall layout, which is characterized by the fact that the vehicle chassis is mostly purchased parts and is equipped with an insulated and insulated box, mainly used for instrument operation and equipment placement. The emergency communication vehicle cabin environment includes: cabin seats; seat cover; control cabinet, including operation keyboard, display screen, etc; The ceiling and carpet that make up the interior space of the car; Storage box for storage equipment; tool cabinet; cabin control system facilities; Fire prevention and extinguishing facilities in the cabin; various handrails, coat racks, short ladders, lighting facilities, etc. inside the car. The design of emergency communication vehicle interior environment involves multiple disciplines, and the selection of design schemes requires scientific and reasonable evaluation methods to select reasonable schemes for optimization design. The evaluation of emergency communication vehicle cabin’s internal environment design is classical multiple attribute decision making (MADM) problems. In this article, based on bidirectional projection and grey relational projection measure, we shall propose some projection models with q-rung orthopair fuzzy sets (q-ROFSs). First of all, the definition of q-ROFSs is introduced. Furthermore, some projection models with q-ROFSs are proposed based on the bidirectional projection and grey relational projection model. Based on developed weighted projection models, the MADM model is established and all computing steps are simply depicted. Finally, a numerical example for evaluation of emergency communication vehicle cabin’s internal environment design is given to illustrate this new model and some comparisons are conducted to illustrate advantages of the new built method.
Chapter
Wireless technologies have witnessed an enormous development over the past few years. This technology allows communication even between mobile devices, which are called as mobile ad hoc networks (MANETs). Intelligent traffic control systems employ that part of MANET which allows communication between vehicles, called vehicular ad hoc networks (VANETs). This chapter proposes the use of VANET to ensure efficient traffic management and safe driving of vehicles in India. Two topology-based protocols are taken into consideration for simulation. It also analyzes the way in which communication takes place while using different protocols and proposes a suitable protocol and frequency for the corresponding application.
Conference Paper
Full-text available
In this paper, we analyze the MAC access delay of the EDCA mechanism in the IEEE 802.11e standard under saturation. We model the effect of differentiation based on both contention window size and inter-frame spacing. Explicit expressions for the mean, the standard deviation and the generating function of the distribution of the access delay are obtained. By applying numerical inversion on the generating function, we are able to compute values of the distribution. We show that our analytical model is accurate through comparison with simulation.
Conference Paper
Full-text available
Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently (such as finding a route to a particular host, paging a particular host, and sending an alarm signal). Because radio signals are likely to overlap with others in a geographical area, a straightforward broadcasting by flooding is usually very costly and will result in serious redundancy, contention, and collision, to which we call the broadcast storm problem. In this paper, we identify this problem by showing how serious it is through analyses and simulations. We propose several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcasts to alleviate this problem. Simulation results are presented, which show different levels of improvement over the basic flooding approach.
Article
Full-text available
Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently (such as finding a route to a particular host, paging a particular host, and sending an alarm signal). Because radio signals are likely to overlap with others in a geographical area, a straightforward broadcasting by flooding is usually very costly and will result in serious redundancy, contention, and collision, to which we call the broadcast storm problem. In this paper, we identify this problem by showing how serious it is through analyses and simulations. We propose several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcasts to alleviate this problem. Simulation results are presented, which show different levels of improvement over the basic flooding approach.
Conference Paper
Full-text available
We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special needs of inter-vehicle communication: rather than by explicit identification, a multicast group is defined implicitly by location, speed, driving direction and time. As an example, we study a road accident that is reported to nearby vehicles. We focus on sparse deployment of the system which is likely to occur soon after the system is introduced to the market. In this state, the resulting ad hoc network tends to be disconnected. We tailor the proposed algorithm to overcome this problem of network fragmentation. Simulations show us the quality of the proposed protocol by measuring how many vehicles inside a multicast area are informed in time under various conditions
Article
Full-text available
Motivated by the promising voice over IP technology and the wide service availability of WLANs, the application of voice over WLAN (VoWLAN) is expected to experience dramatic growth in the near future. Originally designed for high-rate data traffic, WLANs may experience bandwidth inefficiency when supporting delay-sensitive and low-rate voice traffic. This article proposes mechanisms to enhance QoS support capability of IEEE 802.11e for voice service. Unnecessary polling of silent voice stations is avoided, and header and control overheads are suppressed significantly. Compared to IEEE 802.11e, our mechanisms can greatly improve the capacity of WLANs to support voice service.
Article
Full-text available
An analytical model to study the performance of wireless local area networks (WLANs) supporting asymmetric nonpersistent traffic using the IEEE 802.11 distributed coordination function mode for medium access control (MAC) is developed. Given the parameters of the MAC protocol and voice codecs, the voice capacity of an infrastructure-based WLAN, in terms of the maximum number of voice connections that can be supported with satisfactory user-perceived quality, is obtained. In addition, voice capacity analysis reveals how the overheads from different layers, codec rate, and voice packetization interval affect voice traffic performance in WLANs, which provides an important guideline for network planning and management. The analytical results can be used for effective call admission control to guarantee the quality of voice connections. Extensive simulations have been performed to validate the analytical results
Article
As a component of the intelligent transportation system (ITS) and one of the concrete applications of mobile ad hoc networks, inter-vehicle communication (IVC) has attracted research attention from both the academia and industry of, notably, US, EU, and Japan. The most important feature of IVC is its ability to extend the horizon of drivers and on-board devices (e.g., radar or sensors) and, thus, to improve road traffic safety and efficiency. This paper surveys IVC with respect to key enabling technologies ranging from physical radio frequency to group communication primitives and security issues. The mobility models used to evaluate the feasibility of these technologies are also briefly described. We focus on the discussion of various MAC protocols that seem to be indispensable components in the network protocol stack of IVC. By analyzing the application requirements and the protocols built upon the MAC layer to meet these requirements, we also advocate our perspective that ad hoc routing protocols and group communication primitives migrated from wired networks might not be an efficient way to support the envisioned applications, and that new coordination algorithms directly based on MAC could be designed for this purpose.
Conference Paper
We evaluate the performance of voice transmission over a single-AP WLAN analytically and via simulation. Given the parameters of the medium access control protocol and different voice codecs, the voice capacity of the WLAN, in terms of the maximum number of voice connections that can be supported by the WLAN with satisfactory user-perceived quality, is obtained. Our analysis is applicable for unsaturated-station scenarios, and considers the practical issue induced by the unbalanced traffic. Extensive simulations have been performed to validate the analytical results.
Article
In this paper, two IEEE 802.11-based multihop broadcast protocols, namely urban multihop broadcast and ad hoc multihop broadcast, are proposed to address the broadcast storm, hidden node, and reliability problems of multihop broadcast in vehicular networks. In the proposed protocols, the functions of forwarding and acknowledging the broadcast packet are assigned to only one vehicle by dividing the road portion inside the transmission range into segments and choosing the vehicle in the furthest nonempty segment without a priori topology information. The simulation results confirm that our protocols have very high success rate and efficient channel utilization when compared with other flooding-based protocols. It is also concluded that there is no need for infrastructure support unless the line of sight among different road segments incident to an intersection is blocked with obstacles.