ArticlePDF Available

Saturation throughput analysis of WAVE networks in Doppler spread scenarios

Wiley
IET Communications
Authors:
  • Universidad Nacional Amazónica de Madre de Dios

Abstract and Figures

IEEE 802.11p, also known as wireless access in vehicular environment (WAVE), extends the applications of IEEE 802.11 to a fast fading vehicular communication environment. In WAVE systems, Doppler effect should not be ignored because of the high velocity of vehicles. Hence, in this paper the authors study the characteristics of physical layer WAVE system in the presence of the Doppler spectrum, such as symbol error rate performance and inter-subcarrier interference power. The throughput performance expression of a WAVE system is derived theoretically, which is the function of the frame size, number of the nodes, transmission probability, frame error rate and Doppler spread. Based on the obtained expressions, the optimal frame size, transmission probability and the number of nodes supportable in the WAVE system are derived to evaluate the maximum throughput performance. Finally, to validate the analytical results, simulations have been conducted to show the effectiveness of the proposed scheme.
Content may be subject to copyright.
Published in IET Communications
Received on 1st February 2009
Revised on 7th September 2009
doi: 10.1049/iet-com.2009.0071
In Special Issue on Vehicular Ad Hoc and Sensor Networks
ISSN 1751-8628
Saturation throughput analysis of WAVE
networks in Doppler spread scenarios
T. Luo
1
Z. Wen
1
J. Li
1
H.-H. Chen
2
1
Key Laboratory of Universal Wireless Communications, Ministry of Education; School of Information and Telecommunication
Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, People’s Republic of China
2
Department of Engineering Science, National Cheng Kung University, 1 Da-Hsueh Road, Tainan City 70101, Taiwan
E-mail: tluo@bupt.edu.cn
Abstract: IEEE 802.11p, also known as wireless access in vehicular environment (WAVE), extends the applications of IEEE
802.11 to a fast fading vehicular communication environment. In WAVE systems, Doppler effect should not be ignored
because of the high velocity of vehicles. Hence, in this paper the authors study the characteristics of physical layer WAVE
system in the presence of the Doppler spectrum, such as symbol error rate performance and inter-subcarrier
interference power. The throughput performance expression of a WAVE system is derived theoretically, which is the
function of the frame size, number of the nodes, transmission probability, frame error rate and Doppler spread.
Based on the obtained expressions, the optimal frame size, transmission probability and the number of nodes
supportable in the WAVE system are derived to evaluate the maximum throughput performance. Finally, to validate
the analytical results, simulations have been conducted to show the effectiveness of the proposed scheme.
1 Introduction
As an amendment to the existing IEEE 802.11 standard, IEEE
802.11p, which is also known as dedicated short-range
communications standard of North America, has been
proposed and has attracted a lot of attention recently [1– 6].
IEEE 802.11p, also called wireless access in vehicular
environment (WAVE), works to provide many applications in
vehicle-to-vehicle communication networks. Because of the
high mobility of the vehicles, which may yield an inconstant
topology of a WAVE network, it is extremely difficult to
deploy a MAC scheme with a centralised controller, such as
the ones working on time division multiple access (TDMA)
and frequency division multiple access (FDMA). It is well
knownthatcarriersensemultipleaccesswithcollision
avoidance (CSMA/CA) is a MAC scheme that does not
require a central controller, in which each node works by
detecting the wireless channel first and transmitting only if
the channel is free. An enhanced distributed channel access
(EDCA) scheme, which also uses CSMA/CA,willbeused
as one of the MAC protocols for 802.11p systems. Many
previous works on CSMA/CA schemes reported in the
literature were based mainly on IEEE 802.11b protocol over
slow fading channels, such as the works given in [7, 8] for a
lossless channel, and those in [9 12] for a lossy channel,
respectively. The works reported in [9, 10] considered a
constant frame error probability only for data frames and
ignored the errors of control frames. The study carried out in
[11] calculated the average probability of transmission errors
without considering the use of two-dimensional Markov
chain. Based on the concept of virtual slots defined in [11],
the authors in [12] extended the analysis done in [7, 8] to
study the saturation throughput for a lossy channel.
However, in a WLAN system based on multicarrier
modulation, such as IEEE 802.11a/g/p, Doppler effect should
not be ignored because of their sensitivity to the frequency
synchronisation [4, 13– 16]. For example, in [4], based on the
parameters of IEEE 802.11a, the maximum Doppler spread
fdinsuburban,highway,andruralis0.583,1.53and
1.11 kHz, and the corresponding minimum 90% coherence
time tcis 1, 0.3 and 0.4 ms, respectively. Particularly, Doppler
effect is more serious in IEEE 802.11p systems because of the
high velocity of vehicles. In a 802.11p system, when 10 MHz
bandwidth is adopted, the Doppler spectrum with 10.8 km/h
and 216 km/h is about 59 Hz and 1.18 kHz, respectively.
Although it is much less than the bandwidth of the subcarriers
(156.25 kHz), the performance deterioration caused by the
Doppler spread should not be ignored. This is because the
time variations of the channel destroy the orthogonality of
IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825 817
doi: 10.1049/iet-com.2009.0071 &The Institution of Engineering and Technology 2010
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
the different subcarriers and generate power leakage among the
subcarriers, known as inter-carrier interference (ICI). Wang
et al. [13] and Stantchev et al. [14] studied performance
distortions because of Doppler spreading in orthogonal
frequency division multiplexing (OFDM) systems such as
802.11a and digital video broadcasting (DVB) systems. For
example, in [13], when the system is operating at a signal to
noise ratio (SNR) of 40 dB in a vehicle travelling at a speed
of 200 km/h and with uncoded 16-QAM modulation, the
average symbol error rates (SERs) of IEEE 802.11a system
with/without Doppler spread are 3.5 ×10
24
and
1.8 ×10
24
, respectively, increasing by 1.94 times, whereas
the SERs of a DVB system operating in the CS2 mode are
2.78 ×10
22
and 1.8 ×10
24
, respectively, increasing by 500
times. Moreover, there is an error floor because of Doppler
spread [13]. Therefore in order to evaluate the distortions to
a WAVE system, in this paper, the ICI power, SER
performance and throughput performance are studied jointly
in the presence of the Doppler spectrum, and their
expressions are theoretically derived.
The rest of the paper is outlined as follows. In Section 2, the
ICI power and SER performance of WAVE systems are
derived theoretically in the presence of Doppler spectrum.
Then, in Section 3, the saturation throughput performance
of WAVE systems is analysed in Doppler spread scenarios.
Finally, in Section 4, numerical results will be presented,
followed by the conclusions drawn in Section 5.
2 ICI and SER analysis in Doppler
channels
It is well known that WAVE systems use binary phase-shift keying
(BPSK)/quadrature phase shift keying (QPSK)/quadrature
amplitude modulation (QAM) based OFDM modulation
schemes. Hence, for analysis convenience, M-PSK-based
OFDM is considered in this paper. Let us consider an OFDM
system with Nsubcarriers.Thesamplingrateandtheduration
of OFDM symbol are denoted by Tbans T, respectively.
Obviously, we have T=NTb. The impulse response of the
time-variant channel, h(n,l), denotes the tap gain of the lth tap
at time n. Then, in this paper, with the assumption of the
perfect sampling and symbol timing synchronisation, the kth
(0 kN1) output of the FFT demodulator at the
receiver, R(k), can be written as follows
R(k)=1
N
N1
n=0
N1
m=0
d(m)Hm(n)ej2
p
n(mk)/N+
v
(k) (1)
where d(m), the mth input pin of the IFFT operation, is an
M-PSK modulated symbol,
v
(n) is the additive white Gaussian
noise with zero mean and variance
s
2
v
and Hm(n)istheFourier
transform of the channel impulse response at time n,whichis
defined as
Hm(n)=
L01
l=0
h(n,l)ej[2
p
n1/N+
f
(n)]ej2
p
lm/N(2)
where L0is the number of the multipath returns, 1=DfT and
f
(n) are defined as the normalised carrier frequency offset and
phase noise, respectively, which can be caused by either Doppler
spread or unstable crystal oscillator or both. In a land mobile
fading channel, Doppler effect is considered, and h(n,l)is
assumedtobesatisedwithacomplexwhiteGaussianprocess
with zero mean, variance
s
2
hand autocorrelation function as [15]
r
WE{h(n1,l1)h(n2,l2)}
=cJ0
2
p
fdT(n1n2)
N

el1/L0
d
(l1l2) (3)
where J0() is the zeroth order Bessel function of the first kind
[17]. Particularly, in a slow fading channel, we have
r
¼1.
For analysis convenience, in a time-variant channel, R(k)
in (1) can be separated to three parts: a desired item d(k),
ICI I(k) and the noise item
v
(k). Thus, (1) can be
rewritten as
R(k)=d(k)
N
N1
n=0
Hk(n)+1
N
N1
m=0,m=k
d(m)
×
N1
n=0
Hm(n)ej2
p
n(mk)/N+
v
(k)
=d(k)
N
N1
n=0
Hk(n)+1
NI(k)+
v
(k) (4)
For an M-PSK symbol, we have E[|d(k)|2]=1. Hence, from
(4), the instant SNR
g
(k) and the normalised ICI power
PICI(k) of the kth subcarrier can be deduced (the detail
derivation can be found in the appendix) as (see (5))
where E() denotes the expectation operation. Fig. 1
illustrates the normalised ICI power against Doppler spread
fdTwith different frequency offsets 1¼0, 0.01, 0.1,
g
(k)=|N1
n=0Hk(n)|2
|I(k)|2+N2
s
2
v
PICI(k)=E[|I(k)|2]
E[|N1
n=0Hk(n)|2]
=N1
m=0,m=kN1
n1=0N1
n2=0J0{2
p
fdT(n1n2)/N}ej[(2
p
(n1n2)(mk+1)/N)+
f
(n1)
f
(n2)]
N1
n1=0N1
n2=0J0{2
p
fdT(n1n2)/N}ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)]
(5)
818 IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825
&The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0071
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
respectively. It is shown from (5) and Fig. 1 that the ICI power
caused by Doppler spread and frequency offset increases with
fdTand 1, and thus the performance is degraded. Hence, the
Doppler effect and its resultant frequency offset have a negative
influence on the system performance, and need to be
eliminated in the time-variant channel.
In fact, if it is a time-invariant channel with 1=0,
f
(n)=const, (4) and (2) then become
R(k)=H(k)d(k)+
v
(k)
H(k)=
L01
l=0
h(l)ej2
p
lk/N
(6)
From (6), there is no ICI in this case, and only frequency-
selective fading exists. As we know, when BPSK or QPSK
modulation is adopted, the instant SER of the kth subcarrier
over additive white gaussian noise (AWGN) channel is [17]
Pb(
g
)=
P2=Q
2
g
(k)

, for BPSK
P4=2Q
g
(k)

Q2
g
(k)

,forQPSK
(7)
respectively. Hence, based on (5) and (7), the average SER in
the Rayleigh fading channel can be obtained by Ps=E[Pb(
g
)]
[17],whereh(n,l) is assumed to be a complex white Gaussian
process with zero mean, variance
s
2
hand the autocorrelation
function defined in (3). Obviously, it is hard to obtain its
closed form. Consequently, the numerical calculation and
computer simulation are used in the following section of the
paper. Then, it follows that the average frame error rate
(FER) in a fading channel is
Pe=1(1 Ps)L(8)
where Lis the number of symbols in a data frame.
3 Saturation throughput of IEEE
802.11P
The draft IEEE 802.11p standard will make use of the
physical layer architecture of IEEE 802.11a and the MAC
layer QoS amendments from IEEE 802.11e [13].In
IEEE 802.11p draft, four different QoS classes are defined
by prioritising the data traffic within each node. It implies
that each node maintains four different queues, which have
different arbitration interframe spaces (AIFS) and different
backoff parameters, In other words, the higher priority, the
shorter AIFS will be. In IEEE 802.11p draft, EDCA
scheme is used as MAC protocol. It is well known that
EDCA works based on CSMA/CA, meaning that the
node starts by listening to the channel first, and if it is free
for an AIFS, the node may start transmission immediately.
If the channel is busy or becomes busy during the AIFS,
the node must perform a backoff. The backoff procedure in
IEEE 802.11 works according to a procedure described as
follows [2, 3]:
1. generate an integer from a uniform distribution [0,W];
2. multiply this integer with the slot time derived from the
physical layer in use to obtain a backoff value;
3. decrement the backoff value only when the channel is idle;
4. when reaching a backoff value of zero, send packet
immediately.
The MAC protocol of IEEE 802.11 is a stop-and-
wait protocol and therefore the sender awaits an
acknowledgment (ACK). If no ACK is received as a result
from any of the events defined as follows: the transmitted
packet never reaching the recipient, the packet being
incorrectly received, or the ACK being lost or corrupted, a
backoff procedure is invoked before a retransmission is
allowed. For every attempt to send a specific packet, the
size of the contention window (W) will be doubled from
its initial value (W
start
) until a maximum value (W
end
)is
reached. This is important because of the fact that during
high utilisation periods, it is vital to spread in time the
nodes that want to transmit. After a successful transmission
or when a packet has to be thrown away because the
maximum number of channel access attempts is reached,
the contention window will be set to its initial value again.
Hence, we can directly extend the discrete Markov chain
model from [7, 9], which was proposed for its applications
in 802.11b to 802.11p systems by taking the Doppler effect
into account. That is, the unsuccessful transmission packets
may be caused by either collision and/or transmission bit
errors in a wireless fading channel. Additionally, we also
assume the finite number of retransmission attempts,
(m+f+1), after which the frame is discarded from the
transmit queue and a new frame is admitted in the queue.
Figure 1 Normalised ICI power against Doppler spread f
d
T
IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825 819
doi: 10.1049/iet-com.2009.0071 &The Institution of Engineering and Technology 2010
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
3.1 Throughput analysis
For analysis convenience in studying the MAC protocol of
IEEE 802.11p, we might as well consider a vehicular
communication network with a finite number of nodes, or
N. Assume that
t
denotes the transmission probability
of each node at a randomly given slot, and thus Pc=1
(1
t
)N1denotes the FER because of collisions with
other nodes. Hence, the probability of an unsuccessful
(re)transmission attempt seen by a tag node as its frame is
being transmitted in the channel is
Pf=1(1 Pc)(1 Pe)
which is also the transition probability from one state to
another in the Markov model as defined in [7, 9].
Obviously,
t
and Pfdepend on each other according to a
non-linear function. However, they can be resolved by
using numerical techniques and there is a single solution of
t
=f(N,W,m,f,Pe)
for each given N,W,m,fand Pe[9, 10].
Consequently, the saturation throughput of an IEEE
802.11p network in an error-prone channel can be
calculated as follows [9]
ST =PsPtr(1 Pe)E[L]
(1 Ptr)
s
+PtrPs(1 Pe)Ts+Ptr(1 Ps)Tc+Ptr PsPeTe
(9)
where E[L] is the average frame payload size, Ptr is the
probability of at least one node in transmission in the
observed time slot
s
and Psis the probability of a single
successful transmission given that at least one node (out of
all Nnodes) is transmitting. After
t
is given, Ptr and Pscan
be deduced by
Ptr =1(1
t
)N
Ps=N
t
(1
t
)N1/Ptr
(10)
where Ts,Tcand Testand for the average time that the channel
is sensed busy by each node because of a successful
transmission, that it is sensed busy during a collision, and
that it is sensed busy from a frame which suffered
transmission errors, respectively. In CSMA protocol, it is
clear that we always have Te=Ts. Assume that the
preamble/header of a frame is always received successfully by
all nodes, and the frame errors can occur only in the
remaining part of the frame [9]. Then, in an IEEE 802.11p
system, Tsand Tccan be defined as follows (see (11))
where
CWPHYpre/hdr +MAChdr +AIFS
BWSIFS +ACK
are all constants, Rbis the bit rate in transmission, ‘pre’ and
‘hdr’ denote the preamble and header, respectively, and
SIFS refers to short interframe space. Moreover, we have
AIFS ¼AIFSN ×
s
+SIFS [1, 2]. For convenience, let
AIFSN ¼2,
s
¼20 ms and then AIFS ¼50 ms.
Substituting (8), (10) and (11) into (9), and we assume that
the sizes of all frames are equal to L, that is, E[L]¼L. The
saturation throughput of a WAVE system then becomes
(see (12))
3.2 Relationship between throughput
and system parameters
The relationship between saturation throughput and the
system parameters, for example, frame size L, number of
nodes N, transmission probability
t
, SER Ps, and Doppler
spread fd, will be discussed in this section.
1. ST L relationship: From (12), we can see that the
throughput is approximately proportional to the frame size
when Lis small. That is, the throughput performance
increases from zero with L. Moreover, because of Ps,1, we
always have limL1(1 Ps)L=0 and thus limL1
ST =0. Therefore there may be an optimal value for L
Ts=(PHYpre/hdr +MAChdr +L+SIFS +ACK +AIFS)
Rb
=(B+C+L)
Rb
Tc=(PHYpre/hdr +MAChdr +L+AIFS)
Rb
=(C+L)
Rb
(11)
ST =N
t
(1 Pe)E[L]
(1
t
)
s
+N
t
(1 Pe)Ts+[(1
t
)N+1(1
t
)N
t
]Tc+N
t
PeTe
=N
t
(1 Ps)LL
(1
t
)
s
+N
t
Ts+[(1
t
)N+1(1
t
)N
t
]Tc
=N
t
(1 Ps)LLRb
(1
t
)
s
Rb+N
t
(B+C+L)+[(1
t
)N+1(1
t
)N
t
](C+L)(12)
820 IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825
&The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0071
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
corresponding to the maximum value of the saturation
throughput. In fact, letting ST/∂L=0, we have
A2L2+A1L+1
ln(1 Ps)=0 (13)
where
A2W(1
t
)N+1(1
t
)
A1W(1
t
)
s
Rb+N
t
(B+C)
+[(1
t
)N+1(1
t
)N
t
]C
and certainly we have A=A1+A2L, which is the denominator
of the last equation in (12). Therefore the solution to the
quadratic equation (13), or
Lopt =
A1+
A2
1[4A2/ln(1 Ps)]
2A2
is the optimal frame size corresponding to the maximum
throughput performance.
2. ST N relationship: Similarly to the analysis of the
relationship between throughput and L, there may also be
an optimal Ncorresponding to the maximum value of the
saturation throughput. Letting ST/∂N=0, we have
(1
t
)N(C+L
s
)=N(C+L) ln(1
t
)+C+L
(14)
The solution of (14) is the optimal number of nodes. Obviously,
it is difficult to resolve the non-linear function (14), and we can
obtain the solution by using numerical analysis for sure.
3. ST
t
relationship: Intuitively, the collision probability
depends mainly on the transmission probability of each
node at a chosen slot and the number of nodes. In fact,
from (12) and letting ST/∂
t
=0, we have
(1
t
)N=C+L
C+L
s
Rb
(1 N
t
) (15)
Similarly, the solution of (15) is the optimal transmission
probability for each node. Obviously, it is also very hard to
resolve it and the solution can be found by using numerical
analysis. Hence, in the design of a WAVE system, we can
set the transmission probability according to the given
parameters, such as frame size, number of nodes and so on.
4. ST P
s
relationship and ST P
d
relationship: From (12),
it is seen that the throughput is proportional approximately to
(1 Ps)L. Therefore the throughput decreases smoothly with
the increase of Pswhen Psis small; while it sharply reduces to
zero when Psis large. It is well known that in a fast fading
channel, Doppler spread is the main contributor of SER.
For example, in [17], the closed SER form of binary
differential phase-shift keying (DPSK) over Rayleigh fading
channel is given as
Ps=1+
g
(1
r
)
2(1 +
g
)(16)
where
g
WVEb/N0is the average fading SNR, Vis the
channel gain and
r
is the fading correlation coefficient
defined in (3). Then, for binary DPSK, substituting (16) to
(12), we have the relationship between the throughput
performance and Doppler spread as follows (see (17))
Obviously, when
r
=J0(2
p
fdTb)=1, (17) degenerates into
the throughput expression over a slow fading channel.
Additionally, as a major physical layer technique in WAVE
systems, multicarrier modulation such as OFDM is more
sensitive to frequency offset because of its orthogonality of
subcarriers in the frequency domain. In an OFDM-based
WAVE system, a large Doppler spread caused by a high
vehicular velocity can result in serious intercarrier
interference, and thus the SER performance decreases
sharply as discussed in Section 2. Hence, in a fast fading
channel, Doppler spread is a major factor affecting the
saturation throughput significantly.
Based on the aforementioned discussions, we can
summarise that the throughput performance is determined
jointly by the frame size, number of the nodes,
transmission probability, the FER and Doppler spread. In
particular, the Doppler spread poses a serious threat to the
performance of an OFDM-based WAVE system.
Consequently, in order to improve the throughput
performance in a fast fading channel, we suggest that it is
very important to use the optimal frame size and
transmission probability, to accommodate the suitable
number of nodes in a WAVE network, to use some
Doppler resilient technologies to improve the SER
performance in physical layer. Apparently, a novel MAC
protocol is in particular important for WAVE systems,
which should be able to mitigate the Doppler effect
effectively.
4 Simulation results
In order to validate the analytical results, computer
simulation and numerical calculation have been conducted
to show the effectiveness of the aforementioned analytical
results on Doppler effect and throughput performance.
ST =N
t
{1 (1 +
g
[1 J0(2
p
fdTb)]/2(1 +
g
))}LLRb
(1
t
)
s
Rb+N
t
(B+C+L)+[(1
t
)N+1(1
t
)N
t
](C+L)(17)
IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825 821
doi: 10.1049/iet-com.2009.0071 &The Institution of Engineering and Technology 2010
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
4.1 Results of Doppler spread
In the simulations, parameters and environment were set up
as follows: the channel model A (with 18 paths, 390 ns
maximum delay spread and 50 ns average rms delay spread)
of HIPERLAN II and QPSK modulation were adopted,
data rate was set to 9 Mbps, the double sliding window
packet detection algorithm [16] was used for physical layer
convergence procedure (PLCP) frame synchronisation, and
the linear minimum mean-squared error algorithm-based
pilots were used for channel estimation. In the simulations,
we only evaluated the channel once in each PLCP frame.
Figs. 24illustrate the BER against SNR with the different
lengths of PLCP frame LPLCP =35, 60, 225 OFDM symbols,
respectively, in which Doppler spectrum is fd=0, 59, 590,
1180 Hz (the corresponding velocity is 0, 10.8, 108 and
216 km/h), respectively. As we know, the coherence time is
approximately defined as Dt(0.423/fd)1 ms. When the
Doppler spread is fd=59, 590, 1180 Hz, the corresponding
coherence time is Dt7.2, 0.72, 0.36 ms, respectively. That
is to say, the channel is almost time invariant in about 900,
90, 45 OFDM symbols with fd=59, 590, 1180 Hz when
Ts=8ms (with 10 MHz bandwidth in IEEE 802.11p),
respectively. Hence, in Fig. 2,withLPLCP =35 OFDM
symbols, it is less than the smallest coherence time or 45
OFDM symbols, and thus all BER curves are almost the
same. With the increasing LPLCP =60 OFDM symbols in
Fig. 3, the BER curve with fd=1180 Hz degenerated
quickly, while both curves with fd=1180 and 590 Hz are
reduced sharply in Fig. 4 with LPLCP =225 OFDM symbols.
In summary, it can be concluded that BER performance
with different Doppler spreads is dependent definitely on
the length of PLCP frame. Furthermore, from Fig. 3,
when BER is about 10
22
, there is about 6 dB loss with
fd=590 Hz. Moreover, BER is worse when fdis larger.
Similarly to [13], it can be concluded from Figs. 3 and 4
that there is an error floor of BER because of Doppler spread.
4.2 Results of throughput
According to [2], the network parameters used in the simulations
are listed as follows (similar to [9]): m¼5; W¼8; f¼10;
s
¼20 ms; physical layer preamble and header are 12 symbols
(ten short and two long symbols, 32 ms) and one OFDM
symbols (signal field, 8 ms), respectively; MAC header is 36
octets; ACK is 14 octets plus physical layer preamble and
header; SIFS and AIFS are set to 10 and 50 ms, respectively.
Therefore we can obtain Ts2210.2msandTc2187.8ms
when L¼2324 octets and Rb=9Mbps.
The throughput performances against frame size, number of
nodes, transmission probability, SER and Doppler spread are
depicted in Figs. 59, respectively. It can be observed from
Figs. 5 and 6that the throughput increases with the increase of
Lor Nwhen they are relatively small, and it will be close to
zero when they approach to infinity. This is because that we
have limL1(1 Ps)L=0whenPs,1, and there will be
less collisions with other nodes when Nis relatively small;
whereas more collisions exist when Nis relatively large. We can
see from Fig. 7 that the throughput performance depends
Figure 2 BER against SNR with L
PLCP
¼35 OFDM symbols
Figure 3 BER against SNR with L
PLCP
¼60 OFDM symbols
Figure 4 BER against SNR with L
PLCP
¼225 OFDM symbols
822 IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825
&The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0071
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
positively on the transmission probability of each node.
Additionally, it is shown obviously from Fig. 7 that the optimal
transmission probability is different for a different frame size:
the transmission probability moves to the right-hand side along
the X-axis (increasing) with the decrease of the frame size. This
is because that with the increase of the frame size, the more
collisions may happen. Figs. 8 and 9illustrate that the
throughput performance decreases smoothly with the increase
of Psor fdTwhen they are small; while it reduces sharply to
zero when they are large, for example, about 0.01. Furthermore,
if compared to Ps,fdTis more sensitive to the throughput
performance because of the high velocity of vehicles. Hence, a
novel MAC that is capable to work with a resilience to the
Doppler effect will paly an important role for sure.
5 Conclusions
In this paper, we have studied the issues on the ICI power, SER
performance and saturation throughput performance of WAVE
systems in the presence of the Doppler spread. Both theoretical
analysis and simulation results have been used to validate the
Figure 6 Saturation throughput against number of nodes
(P
s
¼10
26
)
Figure 8 Saturation throughput against SER (N ¼30)
Figure 9 Saturation throughput against Doppler spread
f
d
T(N¼30)
Figure 5 Saturation throughput against frame size (N ¼30)
Figure 7 Saturation throughput against transmission
probability (N ¼30 and P
s
¼10
26
)
IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825 823
doi: 10.1049/iet-com.2009.0071 &The Institution of Engineering and Technology 2010
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
effectiveness of the proposed scheme. It is shown from the
results that Doppler spectrum has a negative influence on
SER and throughput performance. Consequently, in order to
improve the performance of a WAVE system, the priority is
to use the optimal frame size and transmission probability,
and to support a suitable number of nodes in the network.
Another important approach is to work out a MAC protocol
with an excellent resilience against Doppler spread to improve
the SER performance in physical layer. However, the design
ofanovelMACprotocolsuitableforWAVEsystemsisour
future research work.
6 Acknowledgments
The work presented in this paper was supported in part by
research grants no. NSFC-60971082, NSFC-60872049 and
NSFC-60972073, National Key Basic Research Program of
China (973Program) 2009CB320407, and National Great
Science Specific Project(2009ZX03003-001, 2009ZX03003-
011), P.R. China. The authors would like to thank the editor
and anonymous reviewers for their constructive suggestions and
comments which helped us to improve the quality of the paper.
7 References
[1] IEEE P802.11p/D5.0:‘Part11:wirelessLANmedium
access control (MAC) and physical layer (PHY)
specifications’. Amendment 7: Wireless Access in
Vehicular Environments (WAVE), November 2008
[2] IEEE Std 802.11
TM
-2007 (Revision of IEEE Std 802.11-
1999): ‘Part 11: wireless LAN medium access control
(MAC) and physical layer (PHY) specifications’, June 2007
[3] BILSTRUP K.,UHLEMANN E.,STROM E.G.,ET AL.: ‘Evaluation of
the IEEE 802.11p MAC method for vehicle-to-vehicle
communication’. IEEE Vehicular Technology Conf., 2008,
VTC 2008, Fall, pp. 1 5
[4] CHENG L.,HENTY B.E.,COOPER R.,STANCIL D.D.,BAI F.:‘A
measurement study of time-scaled 802.11a waveforms
over the mobile-to-mobile vehicular channel at 5.9 GHz’,
IEEE Commun. Mag., 2008, 46, (5), pp. 84 91
[5] SCHOCH E.,KARGL F.,WEBER M.: ‘Communication patterns in
VANETs’, IEEE Commun. Mag., 2008, 46, (11), pp. 119 125
[6] RABADI N.M.,MAHMUD S.M.: ‘On finding the optimal settings of
the IEEE 802.11 DCF for the vehicle intersection collision
avoidance application’.The First Int. Conf. on Wireless Access in
Vehicular Environments (WAVE), Detroit, USA, December 2008
[7] BIANCHI G.: ‘Performance analysis of the IEEE 802.11
distributed coordination function’, IEEE J. Sel. Areas
Commun., 2000, 18, pp. 535 547
[8] WU H.,PENG Y.,LONG K.,CHENG S.,MA J.: ‘Performance of
reliable transport protocol over IEEE 802.11 wireless LAN:
analysis and enhancement’. Proc. INFOCOM 2002, June
2002, pp. 599 607
[9] HADZI-VELKOV Z.,SPASENOVSKI B.: ‘Saturation throughput:
delay analysis of IEEE 802.11 DCF in fading channel’. Proc.
IEEE ICC 2003, May 2003, pp. 121 126
[10] HE J.,TAN G Z . ,YANG Z . ,CHENG W.,CHOU C.T.: ‘Performance
evaluation of distributed access scheme in error-prone
channel’. Proc. IEEE TENCON 2002, October 2002,
pp. 1142 1145
[11] VISHNEVSKY V.,LYAKHO V A.: ‘802.11 LANs: saturation
throughput in the presence of noise’. Proc. NETWORKING
2002, 2002, pp. 1008 1019
[12] JAMES DONG X.,VARAIYA P.: ‘Saturation throughput analysis
of IEEE 802.11 wireless LANs for a lossy channel’, IEEE
Commun. Lett., 2005, 9, (2), pp. 100 102
[13] WANG T.(R.),PROAKIS J.G.,MASRY E.,ZEIDLER J.R.: ‘Performance
degradation of OFDM systems due to Doppler spreading,
IEEE Trans. Wirel. Commun., 2006, 5, (6), pp. 1422 –1432
[14] STANTCHEV B.,FETTWEIS G.: ‘Time-variant distortions in
OFDM’, IEEE Commun. Lett., 2000, 4, (9), pp. 312 314
[15] CHOI Y.-S.,VOLTZ P.J. ,CASSARA F.A.: ‘On channel estimation
and detection for multicarrier signals in fast and selective
Rayleigh fading channels’, IEEE Trans. Commun., 2001, 49,
(8), pp. 1375 1387
[16] HEISKALA J.,TERRY J.: ‘OFDM wireless LANs: a theoretical
and practical guide’ (Sams Publishing, Indianapolis, IN, 2001)
[17] SIMON M.K.,ALOUINI M.-S.: ‘Digital communication over
fading channels’ (Wiley, 2005, 2nd edn.)
8 Appendix
To facilitate the calculation of the ICI power in (5), we can
deduce the autocorrelation of Hk(n) first. Using (3), we have
E[|Hk(n)|2]=E{Hk(n1)H
k(n2)} =ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)]
×
L01
l1=0
L01
l2=0
E{h(n1,l1)h(n2,l2)}e(j2
p
(l1l2)k/N)
=cJ0
2
p
fdT(n1n2)
N

×ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)]
L01
l=0
el/L0
=c2J0
2
p
fdT(n1n2)
N

×ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)]
(18)
824 IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825
&The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0071
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
where c2=[(1 e1)/(1 e1/L)]c. Then, the numerator of
(5) becomes
E
N1
n=0
Hk(n)
2

=E
N1
n1=0
Hk(n1)
N1
n2=0
H
k(n2)

=
N1
n1=0
N1
n2=0
E{Hk(n1)H
k(n2)}
=c2
N1
n1=0
N1
n2=0
J0
2
p
fdT(n1n2)
N

×ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)] (19)
Similarly, we obtain
E[|I(k)|2]=E[I(k)I(k)] =
N1
m=0,m=k
E{|d(m)|2}
×E
N1
n1=0
Hk(n1)
N1
n2=0
H
k(n2)

ej2
p
(n1n2)(mk)/N
=c2
N1
m=0,m=k
N1
n1=0
N1
n2=0
J0
2
p
fdT(n1n2)
N

×ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)]ej2
p
(n1n2)(mk)/N
=c2
N1
m=0,m=k
N1
n1=0
N1
n2=0
J0
2
p
fdT(n1n2)
N

×ej[(2
p
(n1n2)(mk+1)/N)+
f
(n1)
f
(n2)] (20)
Obviously, it can be concluded from (18) (20) that both
E[|Hk(n)|2] and E[|N1
n=0Hk(n)|2] do not change with the
subcarrier index k, while E[|I(k)|2] is a function of k.
Therefore substituting (19) and (20) into (5), we obtain
(see (21))
PICI(k)=E[|I(k)|2]
E[|N1
n=0Hk(n)|2]
=N1
m=0,m=kN1
n1=0N1
n2=0J0{2
p
fdT(n1n2)/N}ej[(2
p
(n1n2)(mk+1)/N)+
f
(n1)
f
(n2)]
N1
n1=0N1
n2=0J0{2
p
fdT(n1n2)/N}ej[(2
p
(n1n2)1/N)+
f
(n1)
f
(n2)] (21)
IET Commun., 2010, Vol. 4, Iss. 7, pp. 817– 825 825
doi: 10.1049/iet-com.2009.0071 &The Institution of Engineering and Technology 2010
www.ietdl.org
Authorized licensed use limited to: BEIJING UNIVERSITY OF POST AND TELECOM. Downloaded on April 28,2010 at 00:15:55 UTC from IEEE Xplore. Restrictions apply.
... Recently, Bianchi's model has been used for modifying and evaluating the performance of the broadcast mean of communication in IEEE 802.11 in [4], [9]- [11], [14], [16]. Considering saturation condition, behaviour of broadcast scheme in ad hoc WLANs is studied by Ma and Chen in [10]. ...
... Considering saturation condition, behaviour of broadcast scheme in ad hoc WLANs is studied by Ma and Chen in [10]. Based on Doppler spread scenarios, saturation throughput is analyzed by Lou et al. in [9]. An analytic model, for highway application, taking into consideration, the indices of DSRC-safetyrelated communications is presented by Ma et al. in [11]. ...
... Martijn et al. [14] presents a two-dimensional analytical model for beaconing by introducing the concept of steak and collision multiplicity in VANETs. However, all the analyses in [4], [9]- [11]" [14], [16] assumes the arrival of messages to follow Poisson process, which is practically not feasible for realistic vehicular environment, as the safety messages are broadcasted periodically over the CCH throughout the network. In [15], the author proposes an analytical model for safety message broadcast, using the concept of dynamic contention window (DCW) in VANETs. ...
Article
Full-text available
This study proposes a Vehicle ID‐based CAM Rate Adaptation (VI‐CRA) algorithm for beacon messages in the vehicular network. Foremost, an improved vehicle ID–based analytical model is proposed at the MAC layer of vehicular network. The model weighs the random back‐off number chosen by vehicles participating in the back‐off process, with the vehicle ID incorporated in their respective CAMs. This eventually leads to the selection of a vehicle ID–based random back‐off number, minimizing the probability of collision due to same back‐off number selection. It is worth noting that the improved analytical model outperforms the existing works in terms of average packet delay since only one fourth of the contention window size is used throughout the simulation. To enhance the performance of the analytical model, the paper incorporates a congestion control algorithm, by adapting the rate of CAM broadcast over the control channel. The algorithm is designed considering a wide range of scenarios, ranging from nonsaturated to extremely saturated network (in terms of collision probability) and sparsely distributed to teemed network (in terms of vehicular density). For better analyses of simulation results, the algorithm is applied over different vehicle ID–based back‐off numbers. Simulation results for all the back‐off numbers show that vehicle ID–based CAM rate adaptation algorithm performs better than the traditional fixed CAM rate IEEE 802.11p, even at high vehicular density. This study proposes a vehicle ID‐based CAM rate adaptation algorithm for the vehicular network. Foremost, an improved vehicle ID‐based analytical model is proposed at the MAC layer of VANET. To enhance the performance of the analytical model, the paper incorporates a congestion control algorithm, by adapting the rate of CAM broadcast over the control channel. It is evident that for all the back‐off numbers, proposed algorithm performs better than the existing models, even at high vehicular density.
... Luo Verma and Singh provide an analytical framework for highway applications considering specialized short-range connectivity communications indices [22]. By incorporating the concepts of steak and contact frequency in VANETs, Luo et al. propose a 2-dimensional mathematical framework for beaconing [23]. Ma and Chen offer a mathematical framework for 1-hop safety-critical signal broadcast via CCH using the access category (ACs) capability of enhanced dispersed channel allocation (EDCA) 802.11p [24]. ...
Article
Full-text available
This research presents a vehicle ID-based congestion aware message (CAM) for beacon signals on the vehicle environment. At the MAC protocol of the vehicle environment, enhanced vehicle ID-based analysis model is given first. With the automobile ID embedded in their separate CAMs, the model weights the randomized back-off numbers chosen by cars engaging in the back-off procedure. This leads to identifying a car ID-based randomized back-off code, which reduces the likelihood of a collision due to the identical back-off number. A traffic density based-congestion control algorithm (TDCCA) is suggested in this research. The revised mathematical approach surpasses previous work’s overall packet latency because just one-fourth of the congestion window is employed during the experiment. The research includes a congestion management method that adjusts the rate of CAM transmitted over the host controller to improve the efficiency of the model parameters. The method considers various circumstances, from nonsaturated to substantially saturated networks (in terms of congestion probability) and sparsely dispersed and teemed networks (in the form of vehicular intensity). The technique is run across various automobile ID-based back-off values for high-standard results analysis. The simulation outcomes in terms of packet delivery ratio, energy consumption, delay, success rate, and collision ensure the effectiveness of the TDCCA method. Even at high traffic densities, the automobile ID-based CAM following information method outperforms the typical fixed CAM frequency IEEE 802.11p, according to simulation findings for all back-off figures.
... Hypersonic vehicles that fly in near-space at speeds of 5-20 Mach have attracted substantial attention over the past few years [1][2][3]. The corresponding exploration of the tracking, telemetry, and command (TT&C) technology has become increasingly active [4][5][6]. Under the hypersonic vehicle communication scenarios, large challenges emerge different from conventional wireless communications. ...
Article
Full-text available
Large and rapidly changing Doppler shift poses a huge challenge on fast carrier acquisition for hypersonic vehicle communications. In this study, a novel Doppler shift acquisition method is proposed to increase the acquisition probability and reduce the acquisition time simultaneously. Firstly, the Doppler rate is estimated with a proposed fast blind estimation algorithm. The order of Doppler shift is reduced though twice instantaneous delay autocorrelation operation on the received signal and the modulated information is cancelled, and the Doppler rate can be obtained by the corresponding spectrum analysis. Secondly, the received signal is compensated by the estimated Doppler rate. Finally, the maximum value of the average power spectrum of the compensated result over multiple symbols is detected, and the Doppler shift and Doppler rate can be jointly determined. Furthermore, to improve the acquisition speed, a corrected narrower range, which is determined by the flight conditions of the hypersonic vehicles, is proposed to constrain the search range of the power spectrum peak. Simulation results indicate that, under typical hypersonic flight conditions, the acquisition probability of the Doppler rate increases from 0.52 to 0.86 under − 20 dB. The processing speed can be improved by 75.47% when the length of the combined symbols is 1000.
... MAC protocol in [2]. Recently, Bianchi's model has been used for modifying and evaluating the performance of the broadcast mean of communication for IEEE 802.11 in [4,5,8,[14][15][16]21,25]. However, all these work are not directly suitable for VANETs, as they assume the arrival of messages to follow Poisson process, which is practically not feasible for a realistic vehicular environment. ...
... An unsuccessful (re)transmission attempt can occur due to collision of this station with at least one of the remaining stations, which has the probability of [14]: (16) An error frame occurs with probability due to the channel fading and/or noise. Because both events are independent, the probability of node collision in each zone i, can be expressed as [10,14] (17) where and Next, we determine as the transmission probability where a station conducts the success transmission at the slot. ...
Article
Full-text available
The most challenging issues in the multi-channel MAC of the IEEE 1609.4 standard is how to handle the dynamic vehicular traffic condition with a high mobility, dynamic topology, and a trajectory change. Therefore, dynamic channel coordination schemes between CCH and SCH are required to provide the proper bandwidth for CCH/SCH intervals and to improve the quality of service (QoS). In this paper, we use a Markov model to optimize the interval based on the dynamic vehicular traffic condition with high mobility nodes in the multi-channel MAC of the IEEE 1609.4 standard. We evaluate the performance of the three-dimensional Markov chain based on the Poisson distribution for the node distribution and velocity. We also evaluate the additive white Gaussian noise (AWGN) effect for the multi-channel MAC coordination scheme of the IEEE 1609.4 standard. The result of simulation proves that the performance of the dynamic channel coordination scheme is affected by the high node mobility and the AWGN. In this research, we evaluate the model analytically for the average delay on CCHs and SCHs and also the saturated throughput on SCHs.
... This is an effect of the Doppler shift that reduces the system performance. However, depending on the system parameters, when the normalized Doppler bandwidth is very small then the Doppler effect on the ICI is negligible, i.e. for ν D f D,max T O F D M 1 the ICI can be neglected [23]. This is also the case of the IEEE 802.11p for relative speeds of well above 350 km/h. ...
Article
We consider in this paper the mobility challenges that emerge in the context of vehicular wireless communications. Specifically, we research the problem of estimating the mobile doubly selective channels for the IEEE 802.11p orthogonal frequency-division multiplexing-based communication. To mitigate some of the major challenges imposed by the time-varying vehicular environments and to solve this estimation problem a new standard-compliant channel estimator block is proposed. The estimator structure is an innovative construct stemming from the idea of subcarrier frequencies self-organization, which leverages intersubbands connections through decision directed feedback, spectral smoothing, and time tracking. Comparisons between the new method and existing alternatives already indicate that the proposed scheme outperforms the latter. Furthermore, the bit error rate (BER) and frame error rate (FER) performance of the new estimator is close to the one with perfect channel state information for low and medium SNRs.
... The channel variations cause sub-carrier interference which degrades the performances. The negative effect of the Doppler spread is affecting both BER and throughput performances [24]. The effect of the Doppler spread is proportional to the velocity of the vehicles and to the distance separating the vehicles [25]. ...
Article
Full-text available
This paper presents the concept of an intelligent transportation network based on Visible Light Communications (VLC) applications by enabling wireless communication among vehicles and the traffic infrastructure, safety, efficiency, and the Environment and reducing fuel waste. Intelligent Transport Systems resulted in the safer, more efficient, and eco-friendlier movement of vehicles. Considering the numerous advantages of the VLC technology encouraged the survey in automotive applications as an alternative to traditional radio frequency-based communications.
Preprint
Full-text available
This research presents a Vehicles ID-based Congestion Aware Message (CAM) for beacon signals in the vehicle environment. The MAC protocol of the vehicle environment and enhanced vehicle ID-based analysis model is given. With the automobile ID embedded in their separate CAMs, the model weights the randomized back-off numbers chosen by cars engaging in the back-off procedure. That leads to identifying a vehicle ID-based randomized back-off code, which reduces the likelihood of a collision due to the identical back-off number. A Traffic Density-Based Congestion Control Algorithm (TDCCA) is suggested in this research. The revised mathematical approach surpasses the previous work's overall packet latency because the congestion control is based on the network traffic. The study includes a congestion management method that adjusts the rate of CAM transmitted over the host controller to improve the efficiency of the model parameters. The technique considers various circumstances, from nonsaturated to substantially saturated networks (in terms of congestion probability) and sparsely dispersed and teemed networks (in the form of vehicular intensity). The technique is run across various automobile ID-based back-off values for results analysis. The simulation outcomes in terms of packet delivery ratio, energy consumption, delay, success rate, and collision ensure the effectiveness of the TDCCA method. Even at high traffic densities, the automobile ID-based CAM method outperforms the typical fixed CAM with IEEE 802.11p, according to simulation findings for all back-off figures.
Article
Full-text available
Periodic broadcast of cooperative awareness messages (CAMs) is of great importance considering safety-related applications, for a network like VANET. This study proposes a vehicle-identifier (ID)-based MAC scheme for the periodic broadcast of CAMs in a vehicular network. Each CAM generated by a vehicle is associated with a unique ID. This study uses this attribute of CAM messages while participating in the channel assessment procedure. Each vehicle weighs the random back-off number with the unique ID incorporated in their respective CAM. This eventually leads to the selection of a vehicle-IDbased random back-off number, mitigating all possible probabilities of collision due to same back-off number selection. The simulation is performed considering saturated traffic conditions, to analyse its behaviour under most critical situations. The proposed model eliminates the chances of selecting zero as the initial back-off number, eliminating any chances of consecutive freeze process. The proposed one-dimensional Markovian model is validated by MATLAB. The proposed model provides a clear depiction that it performs better than the traditional IEEE 802.11OCB used for VANET. Also, it is worth noting that the achieved results outperform the existing work in terms of average packet delay since nearly one-fourth of the contention window size is utilised throughout the simulation.
Article
Full-text available
Vehicular networks are a very promising technology to increase traffic safety and efficiency, and to enable numerous other applications in the domain of vehicular communication. Proposed applications for VANETs have very diverse properties and often require nonstandard communication protocols. Moreover, the dynamics of the network due to vehicle movement further complicates the design of an appropriate comprehensive communication system. In this article we collect and categorize envisioned applications from various sources and classify the unique network characteristics of vehicular networks. Based on this analysis, we propose five distinct communication patterns that form the basis of almost all VANET applications. Both the analysis and the communication patterns shall deepen the understanding of VANETs and simplify further development of VANET communication systems.
Conference Paper
Full-text available
In this paper the medium access control (MAC) method of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes listen to the wireless channel before sending. If the channel is busy, the node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for time-critical communications. The simulation results reveal that a specific node/vehicle is forced to drop over 80% of its heartbeat messages because no channel access was possible before the next message was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic between vehicles. This MAC method is already successfully applied in commercial surveillance applications for ships (AIS) and airplanes (VDL mode 4). Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad hoc vehicular networks.
Conference Paper
Full-text available
IEEE 802.11 specifies a technology for wireless local area networks (LANs) and mobile networking. In this paper, we present an analytical method of estimating the saturation throughput of 802.11 wireless LAN in the presence of noise which distorts transmitted frames. Besides the Basic Access mechanism of the 802.11 MAC protocol, we study such optional tool as the RTS/CTS method, which allows reducing the influence of collisions. In addition to the throughput, our method allows estimating a probability of a packet rejection occurring when the number of packet transmission retries attains its limit. The obtained numerical results of investigating 802.11 LANs by this method are validated by simulation and show high estimation accuracy for any values of protocol parameters and bit error rates. These results also show that the method is an effective tool for tuning the protocol parameters.
Conference Paper
Full-text available
In this paper, we analytically analyzed the impact of an error-prone channel over all performance measures in a traffic-saturated IEEE 802.11 WLAN. We calculated station's transmission probability by using the modified Markov chain model of the backoff window size that considers the frame-error rates and maximal allowable number of retransmission attempts. The frame error rate has a significant impact over theoretical throughput, mean frame delay, and discard probability. The peak throughput of a WLAN is insensitive of the maximal number of retransmissions. Discard probabilities are insensitive to the station access method, basic or RTS/CTS.
Conference Paper
Full-text available
IEEE 802.11 medium access control (MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is a distributed coordination function (DCF), which is a carrier sense multiple access with collision avoidance (CSMA/CA) with a binary slotted exponential back-off scheme. Since IEEE 802.11 MAC has its own characteristics that are different from other wireless MAC protocols, the performance of reliable transport protocol over 802.11 needs further study. This paper proposes a scheme named DCF+, which is compatible with DCF, to enhance the performance of reliable transport protocol over WLAN. To analyze the performance of DCF and DCF+, this paper also introduces an analytical model to compute the saturated throughput of WLAN. Compared with other models, this model is shown to be able to predict the behavior of 802.11 more accurately. Moreover, DCF+ is able to improve the performance of TCP over WLAN, which is verified by modeling and elaborate simulation results.
Article
Full-text available
The focus of this paper is on the performance of orthogonal frequency division multiplexing (OFDM) signals in mobile radio applications, such as 802.11a and digital video broadcasting (DVB) systems, e.g., DVB-CS2. The paper considers the evaluation of the error probability of an OFDM system transmitting over channels characterized by frequency selectivity and Rayleigh fading. The time variations of the channel during one OFDM symbol interval destroy the orthogonality of the different subcarriers and generate power leakage among the subcarriers, known as inter-carrier interference (ICI). For conventional modulation methods such as phase-shift keying (PSK) and quadrature-amplitude modulation (QAM), the bivariate probability density function (pdf) of the ICI is shown to be a weighted Gaussian mixture. The large computational complexity involved in using the weighted Gaussian mixture pdf to evaluate the error probability serves as the motivation for developing a two-dimensional Gram-Charlier representation for the bivariate pdf of the ICI. It is demonstrated that its truncated version of order 4 or 6 provides a very good approximation in the evaluation of the error probability for PSK and QAM in the presence of ICI. Based on Jakes' model for the Doppler effects, and an exponential multipath intensity profile, numerical results for the error probability are illustrated for several mobile speeds
Chapter
In studying the performance of coded communications over memoryless channels (with or without fading), the results are given as upper bounds on the average bit error probability (BEP). In principle, there are three different approaches to arriving at these bounds, all of which employ obtaining the so-called pairwise error probability, or the probability of choosing one symbol sequence over another for a given pair of possible transmitted symbol sequences, followed by a weighted summation over all pairwise events. In this chapter, we will focus on the results obtained from the third approach since these provide the tightest upper bounds on the true performance. The first emphasis will be placed on evaluating the pairwise error probability with and without CSI, following which we shall discuss how the results of these evaluations can be used via the transfer bound approach to evaluate average BEP of coded modulation transmitted over the fading channel.
Article
From the Book:Preface This book will address the subject of broadband communications using orthogonal frequency division multiplexing (OFDM). OFDM is a special case of multicarrier modulation (MCM), which is the principle of transmitting data by dividing the stream into several parallel bit streams and modulating each of these data stream onto individual carriers or subcarriers. Although the origin of MCM dates back to the 1950s and early 1960s with military high frequency (HF) radio links, R.W. Chang in the mid 60s first published a paper demonstrating the concept we today call OFDM. Chang demonstrated the principle of transmission of multiple messages simultaneously through a linear band-limited channel without interchannel interference (ICI) and intersymbol interference (ISI). The multichannel or OFDM system developed by Chang differed from tradi-tional MCM in that the spectra of the subcarriers were allowed to overlap under the restriction they were all mutually orthogonal. This characteristic of OFDM systems required the abandon-ment of steep bandpass filters used in older MCM systems to separate the spectra of the individ-ual subcarriers. Weinsten and Ebert were the first to suggest using the discrete Fourier Transform (DFT) and inverse discrete Fourier Transform (IDFT) to perform baseband modulation and demodulation in 1971. Currently, OFDM systems utilize the Fast Fourier Transform (FFT) and Inverse FFT to perform modulating and demodulating of the information data. Saltzberg performed a perfor-mance analysis of OFDM, shortly after Chang published his paper, and concluded that the domi-nate impairment in OFDM is ICI. To combat ICI and ISI, Peled and Ruiz introduced the concept of a cyclic prefix (CP). Rather than using an empty guard space, a cyclic extension of the OFDM symbol is used instead. This effectively simulates a channel performing circular convolution as long as the CP is longer than the impulse response of the channel. The penalty of using a CP is loss of signal energy proportional to the length of the CP, yet the benefits of using a CP generally outweighs any loss of signal energy. Presently, OFDM appears in several standards relating to wireless communications at high data rates such as terrestrial digital audio broadcasting (DAB) and digital video broadcasting (DVB-T) in Europe. Presumably, one of the reasons OFDM was chosen as the DAB standard is that it is possible to deploy single frequency subnetworks within its main networks. Hence, main and relay broadcast transmitters may use the same set of subcarriers. In areas with reception from multiple transmitters, receive diversity gains are experienced. Based on coded OFDM, DVB-T is the youngest and most sophisticated of the three core DVB systems. Combining channel coding with OFDM permits reliable transmission over dispersing channels. Furthermore, the inherent structure of OFDM allows for flexible transmission rates. Finally, WLAN, the main subject of this book, is another application for OFDM technology. For instance, next generation wireless LAN standards such as IEEE 802.11a, High Performance Local Area Network type 2 (HiperLAN/2), and Mobile Multimedia Access Communication (MMAC) system have accepted OFDM as their physical layer specifications. These WLAN sys-tems also incorporate coding with OFDM to combat dispersing channels. It has been shown that coded OFDM modulation over modest dispersing channels can improve, rather than deteriorate, the reliability of the transmission. This interesting counterintuitive phenomenon can be attributed to the inherent frequency diversity provided by OFDM. Arguably, this characteristic is the most attractive feature of OFDM. Interactive Learning Clearly with the growing in interest in OFDM for high data rate wireless communications, in par-ticular WLANs, there is a need in the technical community for a book that reviews the subject of OFDM WLANs. Typically, this is accomplished in a classroom setting. Unfortunately, many engineers and scientists today cannot afford the time required to attend classes at a university. What is needed is a tool to allow each reader to learn each of the concepts presented in the chap-ters at his/her own pace. We have provided that by means of an interactive simulation environ-ment. Please visit our Web site at http://www.samspublishing.com and search for the OFDM book. More specifically, the site contains a complete OFDM WLAN physical layer simulation developed in MATLAB. We developed the simulation tool to illustrate the concepts discussed in Chapters 2–5. To aid in the learning process, exercises are provided in each of these chapters. The exercises require the use of the OFDM system simulation tool and the simple programs you develop. Most of the examples given in this book are reproducible with the simulation program. The OFDM system simulation is executed through a graphical user interface (GUI) to facilitate system recon-figurability. The GUI is called from the MATLAB command window, which allows users to test quickly and easily many of the concepts in this book with a few clicks of the mouse. The novice and expert alike will thoroughly enjoy the endless combinations of test conditions available to them. With this learning tool, readers can further improve their understanding of the concepts presented in this book. In addition, readers interested in testing their algorithms over a WLAN environment will save months of software development time by using the simulation program located at our Web site. Intended Audience The primary audiences for this book are engineers and scientists without prior knowledge of OFDM. In the development of the text, we consider our primary audience to fall within two broad categories of readers: novice and advanced. For the novice, we envision someone with a background in engineering, mathematics, and some knowledge of communication theory. For that audience, this book provides the basics of OFDM theory with many examples and illustra-tions demonstrating concepts. An example novice reader might be a researcher in digital image processing, who is in interested in understanding what effects does an OFDM WLAN network might have on the quality of the video. Another example of the novice reader could be a radio fre-quency (RF) engineer, who is interested in the additional requirements imposed by OFDM mod-ulation on the RF subsystems in the access point (AP) and mobile terminal (MT). An example of an advanced reader is an engineer or scientist familiar with basic OFDM con-cepts. For those individuals, this book is intended as a source for practical guidelines as well as introductory material of advanced research topics in OFDM. The secondary audiences for this book include individuals, such as network system engineers, product engineers, or managers, for whom some of the mathematical development presented in this text is slightly beyond their scope of understanding. For those individuals, explanatory text is provided throughout this book to give an intuitive feel of many of the concepts discussed. It is assumed that the all audiences have a background in calculus, physics, and random and sto-chastic processes. Thus, the majority of the text in this book is written at the undergraduate level, with the exception of the advanced research topics, which are written at the first-year graduate level. In addition, the reader will be provided in each chapter all the relevant mathematical foun-dations necessary to understand the OFDM principles discussed. As mentioned earlier, explana-tory text is also given to provide a better understanding of these OFDM principles from the mathematical expressions. A final point concerning the audience: to reap the fullest benefit of this book, it is advantageous to the reader to become proficient in the use of MATLAB. We expect this book to attract a broad range of readers, as it is written to do so. Certainly, no book can be all things to everyone. However, no matter your interest level in OFDM WLANs, this book has some insight to offer. Organization of this Book This book is organized as follows. Chapter 1, "Background and WLAN Overview," is dedicated to background material as well as an overview of OFDM WLANs. The background material cov-ers relevant concepts in digital signal and stochastic processing. It expected that readers will refer to this chapter as needed to understand the concepts in latter chapters. Chapters 2–5 focus on the physical layer specifications of OFDM WLAN. Chapter 2, "Synchronization," provides a detailed discussion of many of the popular synchronization algorithms used in OFDM networks. Specifically, timing synchronization algorithms, which include packet detection, symbol timing recovery, and sample clock tracking, are covered. Also covered are frequency, channel estima-tion, and clear channel assessment (CCA) algorithms. Chapter 3, "Modulation and Coding," pro-vides a brief overview of modulation and coding techniques. In particular, the phase-shift keying (PSK) and quadrature amplitude modulations (QAM) found in OFDM WLAN standards are cov-ered. With respect of channel coding, discussions on block and convolutional codes are provided. Performance evaluation of several operational modes of the IEEE 802.11a physical specification are given. Chapter 3 can be thought of as the central theme or key technology area of current OFDM WLAN systems. Chapter 4, "Antenna Diversity," is dedicated to the central theme or key technology area of future OFDM WLAN, antenna diversity. Several popular transmit and receive diversity schemes are discussed in their context to OFDM systems. Examples show that drastic improvement in error rate performance is achievable when these techniques are deployed. Chapter 5, "RF Distortion Analysis for OFDM WLANs," focuses on the system impairments of the OFDM system resulting from RF nonlinearities. Particularly attention is given to the peak-to-average power (PAPR) prob-lem present in all OFDM systems. In this chapter, a survey of the more popular techniques to handle this problem is analyzed. In addition, other system impairments such as phase noise and in-phase and quadrature (IQ) imbalances are covered. In Chapters 6 and 7, an introduction of the medium access control (MAC) layer is given. Chapter 6, "Medium Access Control (MAC) for IEEE 802.11 Networks," summarizes the IEEE 802.11a MAC, while Chapter 7, "Medium Access Control (MAC) for HiperLAN/2 Networks," summa-rizes the HiperLAN/2 MAC. Both chapter details of the interaction between the MAC layer and the physical layer. Interestingly, a major criticism of OFDM has been the complexity issues associated with real-time implementation of the FFT and IFFT. However, steady improvements in semiconductor process technology has allowed for real-time prototyping of OFDM systems with Field Programmable Gate Array (FPGA) technology and cost effective solutions with Application Specific Integrated Circuit (ASIC) technology. Chapter 8, "Rapid Prototying of WLANs Using FPGA," is dedicated to the issues associated with real-time prototyping of an IEEE 802.11a radio using FPGA technology.
Conference Paper
Distributed Coordination Function (DCF) protocol is used for channel access in IEEE 802.11 WLAN. The performance issue of the protocol has provoked a lot of research interest. However, during the previous research work, the impact of retransmissions and bit error ratio on the performance of DCF was not taken into consideration. An analytical model is presented in this paper to evaluate the performance of the scheme in the case of finite retransmissions.