vehicularnetworks - download.e-bookshelf.de

30

Upload: others

Post on 26-Oct-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VehicularNetworks - download.e-bookshelf.de
Page 2: VehicularNetworks - download.e-bookshelf.de
Page 3: VehicularNetworks - download.e-bookshelf.de

Vehicular Networks

Page 4: VehicularNetworks - download.e-bookshelf.de
Page 5: VehicularNetworks - download.e-bookshelf.de

VehicularNetworksModels and Algorithms

Edited byAndré-Luc BeylotHouda Labiod

Series EditorGuy Pujolle

Page 6: VehicularNetworks - download.e-bookshelf.de

First published 2013 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, aspermitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced,stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers,or in the case of reprographic reproduction in accordance with the terms and licenses issued by theCLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at theundermentioned address:

ISTE Ltd John Wiley & Sons, Inc.27-37 St George’s Road 111 River StreetLondon SW19 4EU Hoboken, NJ 07030UK USA

www.iste.co.uk www.wiley.com

© ISTE Ltd 2013The rights of André-Luc Beylot and Houda Labiod to be identified as the authors of this work have beenasserted by them in accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Control Number: 2013936314

British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISBN: 978-1-84821-489-7

Printed and bound in Great Britain by CPI Group (UK) Ltd., Croydon, Surrey CR0 4YY

Page 7: VehicularNetworks - download.e-bookshelf.de

Table of Contents

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiHouda LABIOD and André-Luc BEYLOT

Chapter 1. Congestion Control for Safety VehicularAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . 1Razvan STANICA, Emmanuel CHAPUT and André-Luc BEYLOT

1.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 11.2. Beaconing frequency . . . . . . . . . . . . . . . . . . . 51.3. Data rate . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.4. Transmission power. . . . . . . . . . . . . . . . . . . . 101.5. Minimum contention window . . . . . . . . . . . . . 121.6. Physical carrier sense . . . . . . . . . . . . . . . . . . 251.7. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 311.8. Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 32

Chapter 2. Inter-Vehicle Communication forthe Next Generation of Intelligent TransportSystems: Trends in Geographic Ad HocRouting Techniques . . . . . . . . . . . . . . . . . . . . . . 39Xunxing DIAO, Kun-Mean MOU, Jian-Jin LIand Haiying ZHOU

2.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 392.2. IVC-relating ITS projects . . . . . . . . . . . . . . . . 422.3. Wireless sublayer techniques . . . . . . . . . . . . . 45

Page 8: VehicularNetworks - download.e-bookshelf.de

vi Vehicular Networks

2.3.1. WLAN and WPAN (up to 300 m) . . . . . . . . 452.3.2. Dedicated short-range communication(up to 1 km) . . . . . . . . . . . . . . . . . . . . . . . . . . . 472.3.3. Cellular networks (more than 1 km) . . . . . 492.3.4. Comparison. . . . . . . . . . . . . . . . . . . . . . . 50

2.4. Geographic routing techniques for VANET . . . 522.4.1. Features of VANET . . . . . . . . . . . . . . . . . 522.4.2. Localization. . . . . . . . . . . . . . . . . . . . . . . 542.4.3. Unicast greedy routing . . . . . . . . . . . . . . . 622.4.4. Geocast (multicast) routing . . . . . . . . . . . . 722.4.5. Delay tolerant network-based routing . . . . 752.4.6. Map-based routing . . . . . . . . . . . . . . . . . . 79

2.5. Conclusion and open issues . . . . . . . . . . . . . . 792.6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . 812.7. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . 81

Chapter 3. CONVOY: A New Cluster-BasedRouting Protocol for Vehicular Networks. . . . . . 91Véronique VÈQUE, Florent KAISSER, Colette JOHNENand Anthony BUSSON

3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 913.2. Clustering or network partitioning . . . . . . . . . 943.2.1. General remarks on the partitioning ofmobile ad hoc networks . . . . . . . . . . . . . . . . . . . 943.2.2. Controlling the number of hops . . . . . . . . . 963.2.3. Controlling the number of nodes . . . . . . . . 973.2.4. Role of the clusterhead . . . . . . . . . . . . . . . 98

3.3. Mobility-based clustering in ad hocvehicular networks . . . . . . . . . . . . . . . . . . . . . . . 983.3.1. The dynamics of vehiculartraffic in VANETs. . . . . . . . . . . . . . . . . . . . . . . 993.3.2. Clustering according to the lane . . . . . . . . 1013.3.3. Clustering depending on the relativespeed between the vehicles . . . . . . . . . . . . . . . . 1013.3.4. Clustering depending on the directionof the movement (movement-based) . . . . . . . . . . 1013.3.5. Clustering depending on the radiolink quality . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Page 9: VehicularNetworks - download.e-bookshelf.de

Table of Contents vii

3.3.6. Clustering depending on speed andrelative speed . . . . . . . . . . . . . . . . . . . . . . . . . . 1033.3.7. Clustering depending on the position,speed and direction . . . . . . . . . . . . . . . . . . . . . . 104

3.4. Clustering of VANETs for MAC andtransport applications . . . . . . . . . . . . . . . . . . . . . 1053.4.1. Cluster-based MAC protocol . . . . . . . . . . . 1053.4.2. Clustering for transport applications . . . . . 106

3.5. CONVOY: a vehicle convoy formationprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083.5.1. Intra-convoy communication protocol . . . . . 1103.5.2. Convoy formation algorithm . . . . . . . . . . . 110

3.6. Assessment of the convoy formationprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173.6.1. Optimal parameters of the algorithm . . . . . 1193.6.2. Distribution of the length of convoys . . . . . 1203.6.3. Convoy stability . . . . . . . . . . . . . . . . . . . . 121

3.7. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 1233.8. Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 124

Chapter 4. Complementarity betweenVehicular Networks and LTE Networks . . . . . . . 131Guillaume RÉMY, Sidi-Mohammed SENOUCI,François JAN and Yvon GOURHANT

4.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 1314.2. State of the art . . . . . . . . . . . . . . . . . . . . . . . 1354.3. General description of the proposedarchitecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1394.3.1. Network organization mechanismsfor areas completely covered by LTE . . . . . . . . . . 1394.3.2. Network organization mechanisms forareas that are not completely covered by LTE . . . 1404.3.3. Information collection application:LTE4V2X-C . . . . . . . . . . . . . . . . . . . . . . . . . . . 1414.3.4. Information dissemination application:LTE4V2X-D . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

Page 10: VehicularNetworks - download.e-bookshelf.de

viii Vehicular Networks

4.4. Detailed description of the LTE4V2X-Cprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1414.4.1. Initialization phase . . . . . . . . . . . . . . . . . 1434.4.2. Maintenance . . . . . . . . . . . . . . . . . . . . . . 1454.4.3. Extension for the areas not coveredby the LTE. . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

4.5. A detailed description of the LTE4V2X-Dprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1514.6. Performance evaluation. . . . . . . . . . . . . . . . . 1534.6.1. Hypotheses . . . . . . . . . . . . . . . . . . . . . . . 1534.6.2. The results of the simulation and theiranalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1564.6.3. Analysis of the impact of the handover. . . . 164

4.7. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 1684.8. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . 169

Chapter 5. Gateway Selection Algorithms inVehicular Networks . . . . . . . . . . . . . . . . . . . . . . . 171Ghayet e mouna ZHIOUA, Houda LABIOD, NabilTABBANE and Sami TABBANE

5.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 1715.2. Clustering and gateway selection inVANET networks . . . . . . . . . . . . . . . . . . . . . . . . 1735.2.1. Clustering in VANET networks . . . . . . . . . 1735.2.2. Gateway selection in a clustered/non-clustered VANET architecture. . . . . . . . . . . 1775.2.3. Conclusions . . . . . . . . . . . . . . . . . . . . . . . 181

5.3. Gateway selection in a clustered VANET-LTEadvanced hybrid network . . . . . . . . . . . . . . . . . . 1825.3.1. Problem statement. . . . . . . . . . . . . . . . . . 1825.3.2. LTE-advanced standard . . . . . . . . . . . . . . 1835.3.3. Proposed algorithm . . . . . . . . . . . . . . . . . 1875.3.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . 204

5.4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 2055.5. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . 206

l

Page 11: VehicularNetworks - download.e-bookshelf.de

Table of Contents ix

Chapter 6. Synthetic Mobility Traces forVehicular Networking . . . . . . . . . . . . . . . . . . . . . 209Sandesh UPPOOR, Marco FIORE and Jérôme HÄRRI

6.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2096.2. Generation process . . . . . . . . . . . . . . . . . . . . 2126.2.1. Road topology database. . . . . . . . . . . . . . . 2126.2.2. Microscopic traffic flow description. . . . . . . 2156.2.3. Macroscopic road traffic description . . . . . . 218

6.3. Mobility simulators . . . . . . . . . . . . . . . . . . . . 2206.3.1. Microscopic traffic simulators . . . . . . . . . . 2206.3.2. Mesoscopic traffic simulators. . . . . . . . . . . 2216.3.3. Macroscopic traffic simulators . . . . . . . . . . 2226.3.4. Interactions between simulators . . . . . . . . 223

6.4. Mobility traces . . . . . . . . . . . . . . . . . . . . . . . 2266.4.1. Perception . . . . . . . . . . . . . . . . . . . . . . . . 2276.4.2. Small-scale measurements . . . . . . . . . . . . 2306.4.3. Road traffic imagery . . . . . . . . . . . . . . . . . 2316.4.4. Roadside detectors . . . . . . . . . . . . . . . . . . 2326.4.5. Sociodemographic surveys. . . . . . . . . . . . . 2336.4.6. Discussion . . . . . . . . . . . . . . . . . . . . . . . . 237

6.5. Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 240

Chapter 7. Traffic Signal Control Systems andCar-to-Car Communications . . . . . . . . . . . . . . . . 247Mounir BOUSSEDJRA, Nitin MASLEKAR, Joseph MOUZNAand Houda LABIOD

7.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2477.2. Classification of traffic signal control systems . 2497.2.1. Static systems . . . . . . . . . . . . . . . . . . . . . 2507.2.2. Dynamic systems . . . . . . . . . . . . . . . . . . . 251

7.3. Traffic signal control and car-to-carcommunication . . . . . . . . . . . . . . . . . . . . . . . . . . 2697.4. Summary and conclusion . . . . . . . . . . . . . . . . 2697.5. Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 273

List of Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

Page 12: VehicularNetworks - download.e-bookshelf.de
Page 13: VehicularNetworks - download.e-bookshelf.de

Introduction

Due to the technical improvements implemented by carmanufacturers, we have recently witnessed a significantdecrease in road traffic accidents in developed countries.However, there is still considerable scope for improvement inthe field of road safety. The advancement made in wirelesscommunications provides numerous possibilities for offeringdrivers a large panoply of interesting services in the field ofintelligent transport systems (ITS). The proposed solutionsinclude the possibility to enable communication directlybetween vehicles or through a telecommunicationinfrastructure. The first solutions are thus related toinfrastructureless communications and ad hoc networks; sowe will discuss vehicular ad hoc networks (VANETs); incontrast, the second set of solutions comprises moreconventional communications that can use infrastructures(general packet radio service (GPRS), universal mobiletelecommunications system (UMTS), long-term evolution(LTE), etc.). Hybrid solutions could be involved in order tomake the best use of available resources.

Page 14: VehicularNetworks - download.e-bookshelf.de

xii Vehicular Networks

Therefore, from a network point of view, we see that new,specific problems are emerging. These problems are relatednot only to the particular applications implemented but alsoto the heterogeneous aspect of the types of networks used.For example, in the given context, we cannot simply applythe proposed solutions to ad hoc networks (such as mobile adhoc network (MANET)). The tackled themes can be found atthe crossroads of several research communities: thetelecommunications research community and the researchcommunity of transport systems.

In this book, we discuss several interesting and relevantresearch topics related to vehicular networks, such ascongestion control, routing, clustering, interconnectionbetween vehicular networks and LTE/LTE advancednetworks, signal traffic control, simulation tools and mobilitytrace generation.

The main objective of this book is to present thecontributions brought by each research community in theirrespective fields. Finally, we have chosen a descriptiveapproach to draw up exhaustive reports, to globally presentthe individual author contributions, to illustrate clearly theiradvantages and limitations, and to pave the way for futureresearch. Readers wishing to broaden their knowledge of thetechnical concepts will find at the end of each chapter a set ofreferences and the recent publications of various authors.

Considering the diversity of the fields discussed in variouschapters, this book is structured into seven chapters.

Following the Introduction written by Houda Labiod andAndré-Luc Beylot, Chapter 1 written by Razvan Stanica,Emmanuel Chaput and André-Luc Beylot presents a state ofthe art of the congestion control protocols in VANETnetworks. This problem is very critical. A tendency towarddecentralized congestion control is emerging at the level ofacademic research, as well as at the level of standardization,

Page 15: VehicularNetworks - download.e-bookshelf.de

Introduction xiii

more particularly within the European TelecommunicationsStandards Institute (ETSI) where several technicalspecifications have been published on this subject. Fiveapproaches are discussed in this chapter: the first approachbased on the adaptation of the sending frequency of beacons,the second approach based on the increase in datatransmission flow rate (due to the use of complexmodulations), the third approach based on the transmissionpower control in order to increase the channel capacity, thefourth approach based on the reduction of the contentionwindow size and, finally, the fifth approach based on carriersensing. A performance assessment of several adaptivemechanisms involved is presented by comparing them to theIEEE 802.11p standard mechanism.

Chapter 2, written by Xunxing Diao, Jian-Jin Li, Kun-Mean Mou and Haiying Zhou, focuses on the geographicalrouting techniques in a pure VANET. The routing is, ofcourse, a basic, indispensable feature that must be supportedby every ad hoc network, including VANETs. The routing invehicular networks – which is different from classic IProuting and from MANET routing – is, in particular, achallenging problem due to the high mobility of vehicles onthe one hand and the frailty of wireless connections on theother hand, and due to the strong constraints of theapplications as well. The chapter presents a summary ofvarious ITS projects related to intervehicularcommunications. Wireless technologies, which areindispensable in the design of all routing techniques, aremade available, developed and experimented by these ITSprojects, and described in detail before addressing the keyproblem, that is geographical routing dedicated to VANET.In the conclusion of this chapter, the authors sketch a list ofopen questions such as security, location management,transport layer contextual techniques and, finally, thesupport of the Quality-of-Service in order to increase thereliability and efficiency of the applications.

Page 16: VehicularNetworks - download.e-bookshelf.de

xiv Vehicular Networks

Chapter 3, written by Véronique Vèque, Florent Kaisser,Colette Johnen and Anthony Busson, analyzes the forming ofclusters in vehicular networks. The authors start out fromthe assumption that the VANETs by themselves cannotimplement all the applications correctly, primarily becauseof their intermittent connection. They can only function inconjunction with an infrastructure. However, if we observeroad traffic, we notice that natural groups of vehicles areformed and the main objective then becomes to takeadvantage of these geographical characteristics in order toform clusters. The aim of clustering is to facilitate theorganization of communications and minimize their cost. Theauthors then propose a hierarchical protocol called a“convoy”, which allows the construction of stable clusters aswell as providing scalability.

Chapter 4, written by Guillaume Rémy, Sidi-MohammedSenouci, François Jan and Yvon Gourhant, sheds more lighton the previous chapter by focusing on the complementaritybetween infrastructureless vehicular networks and LTEnetworks. The idea is thus to fill in the gaps of theinfrastructure-based network coverage by using intervehiclecommunications. The solution is called LTE for vehicle-to-Xcommunications (LTE4V2X) and has several characteristics.A first protocol allows us to collect information and organizethe network in a centralized manner. Depending on the totalor partial coverage by the LTE network, several scenariosare considered. A second protocol deals with thedissemination of data toward the vehicles, uniquely either inLTE or in multihop networks. Giving specific examples, theauthors show that their solution is powerful and it allows usto fix, quite effectively, the gaps in coverage due to thepresence of tunnels, for example.

Chapter 5, written by Ghayet El Mouna Zhioua, HoudaLabiod, Nabil Tabbane and Sami Tabbane, discusses theintegration of VANET networks into fourth-generation

Page 17: VehicularNetworks - download.e-bookshelf.de

Introduction xv

mobile networks. The association between a mobile networkand a VANET network aims to improve the coverage of themobile network and the Quality-of-Service, while having thepossibility to resort to alternative traffic routes in case thereare any problems on the usual connections. In the first stage,the authors give an overview of the state of the art ofclustering algorithms proposed in the relevant literature.The gateway selection problem for the vehicle-to-infrastructure (V2I) connection is discussed in the case oftraffic transport from the VANET network toward theinfrastructure. The authors study the proposed algorithms ina clustered and non-clustered VANET architecture. Then,the authors look into the problem of gateway selection fromthe VANET network toward the LTE advanced network.

Chapter 6, written by Jérôme Härri, Sandesh Uppoorand Marco Fiore, deals with the simulation of vehicularnetworks. The authors present an exhaustive report on thesimulation tools used, including microscopic, macroscopicand mesoscopic traffic simulators, as well as on theinteractions between these different simulators. The chapterdetails the trace generation/mobility models used by thenetwork simulators aimed for the assessment of differentvehicular networks’ mechanisms; it also provides the readerwith the basic elements for successfully carrying outsimulations for these type of networks.

Chapter 7 describes the signal traffic control systems. Theauthors provide a classification of the different existingsystems and a fine comparison between them. A specialemphasis is placed on the dynamic systems whose objectiveis to reduce traffic jams and improve traffic flow. A neworiginal approach via vehicle-to-vehicle communications ispresented. The proposed control system adjusts the durationof traffic lights by using the density information provided bythe dissemination protocols, which, in turn, use geographicand directional clustering.

Page 18: VehicularNetworks - download.e-bookshelf.de

xvi Vehicular Networks

Besides presenting several relevant and very interestingareas of research, we hope that this book will contribute tobring a realistic global view of the evolution of VANETs. Asall the authors in this book have already pointed out, therestill remain numerous research topics to be explored.

We warmly thank the authors for their very relevantcontributions and the quality of their work, as well as theproofreaders who had the difficult task of helping us delivera final version of this book.

Houda LABIOD and André-Luc BEYLOTApril 2013

Page 19: VehicularNetworks - download.e-bookshelf.de

Chapter 1

Congestion Control for SafetyVehicular Ad Hoc Networks

1.1. Introduction

In the highly dynamic vehicular environment, congestioncontrol is essential, especially with regard to safety messages.Although a dedicated spectrum has been allocated forvehicular communications, the European 30 MHz IntelligentTransportation System (ITS) band (with a possible extensionto 50 MHz) or the US 75 MHz Direct Short RangeCommunication (DSRC) band still represent a scarceresource and need efficient mechanisms in order to beoptimally used under high vehicular density. In both Europeand the US, the allocated spectrum has been divided into10 MHz channels. From these channels, one is known as thecontrol channel (CCH) and it is used solely by road safetyapplications. The rest of the channels, called service channels(SCH), can be used by both safety and non-safetyapplications.

Chapter written by Razvan STANICA, Emmanuel CHAPUT and André-LucBEYLOT.

Page 20: VehicularNetworks - download.e-bookshelf.de

2 Vehicular Networks

The number of proposed vehicular safety applications thatcould use direct vehicle to vehicle (V2V) communication isimpressive [PAP 09]. However, at a close inspection, it can benoted that all these applications practically use the sameinformation, coming from onboard sensors of neighboringvehicles: speed, acceleration, steering angle and location.

Considering this, the standardization bodies decided toadd a supplementary layer between the applications and thetransport protocol. The role of this layer, called messagesublayer in the IEEE Wireless Access in VehicularEnvironments (WAVE) architecture and facilities layer in theETSI ITS terminology, is to keep an accurate image of thesurrounding environment inside every vehicle and to provideapplications with the desired information.

The facilities layer only needs two types of messages inorder to achieve these objectives, called (in the ETSI ITSarchitecture) cooperative awareness message (CAM) anddecentralized environmental notification message (DENM).CAMs are regular beacons, transmitted by every vehicle witha predetermined frequency, and containing details about thevehicle that might be relevant to its neighbors from a safetypoint of view. In addition, if a vehicle detects a potentialhazard (e.g. a sudden brake) and considers that thisinformation needs to be quickly disseminated to the othertraffic participants, it transmits a DENM.

However, regardless of the scenario and message type,these safety messages are always transmitted in broadcastmode at the medium access control (MAC) layer. Even in thecase when the transmitted information targets a certaingeographical area (e.g. an electronic brake alarm is only ofinterest to vehicles traveling in the same direction as thetransmitter and situated behind it), the message is stillbroadcast and the filtering happens at the facilities layer, asdescribed by the ETSI framework [EUR 10].

Page 21: VehicularNetworks - download.e-bookshelf.de

Congestion Control 3

The broadcast nature of the CCH in vehicular ad hocnetworks (VANET) is an essential property thatdistinguishes it from other IEEE 802.11-based networks. Asa matter of fact, the numerous studies on the distributedcoordination function (DCF) implementing MAC mechanismsin IEEE 802.11 usually focus on unicast traffic, and broadcastmessages are only considered for control purposes. Oliveira etal. [OLI 09] quantify the influence of broadcast traffic on theperformance of IEEE 802.11 networks, and they find out thatthe effect of broadcast messages becomes significant whenthe proportion of broadcast traffic is higher than 50%. In thisscenario, the behavior of the network largely deviates fromwhat is predicted by classic DCF models. However, theauthors consider this situation quite unreal and they do notinvestigate the issue further.

Another important characteristic of safety messages comesfrom the limited lifetime of CAMs. As these beacons areproduced periodically by the facilities layer, there is a certainprobability that they can expire before the MAC layer has theopportunity to transmit them. When a CAM is waiting for theIEEE 802.11 back-off timer to expire, and the next beaconalso arrives in the transmission queue, the first message hasto be dropped, as its transmission would only disseminateoutdated information to its neighbors. This property, rarelytaken into consideration in VANET studies, has a significanteffect on the optimal value of different MAC layerparameters.

The IEEE 802.11p amendment [THE 10] is the preferredMAC technology in both the IEEE WAVE and the ETSI ITSarchitectures. IEEE 802.11p radios can communicate at adistance of 1 km. In a simple scenario, with a two-lane roadin both directions and an average inter-vehicular distance of50 m (a medium density highway), the number of one-hopneighbors reaches 160 vehicles. This is clearly a more

Page 22: VehicularNetworks - download.e-bookshelf.de

4 Vehicular Networks

challenging environment than the classic Wireless Local AreaNetwork (WLAN), with a central access point and no morethan 10–20 nodes. The MAC layer protocol, therefore, needssolutions for this congested environment to achievescalability.

Congestion control mechanisms received a lot of attentionfrom the VANET research community and the most relevantstudies in this area are summarized later. Thestandardization bodies also recognized the importance of adecentralized congestion control framework for V2V safetycommunications, and ETSI published a series of technicalspecifications in this area in July 2011 [EUR 11]. In the US,the Society of Automotive Engineers (SAE) is also developinga standard with similar objectives, SAE J2945.1, currently ina draft phase. SAE J2945.1 is expected to be integrated intothe WAVE architecture as a complement for the differentIEEE standards.

In this chapter, five different approaches for MAC layercongestion control are discussed. In section 1.2, beaconingfrequency adaptation is presented that reduces the number oftransmitted safety messages in a dense network, speculatingthe relationship between high density and reduced speed invehicular traffic. In section 1.3, increased data rates can beachieved by using more complex modulations and result in alower occupancy of the CCH. Other proposals form the objectof section 1.4, which are based on the fact that transmissionpower control has an important impact on the number ofhidden nodes, and can increase the spatial reuse and hencethe channel capacity, in a congested network. In section 1.5,the fourth element, the minimum contention window(CWmin), is analyzed, a parameter with a major importancefor collision probability in an IEEE 802.11 network. Finally,the role of the physical carrier sense in congestion control ishighlighted in section 1.6.

Page 23: VehicularNetworks - download.e-bookshelf.de

Congestion Control 5

1.2. Beaconing frequency

The most obvious solution for controlling the channel loadin a congested environment is to reduce the number oftransmitted messages. This can be achieved in astraightforward manner in vehicular networks by adaptingthe frequency of the safety beaconing. However, such anadaptive mechanism should be designed carefully becausesending less messages can easily have the effect of damagingthe performance of safety applications instead of improvingit.

In this context, Fukui et al. [FUK 02] proposedtransmitting a CAM every time the vehicle travels a certaindistance instead of using a regular time interval. Accordingto a fundamental relationship from traffic theory, the meanspeed decreases when the vehicular density increases, thusthe consequence of this approach would be that nodes wouldreduce the beaconing frequency in a dense network wherethey would travel at low speeds. However, a basic example forwhich this solution fails is that of a vehicle waiting to make aleft turn in normal traffic. Because the vehicle would need tostop, the adaptive mechanism would practically turn off thebeaconing transmission, making an application like the leftturn assistant practically unusable. Therefore, as stationaryvehicles or low speeds are not always the consequences ofhigh vehicular densities, such an approach cannot beefficiently used in a real scenario.

As a part of the California PATH program, Rezaei et al.[REZ 07] take a more complex approach, where vehicles runan estimator to calculate the position of each one-hopneighbor based on the already received messages. The sameestimator is used by the node to predict its own position, as itwould be calculated by its neighbors. When the differencebetween the prediction and the actual location becomeslarger than a predefined threshold, the node transmits a

Page 24: VehicularNetworks - download.e-bookshelf.de

6 Vehicular Networks

safety beacon. The problem with this solution is that it isefficient in the predictable free-flow traffic, but not in acongested scenario where the acceleration is highly variable.Moreover, this self-estimator approach does not take intoaccount that the error at some of the neighbors might beconsiderably different because some of the transmittedbeacons could be lost. To solve this problem, Huang et al.[HUA 10] further develop this idea using the packet errorratio (PER) measured by a node to predict the lossesencountered by its neighbors. Still, measuring a PER in avehicular network without being able to detect collisions oruse feedback from the receivers is not a straightforward task.

Seo et al. [SEO 10] make an analogy between the safetybeaconing and the coupon collector problem. The mechanismthey design relies upon nodes piggybacking acknowledgments(ACKs) for the received beacons in their own safety message.Every received ACK would further delay the transmission ofthe next CAM, reducing the beaconing frequency. However,the introduced overhead would be significant, especially in adense network (a 4 byte ACK for 50 one-hop neighbors wouldresult in 200 extra bytes for every safety message). It is alsounclear if this approach would be compatible with a securityframework based on changing pseudonyms, like the approachcurrently proposed by the ETSI ITS architecture [PAP 08],because the ACK would need to include the identifier of thesender and most probably a sequence number for theacknowledged message.

Adaptive Traffic Beacon (ATB) is a solution/mechanism/approach proposed by Sommer et al. [SOM 11], where thebeaconing frequency is calculated based on two metrics: thechannel quality and the message utility. The idea is totransmit only the most important messages in a congestednetwork, reducing the offered load. Nevertheless, the channelquality is very sensitive to the number of collisions, whichimplies that the nodes are somehow supposed to detect such

Page 25: VehicularNetworks - download.e-bookshelf.de

Congestion Control 7

events, clearly a difficult task in a broadcast environment[STA 12]. Moreover, while different utility factors could helpdifferentiate between CAMs and DENs, safety beacons wouldbe difficult to prioritise, as they belong to the same messageclass. Finally, ATB increases the beaconing period to a meanof 3.6 s, clearly a value that does not comply with the delayrequirements of most safety applications, which vary between100 ms and 500 ms [PAP 09].

For more details on adaptive beaconing solutions, thereader is referred to the very comprehensive review paper bySchmidt et al. [SCH 10]. To conclude, while reducing thebeaconing frequency is a powerful tool in congestion control,the consequences of this adjustment on every safetyapplication should be taken into account. However, roadsafety applications will most likely not be standardized, andaddressing the constraints imposed by proprietary solutionsis a difficult task.

1.3. Data rate

The standards from the IEEE 802.11 family providemulti-rate capability at the physical layer, but withoutspecifying a particular approach for data rate adaptation. Inwireless communications, a more complex modulation resultsin a higher data rate, but it also requires a highersignal-to-noise ratio (SNR) at the receiver in order to becorrectly decoded. In the continuous fight for increasedbandwidth, the search for an efficient data rate controlsolution in the very lucrative WLAN industry stimulated theresearch in this area, and two main classes of mechanismshave been designed.

The solutions in the first class are based on their choice fora certain modulation and coding rate on the success or failureof previously sent messages. For example, the Robust Rate

Page 26: VehicularNetworks - download.e-bookshelf.de

8 Vehicular Networks

Adaptation Algorithm (RRAA), proposed by Wong et al.[WON 06], calculates the frame loss ratio in a short timewindow and compares this value with two predefinedthresholds. Too many losses determine a reduction in datarate, while a high percentage of successful transmissionsresults in the choice of a more complex modulation. Thesecond type of mechanisms are based on feedback from thereceiver regarding signal quality. A representative examplein this class is receiver-based auto rate (RBAR), described byHolland et al. [HOL 01]. RBAR relies upon the idea ofreceivers measuring the channel quality by analyzing theRequest To Send (RTS) message and calculating the highestachievable data rate based on the channel conditions. Thisinformation reaches the transmitter through the Clear ToSend (CTS) message and the best modulation is set for thedata frame.

The applicability of mechanisms from the two classesdiscussed above in a unicast vehicular network is studiedexperimentally by Camp and Knightly [CAM 08]. They showthat, because of the highly variable vehicular channel,decisions based on historical data are not accurate in thisenvironment, while the SNR-based mechanisms need to betrained in the target geographical region in order to cope withthe short coherence time (around 300 μs when other vehiclesare also present on the road).

In broadcast safety communications, solutions usingfeedback from the receivers are clearly unsuitable, thereforethe data rate adaptation mechanisms proposed for vehicularsafety messages follow the classic path of algorithms basedon historical data. Mertens et al. [MER 08] use RRAA in theirsimulation study, showing a significant improvement inperformance when compared with regular IEEE 802.11p.Nevertheless, they do not address the problem of computingthe frame loss ratio in a VANET. A more innovative approach

Page 27: VehicularNetworks - download.e-bookshelf.de

Congestion Control 9

is proposed by Ruffini and Reumerman [RUF 05], building onthe correctly received CAMs to create a map of the averagepath loss at different receivers and use this map to estimatethe highest data rate that could be successfully used.

However, the data rate adaptation problem is not exactlyequivalent in WLAN and in safety vehicular networks. In thefirst case, the goal is to maximize throughput by choosing thecorresponding modulation. While the problem is, of course,difficult to solve, the existence of a solution cannot bequestioned. In a VANET, the goal, as described in thedifferent congestion control architectures, is to reduce thetransmission time of a message when the vehicular densityincreases to give more stations the chance to access thechannel during a beacon period. The choice of the modulationis not dictated in this case by the quality of the channel, butby the number of one-hop neighbors, and there is currently noproof that the assignment of a data rate based solely on thelocal node density could increase the beaconing receptionratio. Moreover, an experimental study led by General MotorsR&D and presented by Bai et al. [BAI 10] argues that usingQuadrature Phase-Shift Keying (QPSK) and a data rate of6 Mb/s) is the only reasonable choice for V2Vcommunications. In their tests, only two communicatingvehicles have been used, ignoring therefore the impact ofmessage collision or interference. Even in these idealisticconditions, any modulation resulting in a higher data ratedrastically reduces the reception probability, even at smalldistances from the transmitter (less than 50% receivedbeacons at 50 m using 18 Mb/s). Furthermore, even the morerobust 3 Mb/s Binary Phase-Shift Keying (BPSK) modulationshows lower performance, because, in this case, thetransmission time is larger than the coherence time (found tobe around 300 μs, just like in [CAM 08]).

Page 28: VehicularNetworks - download.e-bookshelf.de

10 Vehicular Networks

Considering these results, data rate adaptationmechanisms need to be better evaluated, especially using realhardware during field tests, before a decision relative to theirusefulness in VANET congestion control can be taken.

1.4. Transmission power

Transmission power control is one of the most studiedtopics in the area of VANET congestion control. However,most of the proposed mechanisms are just variants ofsolutions previously proposed in a mobile ad hoc network(MANET) context, where the objective of adjusting thetransmission power is to minimize energy consumption whilekeeping a connected network. For example, Chigan and Li[CHI 07] use a directional antenna approach originallydesigned for topology control in MANETs to obtain theminimal power needed to transmit messages only to theclosest vehicle on each direction. Similarly, Yoon and Kim[YOO 11] adapt transmission power with the objective ofkeeping a constant number of one-hop neighbors.

Nevertheless, these solutions are not appropriate for asafety VANET, where messages need to cover a minimaldistance, not a certain number of neighbors. With theserequirements in mind, Guan et al. [GUA 07] define a targetrange for safety messages. When a node receives a message,it calculates the distance from the sender and verifies if it ispositioned inside the target range. Vehicles receiving abeacon despite being outside the target range include theidentifier of the transmitter in a special feedback field in theirown beacon. Using the information in this field, a station cancalculate how many nodes outside the target range werereached by its transmission and the goal of the power controlmechanism is to keep this number between certain limits.

Page 29: VehicularNetworks - download.e-bookshelf.de

Congestion Control 11

Another proposal using special feedback piggybacked inthe CAMs is the distributed fair power adjustment forvehicular environments (D-FPAV) strategy described byTorrent-Moreno et al. [TOR 09]. D-FPAV defines a maximumbeaconing load (MBL) that can be accommodated by the CCHwhile still having spare bandwidth in the eventuality of aspecial notification. A distributed algorithm ensures anoptimal power level assignment, where vehicles use themaximal possible power that still respects the MBLconstraint. However, this optimality is achieved only whenthe power levels used by all the two-hop neighbors areknown.

Because the overhead introduced by D-FPAV is significant,especially under high node density when saving bandwidth isthe most important, Mittag el al. [MIT 08] designed segment-based power adjustment for vehicular environments (SPAV).SPAV on the one hand does not achieve an optimal assignmentlike D-FPAV, but on the other hand it does not require fullknowledge about the power levels used by different neighbors,but only an estimate of the local density that can be obtainedin a much more inexpensive manner.

The local node density (estimated, for example, from thereceived beacons) is also used in the computation of thetransmission power by Rawat et al. [RAW 09], but in this casethe transmission range is calculated using results from trafficflow theory. Artimy [ART 07] manages to entirely eliminatethe overhead for transmission power control, using only datafrom the onboard speedometer to estimate the local density,again using fundamental relationships from traffic flowtheory.

While calculating local density based on the CAMsreceived from the other vehicles is considered a naturalproperty of the safety beaconing, this task might becomplicated by the use of changing pseudonyms. Huang et al.

Page 30: VehicularNetworks - download.e-bookshelf.de

12 Vehicular Networks

[HUA 10] propose a solution that can cope with the VANETsecurity requirements. In their framework, a node simplymeasures the channel occupancy from the informationprovided by the clear channel assignment (CCA) function. Ifthe percentage of time the medium is sensed as busy in thelast beaconing period is under a certain threshold Umin, thenode uses the highest power level, otherwise a linearmapping between the channel occupancy and transmissionpower is used.

Because of its excellent properties and its feasibility usingexisting hardware, transmission power control is consideredas a central mechanism for congestion control in VANETs andit has been included in the ETSI ITS decentralized congestioncontrol framework [EUR 11].

1.5. Minimum contention window

The minimum contention window (CWmin) is one of themost important parameters of the IEEE 802.11 MAC layer.CWmin represents the initial value of the CW , the superiorlimit of the interval from which the back-off mechanismdraws the number of idle slots the station has to wait beforeattempting a transmission. For unicast communication, thevalue of CW is doubled every time an expected ACK messageis not received within a predefined delay and it is reset toCWmin for every acknowledged reception, leading to theso-called binary exponential back-off (BEB) mechanism.

Even before the release of the first version of the IEEE802.11 standard, Bianchi et al. [BIA 96] showed that theoptimal value for CWmin depends on the number ofcontending stations. More exactly, their analysis shows that,in a saturated WLAN, the throughput is maximized when:

CWmin ≈ nc 2Tt, [1.1]