Next Article in Journal
Millennials’ Awareness and Approach to Social Responsibility and Investment—Case Study of the Czech Republic
Next Article in Special Issue
Detection and Localization of Water Leaks in Water Nets Supported by an ICT System with Artificial Intelligence Methods as a Way Forward for Smart Cities
Previous Article in Journal
Sustainable Integrated Process Planning and Scheduling Optimization Using a Genetic Algorithm with an Integrated Chromosome Representation
Previous Article in Special Issue
Towards a Smart and Sustainable City with the Involvement of Public Participation—The Case of Wroclaw
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities

1
School of Information Science and Engineering, Yunnan University, Kunming 650091, China
2
Information Technology Development Center of Yunnan Province, Kunming 650091, China
3
Dipartimento di Informatica (DI), Università degli Studi di Milano, Via Celoria 18, 20133 Milano (MI), Italy
4
Department of Electrical and Computer Engineering, Khalifa University, Abu Dhabi P.O. Box 127788, UAE
5
Department of Embedded Systems Engineering, Incheon National University, Incheon 22012, Korea
*
Author to whom correspondence should be addressed.
Sustainability 2019, 11(2), 503; https://doi.org/10.3390/su11020503
Submission received: 21 November 2018 / Revised: 16 December 2018 / Accepted: 29 December 2018 / Published: 18 January 2019

Abstract

:
In vehicular ad hoc networks (VANETs), one of the important challenges is the lack of precise mathematical modeling taking into account the passive vacation triggered by the zero-arrival state of nodes. Therefore, a polling-based access control is proposed in this paper using a sleeping schema to meet the challenge of quality of service (QoS) and energy-efficient transport in VANET environments for smart cities. Based on IEEE 802.11p, it was developed in an attempt to improve the energy efficiency of the hybrid coordination function of controlled channel access (HCCA) through a self-managing sleeping mechanism for both the roadside unit (RSU) and on-board units (OBUs) or sensor nodes according to the traffic load in vehicle -to-infrastructure (V2I) scenarios. Additionally, a Markov chain was developed for analyzing the proposed mechanism, and the exact mathematical model is provided with regard to the passive vacation. Then, the performance characteristics—including the mean cyclic period, delay, and queue length—were accurately obtained. In addition, the closed-form expression of the quantitative relationship among sleeping time, performance characteristics, and service parameters was obtained, which can easily evaluate the energy efficiency. It was proven that theoretical calculations were completely consistent with simulation results. The simulation results demonstrate that the suggested method had much lower energy consumption than the standard strategy at the expense of rarely access delay.

1. Introduction

As a key symbol of smart cities, intelligent and connected transportation systems (ICTSs) are growing rapidly, and so vehicular ad hoc networks (VANETs) have attracted a great deal of attention in the research community because of their contributions to road safety, traveling support, traffic efficiency, user-oriented service, etc. [1,2]. Urgent information, traffic-related information, and entertainment information are exchanged either between on-board units (OBUs) in vehicle-to-vehicle (V2V) scenarios or between OBUs (or sensor nodes) and infrastructure in vehicle-to-infrastructure (V2I) environments. Furthermore, data collected on the road can be forwarded to any other data centers through vehicle-to-everything (V2X) communications [3].
Connectivity and security are major concerns in V2V communications, as all the communication parameters rely on neighboring participants, such as wireless technologies and relative speed that play an important role in communication performance [4]. In V2I, roadside units (RSUs) are usually located apart from each other along the sideways to provide safety service and traffic management in urban or highway environments. Unlike the high-throughput and broad bandwidth requirements in user-oriented applications, safety services and traffic management messages are exchanged between vehicles and the roadside, which emphasizes the need for low access delay and transmission delays to provide the highest possible level of safety. Gristiano M. Silva et al. investigated the limitations and challenges associated with such infrastructure-based vehicular communications [5]. In the IEEE 802.11p standard, the hybrid coordination function of controlled channel access (HCCA) uses a collision-free polling scheme to provide the bounded delays for real-time applications. However, this may lead to resource overshooting, especially for low-load scenarios.
The passive vacation arising from the zero-arrival state often occurs when system load is not heavy, in which nodes can be allowed to sleep. Moreover, the sleeping schema is very useful in achieving a green environment because it helps to reduce unnecessary energy consumption and channel resources occupation, even if the nodes can be easily charged. In [6], a periodical sleeping and awakening mechanism on stations (STAs) was used in the Power Save (PS) model in order to save energy at the cost of data transmission during the sleep state. Transmission Opportunity Power Save Mode (TXOP PSM) can greatly improve the energy efficiency of STAs in highly dense networks and with heavy traffic conditions. In fact, traffic oscillation properties are significant in both temporal and spatial domains. Therefore, frequent transmission and idle listening from the RSUs cause much power to be lost. Unfortunately, most of the proposals in the power-saving do not take the RSUs into account.
On the other hand, although many sleeping-based power-saving mechanisms were studied, most of them were based only on computer simulations or energy consumption models [7,8], or only the maximum achievable energy efficiency was analyzed. However, the passive vacation or sleeping state resulting from the zero-arrival state of nodes is rarely considered during system modeling, which has led to a decrease in accuracy [9]. This situation requires a theoretical model that can easily assess the quantitative relationship among system performance, sleeping factor, and network control parameters.
Accordingly, considering the passive vacation, a k-limited ( k = 1 ) polling-based access control protocol with the sleeping technique named Polling Control with Sleeping (PC-S) media access control (MAC) is proposed in this paper for V2I VANETs. A self-managing sleeping mechanism is used for both RSUs and OBUs (or nodes) to improve the energy efficiency of HCCA according to the traffic load. For those OBUs or sensor nodes with transmission requirements, RSU notifies and updates the reserved service slots, respectively depending on their registered sequence. As a result, the nodes can turn off the radio transceivers to save energy and just wake up on their service slots. When none of the nodes request to transmit data and wake up after a sleeping period, the RSUs also turn to sleep or can maintain a low-power waiting state to deal with critical messages.
In addition, the relationship between system performance characteristics and sleeping period will be examined in this study. The mathematical model of PC-S will be adjusted using the embedded Markov chain theory and the probability generating function. It should be noted that for the first time, the precise expressions of the first-order and high-order performance characteristics with the sleeping factor (e.g., the mean cyclic period, the queue length at polling epoch, the mean waiting time, and the queue length) are obtained in this study. As will be shown, the calculation deviation was reduced from more than 9% to almost zero compared to the standard strategy.
The rest of the paper is organized as follows: Section 2 provides an overview of VANETs in ICTS and related work. The proposed model is presented in Section 3. Section 4 contains a detailed analysis of the generating functions and the relationship between sleeping period and network performance. Numerical examples are also presented in Section 5 that provide insight into performance behavior and energy consumption. Finally, Section 6 concludes the paper.

2. Related Work

In VANET communication, several media access control (MAC) protocols are designed that can be cataloged as contention-based, contention-free-based, and hybrids of the previous two. In recent years, some advances have been made in the field of MAC for VANETs based on IEEE 802.11p (802.11p for short) [10]. Enhanced distributed coordination access (EDCA) at 802.11p is sufficiently flexible to deal with high mobility and frequent topological changes. However, it is completely decentralized, and random access features include deficiencies in strict timing and reliability, which makes it unfeasible in safety-critical applications. To overcome these problems, several MAC protocols based on time division multiple address (TDMA) are presented [10,11]. An overview of TDMA-based MAC protocols for VANETs is given in [2]. In 802.11p, the hybrid coordination function (HCF) of controlled channel access (HCCA) mechanism employs a polling scheme because of its ability to guarantee high QoS, which is essential for emergency information and some traffic related information delivery in vehicular environments. In current 802.11p HCCA, as with the point coordination function (PCF) in IEEE 802.11 for wireless local area networks (WLANs), if an OBU does not have any packet for transmitting, it will either send a null frame, or will send nothing back to the RSU. Idle polling will lead to resource dissipation and overshooting, and further it is a waste of energy. To enhance the channel utilization, a dynamic polling method has been proposed in [12], in which the central HCF coordinator assigned the TXOP dynamically by gathering requirements from the OBUs, even there was an improvement in throughput and delay. However, the complexity of HC scheduling was increased from O(n) to O(n2). In [13], a token passing approach on top of a random access MAC protocol is proposed to prevent channel contention and improve the reliability of the safety message transmissions. Although these protocols have improved the delay performance or beacon delivery ratio in VANETs, most of the analyses were done by simulation. Therefore, the lack of accurate and scalable models to achieve the quantitative relationship between quality of service (QoS) and network parameters is still felt.
According to the performance analysis, the superframe is employed in [14] to cut down the number of polling frames and improve the performance of a highly loaded system, but the idle energy consumption is ignored. In [15], the M/G/1 vacation model is introduced to analyze the latency feature of IEEE 802.11 PCF. However, the authors only considered the regular periodical vacation of the server. It did not matter if the nodes were idle or not, which could increase the delay when the nodes were not idle. In [16], the queue length distribution in the K-limited polling service is discussed using an iterative approximation, regardless of the sleep state. In [7], the GreenPoll MAC protocol combining the TXOP PSM with reservation and implicit polling is proposed to save power, but the node must take some energy to detect its transmission slots by overhearing the channel before it exchanges data with the access point (AP). Moreover, only the computation model for energy consumption analysis is presented, ignoring the system model.
To reduce energy consumption, some researchers have proposed some sleep strategies in the literature to minimize the effect of the sleeping mechanisms on system performances [17,18,19,20,21,22,23,24,25,26,27,28]. In [17,18], a sleeping/awakening mechanism with loose synchronization was proposed to extend the lifetime of the nodes by reserving long-length-frame sending, but the delay also increased. In [19], a method of slots reservation is used to save energy and improve system throughput in a burst traffic scenario by dividing the service time into periodic requests and sending-out slots. In order to reduce the delay, both the energy consumption and the packets are considered in [23] for updating the vacation period dynamically. In [25], a dispatching control scheduler to build an architectural health monitoring sensor network was suggested to save energy and reduce the end-to-end delay by deploying the father link based on the children links’ occupying on the routing tree. In [26], the scheduling lists of neighbors are collected to reduce consumption. In another study [27], a self-adapted sleep scheme is proposed to follow the changing traffic dynamics. In [28], the periodic polling system of the limited service is analyzed theoretically, but the zero-arrival state and the following sleep state is neglected in the mathematical model. In [29], the sleep state is combined into the mathematic model for the first time, and the expression of the mean cyclic period, first-order performance characteristic is obtained. However, the mathematical expressions of the high-order performance characteristics have not yet been obtained, let alone the relationship between performance and sleep period.
Therefore, to the best of our knowledge, none of the previous works have analyzed the performance characteristics theoretically using the sleep state in a mathematical model that simultaneously considers the energy efficiency. Therefore, in this paper, the PC-S, which is a 1-limited polling-based access control protocol with sleeping technique, is proposed for V2I VANETs. A sleeping technique (as will be described in Section 3.3) is applied to both OBUs and RSU. In addition, the mathematical model of PC-S is set so that the quantitative relationship between system performance and network control parameters can be easily evaluated.

3. Mechanism of PC-S

In this section, the access control mechanism of PC-S is described, including application vehicular environment, service mechanism, and sleeping technique.

3.1. Network Environment

Here, a mobile vehicular environment will be considered where the OBUs or nodes in the cluster have three different types:
  • Applicant Node (AN): An OBU or a sensor node that has applied to join the cluster;
  • Cluster Member (CM): An OBU or a sensor node that has been joined to the cluster and has been added to the polling list table;
  • Dissociative Node (DN): An OBU or a sensor node that has left the current cluster, but has not yet joined the other.
In Figure 1, an example of the proposed polling-based structure is presented. OBUs and other environmental sensor nodes in the coverage of the RSU form a cluster by a distance-based clustering algorithm, in which the RSU acts as a cluster header. Under the mechanism of PC-S, OBUs and sensor nodes can enter a sleep state and wake up at the time slot allocated by the RSU for sending its uplink messages. Furthermore, in some of spare cases, if none of the nodes in the cluster have data to transmit, the RSU will also go to sleep until the next round of transmission. Active RSUs in neighborhood work under different SCHs to prevent frequency interference.

3.2. 1-Limited Polling Access Mechanism

An HCCA superframe consists of a contention-free period (CFP) and a contention period (CP). For safety services and traffic management with a highly real-time requirement, data packets are delivered by a polling scheme in CFP with a high-level QoS guarantee. The user-oriented service data packets transmission and cluster update are executed at the CP phase.
During the CFP, the RSU broadcasts a beacon with cluster ID, user ID, and NAV time at the beginning of the CFP. It can also deliver downlink data packets after the beacon.
An immigrating OBU or a node with a transmission requirement (i.e., AN) will send an application to join the cluster after receiving the CFP_END (CE) frame. The RSU will assign a user ID for each AN, and broadcast in the beacon. Then, ANs turn into CMs after receiving their user ID and will be polled in a round robin fashion during the CFP, as shown in Figure 2. CMs will hold their user ID until leaving the current cluster. If a CM moves outside the coverage of the cluster head and still has transmission requirement, it will apply to join another cluster and be treated as an AN. Otherwise, it will be a DN.
All CMs receive the beacon to update the network allocation vectors (NAVs). On the PC-S MAC network, OBUs and nodes can deliver either one uplink data or null data with constant packet length when receiving a polling frame from the RSU. CMs inform the RSU of their buffer states in the ACK frame during visit periods. In the successive CFP, the RSU will not poll the CM that has declared its idle state.

3.3. Sleeping Technique

In the 802.11p standard, an OBU must respond within a short interframe space (SIFS) period once it receives a polling frame from the Hybrid Coordinator (HC) in the CFP duration. When the OBU or sensor node does not have any queued packet to send, it will send back a null frame, which is a waste of channel resources and energy consumption. Obviously, continuous interception and polling from the RSU in a completely empty network would be a serious energy waste. On the other hand, idle listening and null frame transmission from OBUs or sensor nodes would take up a large amount of channel resources.
In PC-S, the sleeping technique is used for both OBUs and the RSU. An OBU or a node will soon be in sleep state upon completion of the transmission and will announce its state to the RSU in the ACK. The RSU will not poll the sleeping OBU until new arrivals awaken it. As shown in Figure 3, the state transition is as follows:
  • For an RSU, it broadcasts a beacon frequently as long as there is at least one active OBU/node in the coverage area.
  • A vehicle/sensor node in the coverage starts as an AN, and then it becomes a CM when it has communication requirement and is added to the polling list by an RSU.
  • A CM waits for the polling from an RSU, and becomes a DN it is once beyond the communication coverage or finishes all the data transmission.
  • A CM will turn into sleep state as it has finished the entire data transmission, and will wake up when it has new requirements.
When the RSU’s polling list is empty (i.e., no active OBUs or nodes in the cluster), the RSU can choose to set a timer and go to sleep after sending a beacon frame, or it can remain in an active state to respond immediately.

4. Mathematical Model of PC-S and Performance Evaluation

In this section, the mathematical model of PC-S is obtained and the explicit expressions of the system performance characteristics are derived.

4.1. Outline

Most of the existing works in the literature have analyzed the performance of the HCCA-based medium access mechanism using simulations. To model the relationship among system parameters such as the sleeping period, traffic load, and the QoS, we expand the classical discrete-time 1-limited polling model to analyze the performance of PC-S. The service model can be described as follows:
In a cycle of service, an AP (i.e., an RSU) serves the node (i.e., sensor nodes and OBUs) in its polling list table one by one with a 1-limited service strategy in a subnet. The AP authorizes the channel to the polled node in turn. If the current node does not have any requests for data transmission or no response, the AP will poll the next node because it thinks the current node is sleeping or outside the subnet. When all nodes are idle, the AP will set a timer and will go to sleep after sending a beacon frame, and it will reset the polling service when the timer expires.

4.2. Mathematical Model of PC-S

Assume the PC-S system as a discrete time (timeline is divided into time slots) polling system that contains N ( N 2 ) infinite-buffer nodes Q 1 , Q 2 , , Q N . Active nodes will access the AP in FIFO order and transmit the data packets with 1-limited service discipline. The node keeps active when accessing to the AP and then turns to sleep if it is idle or served by the AP. If a node does not respond to the polling of the AP, the AP will skip it in the current polling round and remove it from the polling list, which can save the unnecessary switch-over time wasted on those idle nodes so as to improve the QoS of the AP when serving other nodes in need.

4.2.1. System Work Conditions

Suppose the system work conditions are as follows:
  • Data packets arriving at Q i ( i = 1 , 2 , , N ) can be regarded as an independent statistical process in accordance with the Poisson distribution. The generating function of the arrival process in node i is A i ( z i ) with the variance of σ λ i 2 = A i ( 1 ) + λ i λ i 2 and the arrive rate of λ i = A i ( 1 ) , so the total arrive rate is Σ i = 0 N λ i .
  • Data packets in node i ( i = 1 , 2 , , N ) receive individual services. The service time of a packet on each node is independent of each other. Their generating function is B i ( z i ) , with the variance of σ β i 2 = B i ( 1 ) + β i β i 2 and the mean value β i = B i ( 1 ) . Therefore, the load offered by Q i is ρ i = λ i β i and the system load ρ is equal to Σ i = 0 N ρ i .
  • The switch-over time of the AP from node i ( i = 1 , 2 , , N ) to its logical neighbor is independent. The generating is R i ( z i ) , with the variance of σ γ i 2 = R i ( 1 ) + γ i γ i 2 and the mean value γ i = R i ( 1 ) .
  • The sleeping time of the AP is independent. Its generating function is S ( z i ) , with the variance of σ ζ i 2 = S ( 1 ) + ζ i ζ i 2 and the mean value ζ = S ( 1 ) .
Moreover, suppose the random variables as follows:
  • υ i ( n ) denotes the service time of the AP for Q i ( i = 1 , 2 , . . . , N ) ;
  • u i ( n ) denotes the switch-over time of the AP from Q i ( i = 1 , 2 , . . . , N ) to Q i + 1 ;
  • μ i ( n ) denotes the packets arriving at Q j ( j = 1 , 2 , . . . , N ) in u i ( n ) ;
  • η i ( n ) denotes the packets arriving at Q j ( j = 1 , 2 , . . . , N ) in υ i ( n ) .
Let ξ i ( n ) denote as the number of data packets present at Q i ( i = 1 , 2 , . . . , N ) at t n when Q i begins to access the AP, the system status is described as { ξ 1 ( n ) , , ξ i ( n ) , , ξ N ( n ) } , and changes to Q i after the AP has served Q i and turns to poll Q i + 1 at t n + 1 .
Under the necessary and sufficient conditions for the stability ( Σ i = 0 N λ i ( β i + γ i ) < 1 ), the probability distribution is defined as
lim n P [ ξ i ( n ) = x i ; i = 1 , . . . , N ] = π i ( x 1 , . . . , x N ) .

4.2.2. N-Dimensional Generation Function of PC-S

Let G i ( z 1 , . . . , z N ) represent the N-dimensional distributions of ξ i ( n ) . Then, the generation function is
G i ( z 1 , z 2 , , z i , , z N ) = x 1 = 0 x 2 = 0 x i = 0 x N = 0 π i ( x 1 , , x i , x N ) z 1 x 1 z 2 x 2 z i x i z N x N i = 1 , . . . , N .
When the AP just finishes the service for Q i and starts the polling on Q i + 1 at t n + 1 , the expressions are
ξ k ( n + 1 ) = ξ k ( n ) + μ k ( u i ) + η k ( υ i ) , k i ξ i ( n + 1 ) = [ ξ i ( n ) 1 ] + + μ i ( u i ) + ζ i ( υ i ) ,
where
[ ξ i ( n ) 1 ] + = 0 , ξ ( n ) 1 ξ i ( n ) 1 , ξ ( n ) > 1 .
Then, we can obtain:
G i + 1 ( z 1 , z 2 , . . . , z i , . . . , z N ) = lim n E [ k = 1 N z k ξ k ( n + 1 ) ] = R i [ k = 1 N A k ( z k ) ] { 1 z i B i [ k = 1 N A k ( z k ) ] [ G i ( z 1 , . . . , z N ) G i ( z 1 , . . . , z N ) | z i = 0 ] + G i ( z 1 , . . . , z N ) | z i = 0 } + S [ A i ( z i ) ] G i ( 0 , . . . , 0 ) i = 1 , . . . , N .

4.3. Performance Analysis of PC-S

In this section, explicit expressions are obtained for the system performance parameters. Initially, an expression for the mean cyclic period of PC-S is obtained. These results ultimately lead to the first and second moments of the PC-S, and obtain the expression for the joint queue length at the polling epoch at Qi, further deriving the mean waiting time of packets and mean queue length on the timeline.

4.3.1. Mean Cyclic Period

Calculate the generating functions and their derivation at the point z = l , where z is the abbreviation of the ( 1 × N ) vector of ( z 1 , z 2 , . . . , z i , . . . , z N ) , and 1 is the ( 1 × N ) vector with 1, 0 is the ( 1 × N ) vector with 0. Define the first derivative of G i ( z ) at z = l as
g i ( j ) = lim z 1 , , z i , , z N 1 G i ( z ) z j g i 0 ( j ) = lim z 1 , , z i , , z N 1 G i ( z ) | z i = 0 z j
, where g i ( j ) is the length of Q j at the polling epoch when the AP serves the Q i , and g i 0 ( j ) is the length of Q j at the polling epoch when the AP is polling the Q i which is empty.
Define θ as the mean cyclic period that the average time the AP takes to serve all the demanding nodes for a round. Thus, the mean cyclic of PC-S is formulated as (detailed derivation process described in Appendix A):
θ P C S = N γ + ζ G ( 0 ) 1 N β λ
where G(0) represents the system state, where all the nodes have no data in a polling round. That is, the system is currently idle.

4.3.2. Joint Queue Length at the Polling Epoch

Define the second derivative of G i ( z ) at z = l as
g i ( j , l ) = lim z 1 , , z i , , z N 1 2 G i ( z ) z j z l g i 0 ( j , l ) = lim z 1 , , z i , , z N 1 2 G i ( z ) | z i = 0 z j z l
.
Calculate Σ i = 1 N g i + 1 ( j , l ) and Σ i = 1 N g i + 1 ( j , j ) (Equations (A4)–(A8) in Appendix A), the first derivation of G i ( z ) is given by:
g i ( i ) P C S = N 2 [ 1 N λ ( β + γ ) ] { 2 [ λ γ + ζ λ N G ( 0 ) ] ( 1 λ γ ) + [ γ + ζ λ β G ( 0 ) ] λ 2 ( N 1 ) ( λ β γ ) 1 N λ β + λ 2 R ( 1 ) + [ 1 + λ β 1 N λ β + 1 ( N 1 ) λ β N γ ( 1 N λ β ) ζ G ( 0 ) ] γ A ( 1 ) + N γ + ζ G ( 0 ) 1 N λ β λ 3 B ( 1 ) + 1 ( N 1 ) λ β N λ 2 G ( 0 ) S ( 1 ) }

4.3.3. Mean Waiting Time and Mean Queue Length on the Timeline

Define E [ W ] as the average waiting time for packets, which represents the time from the epoch when a packet arrives at the node to the time it is served. According to the related research in [28], the mean waiting time of packets in PC-S is given by:
E [ W P C S ] = R ( 1 ) 2 γ + 1 2 [ 1 N λ ( β + γ ) ] [ ( N 1 ) γ + ( N 1 ) λ β + 2 N λ β γ + ( N λ γ + λ β ) A ( 1 ) λ 2 + N λ B ( 1 ) + N λ R ( 1 ) ] + ( 1 λ β ) G ( 0 ) 2 [ N γ + ζ G ( 0 ) ] [ 1 N λ ( γ + β ) ] { [ 1 ( N 1 ) λ β ] S ( 1 ) R ( 1 ) γ ζ ( N 1 ) ( λ β γ ) ζ }
According to Little’s law, the mean queue length on the timeline can be obtained as follows:
E [ L P C S ] = λ E [ W P C S ]

4.4. Performance Analysis of IEEE 802.11p

Using the same derivation method, the 802.11p performance parameters can be calculated as [28]:
θ P = N γ 1 N λ β
g i ( i ) P = N 2 [ 1 N λ ( β + γ ) ] [ 2 λ γ ( 1 λ γ ) + λ 2 R ( 1 ) + ( N 1 ) ( λ β γ ) λ 2 γ 1 N λ β + ( 1 + λ β 1 N λ β ) γ A ( 1 ) + N γ λ 3 B ( 1 ) 1 N λ β ]
E [ W P ] = R ( 1 ) 2 γ + 1 2 [ 1 N λ ( β + γ ) ] [ ( N 1 ) γ + ( N 1 ) λ β + 2 N λ β γ + ( N λ γ + λ β ) A ( 1 ) λ 2 + N λ B ( 1 ) + N λ R ( 1 ) ]
and
E [ L P ] = λ E [ W P ] .
However, the passive vacation caused by the zero-arrival state of all the nodes was neglected in [28], which treats the influence of passive vacation on system performance as zero, and inevitably yields precision error.
Unfortunately, the research done in [7] also did not provide the mathematical model that its service mechanism is similar with 802.11p when ζ = 1 , in which the AP moves forward a slot and keeps the active state (it is equivalent to that sleeping factor is 1 slot) when no nodes have data to transmit.

4.5. Analysis of Sleeping Time

In this section, the energy efficiency of PC-S is compared to 802.11p. To be fair, a subnet composed of an AP (or RSU) and N associated nodes (or OBUs) in the coverage of the AP are considered.
As expected, idle nodes will consume extra energy because of overhearing. Therefore, as the idle node sleeps longer, more energy is saved. Thus, analyzing the nodes’ sleeping time can verify the energy efficiency, which can avoid the different power consumption of radio chips from producers.
Under the premise of a stable state (i.e., N λ ( β + γ ) < 1 ), let E [ T S ] and E [ T S l p ] denote the average service time and average sleep time in a polling period, respectively. Let E [ T I d l _ A P ] denote the AP’s average idle time when all nodes have no data transmission requests. Let E [ T A T ] denote the time that a sleepy node will take to access the AP’s polling list if it is awakened by the new arrival, and E [ T I B S ] denote the idle time that a joined node will take to acquire its transmission order.

4.5.1. Sleeping Time Analysis for PC-S

In PC-S, each node with no packet to transmit will keep sleeping state and switch to the active state only if new packets arrive or at its own service time. This means that a node with data to transmit will return to the active state at its service slots allocated by the RSU in the latest ACK, and then go to sleep after γ + β slots in a cyclic period, during which those nodes without transmitting data are sleeping. The RSU can also go to sleep during the remaining time if there is no transmission.
Therefore, under ideal conditions, each node in the PC-S system will go to sleep in the interval time between two service cycles if it does not have data after the latest data transmission. Thus, the average sleep time of a node in one polling round can be approximately calculated as
E [ T S l p _ P C S ] = 1 2 ( 2 θ P C S E [ T A T _ P C S ] E [ T S _ P C S ] E [ T I B S _ P C S ] )
where
E [ T A T _ P C S ] = [ θ P C S ( γ + β ) ] [ 1 G i ( 0 ) ] = λ θ P C S [ θ P C S ( γ + β ) ] , E [ T S _ P C S ] = ( γ + β ) [ 1 G i ( 0 ) ] + ( γ + β ) [ 1 G i ( 0 ) ] 2 = λ θ P C S ( γ + β ) ( 1 + λ θ P C S ) , E [ T I B S _ P C S ] = [ θ P C S ( γ + β ) ] [ 1 G i ( 0 ) ] 2 = λ 2 θ P C S 2 [ θ P C S ( γ + β ) ] .
E [ T S _ P C S ] is the service time of a node in two cycles, and E [ T I B S P C S ] is the idle time that a joined node in PC-S will take to acknowledge its transmission order from the RSU if it has some new packets by chance. Otherwise, it will remain in a sleeping state.
Moreover, the average sleeping time and idle time of an AP are calculated as
E [ T S l p _ A P _ P C S ] = ζ G ( 0 )
E [ T I d l _ A P _ P C S ] = N γ G ( 0 )

4.5.2. Sleeping Time Analysis for IEEE 802.11p

Nodes in 802.11p will keep active for γ + β time to exchange data with an RSU if it has data to transmit, and in other cases, it will maintain overhearing or low-power state. So, E [ T S l p _ P ] = 0 , E [ T S l p _ P _ A P ] = 0 , and E [ T I d l _ A P _ P ] = N γ G ( 0 ) . Thus, the expression of average idle time of the node can be written as
E [ T I d l _ P ] = θ P E [ T A T _ P ] E [ T S _ P ]
where
E [ T A T _ P ] = [ θ P ( γ + β ) ] [ 1 G i ( 0 ) ] = λ θ P [ θ P ( γ + β ) ] , E [ T S _ P ] = ( γ + β ) [ 1 G i ( 0 ) ] = λ θ P ( γ + β ) .
E [ T A T _ P ] means the average idle time of the node in 802.11p, and E [ T A T _ P ] means the time that an idle node will take to access the AP’s polling list when some new packets arrive.

5. Experiments and Discussion

In order to complete the study of the PC-S model in V2I VANETs, it was essential to validate the theoretical analysis of the presented model before comparing the performance characteristics with 802.11p (e.g., mean cyclic period, queue length at the polling epoch, mean waiting time, mean queue length, average sleeping time, and energy efficiency).
Assume that the channel is in ideal condition and channel error correction is managed by an error detection mechanism that is running on the physical layer, and the 1 slot is 25 μ s and the nodes are symmetric. Furthermore, the service time slots of all packets are exponentially distributed with mean β , and the arrival processes are the Poisson process with rate λ , Meanwhile, the switch-over time is exponentially distributed with mean γ , and the sleeping time slots are exponentially distributed with mean ζ . The slots of a node which will take to switch from sleep state to active state is T s w , and the power consumption in different states is denoted by P t , P r , P i , P s 2 i , P s , and P t 2 s , respectively. The relative parameter values are listed in Table 1.
Monte Carlo simulations were carried out to evaluate the performance of the proposed polling scheme, 802.11p (i.e., mean cyclic period, queue length at the polling epoch g i ( i ) , mean waiting time E [ W ] , mean queue length E [ L ] , and average sleeping time E [ T S l p ] ).

5.1. Performance Comparisons

In this section, a set of experiments are presented to validate the mathematical model and the expressions of performance characteristics between 802.11p and PC-S.

5.1.1. Theoretical Analysis Verification

In Table 2, Table 3, Table 4 and Table 5, the calculation error related to the theoretical results and simulation results of θ and g i ( i ) in different scenarios are compared, respectively. When the load increased, the theoretical value of PC-S and 802.11p were closer to their own simulation value, which proves the correctness of theoretical analysis. However, for the reference 802.11p model, the error of theoretical expressions [28] exceeded 9% in comparison with simulation results when the load was light. This result shows the effectiveness of the two analysis methods. However, the proposed model is more suitable for realistic scenarios in which the zero-arrival state happens frequently. This means that the zero-arrival state or the following sleep state should be taken into account while modeling, especially when the system load is not heavy.
The error of 802.11p mainly results from ignoring the zero-arrival state of its mathematical model. Although the nodes in 802.11p will not turn to sleep state when they have no packets to send, they are actually idle and this fact was ignored while modeling [28]. As far as we know, the existing analysis models are not combined with zero-arrival state or sleep state, and the proposed model is excepted. However, nodes are often idle because of an absence of packets, especially when system load is light. Therefore, to design the networking environment and performance testing, the zero-arrival state, the triggered sleeping state, or rather the passive vacation should be considered.

5.1.2. Comparisons of Performance Variation

In Figure 4, the variation of θ , g i ( i ) , E [ W ] , and E [ L ] are compared, respectively. It became obvious with the increased traffic load, which clearly showed that the performance of the two systems was degraded and also tended to agree with each other when the load was heavy. Additionally, as shown in Figure 4, the increased switch-over time could result in worse performance, which indicates an unsuitable wireless channel or some distance among the AP and nodes. However, under the stability conditions, E [ W P C S ] was only 1 or 2 slots longer than that of 802.11p when ζ was 5 slots, which means that the QoS could be guaranteed in the PC-S system even if nodes and AP implemented a sleeping strategy when there was no request from the nodes. The reasons are follows:
  • AP polls the prior neighbor of the current node according to the polling list, but this neighbor is idle just then. When this case happens, the service moment of the current node will be put off.
  • If the AP chooses to turn to sleep while all nodes are sleeping or become DNs, as a result it will not wake up unless the sleeping time ends, even though there are some nodes awakened by the new arrival of packets. However, this is rare in cases of increased load.
Of course, the AP can also choose to keep being active to immediately respond to the critical messages, which will not affect the performance of those sleeping nodes without data.

5.2. The Influence of Sleeping Mechanism on the System Performance

Figure 5, Figure 6, Figure 7 and Figure 8 show the change trends of system performance through increasing the nodes under different sleeping factors, arrival rate, and switching-over time. Under the system stability condition, increased load led to worsening of the performance of the two systems. While in case of PC-S system, the influence of the sleeping factor on the system performance was more than that of traffic load when the normalized throughput (i.e., traffic load ρ = N λ β ) was under 0.3 . However, when the load increased, it was considered as a key factor.
Additionally, as shown in Figure 5, Figure 6, Figure 7 and Figure 8, in the case of short sleeping time, the sleeping mechanism had a slight influence on the performance degradation in different node scale environments. However, a sleeping factor larger than β + γ resulted in larger undesirable effects, especially when the throughput ρ was under 0.3.
In Figure 9, the performance variations affected by both γ and θ are compared, and it shows that:
  • Under the same service condition, PC-S performed worse than 802.11p. This is because when the traffic load was light, the bigger θ , the worse the performance. However, when load was heavy, the performances under different sleeping factors gradually tended towards those of 802.11p. This is because with increasing load, the probability that all terminals were idle was reduced. Therefore, regardless of the magnitude of the sleeping factor, the probability of the AP passively sleeping was dramatically reduced and the effect of the sleeping mechanism was reduced as well, and ultimately, almost reached zero.
  • The effect of γ on performance was much greater than the sleeping factor. As shown in Figure 9, even when θ was as large as 20 slots, the PC-S performance with γ = 1 slot was still much better than that of non-sleeping 802.11p with γ = 3 slots. Therefore, in system design, more attention should be paid to the distance or barriers between terminals and the AP.

5.3. Energy Efficiency Comparisons

In this section, experiments are presented to compare the average sleeping time and energy efficiency, respectively.

5.3.1. The Comparison of Average Node Sleeping Time

The energy consumption in sleeping mode is so low that is ignored. Hence, the energy consumption by a node’s sleeping time can also be evaluated, because under the same condition, the energy consumption of data exchange in these two systems is uniform. Obviously, the longer the idle nodes sleep, the greater the energy efficiency.
In Figure 10, the average sleep time of a node in PC-S under different λ and θ versus the idle time of node in 802.11p is compared.
As shown in Figure 10, the average sleep time of a node in PC-S and the idle time of a node in 802.11p both declined with increasing load. However, when the load was not very heavy, the idle nodes in 802.11p took more than 90 % of the time to overhear during the vacation without data transmission. The nodes in PC-S can turn the radio transceivers to sleep in order to reduce the energy consumption. As can be seen in Figure 10b, with increasing γ and N, even if the load almost reached the extreme working condition, the sleep rate for PC-S was still about 20 % .

5.3.2. The Comparison of Average RSU Sleeping Time

The average sleeping time of RSUs under the different arrival rates and sleeping factors when all the nodes were in sleeping mode is shown in Figure 11. For 802.11p, its RSU is always activated, even if the system is idle, so the sleep time is 0 and not shown on the figure.
In Figure 11, it is observed that with increasing sleeping factor under the same conditions, the sleeping time of the RSU became longer but it was shorter than ζ . This is because there were always a few nodes requesting data transmission, and so as long as the traffic load is not zero, the RSU must keep active. Furthermore, increases in the arrival rate and the network scale led to decreases in the RSU’s sleeping time, and finally it dropped down to 0. Especially, when the throughput was more than 0.3 (i.e., when the system became busy), the RSU’s sleeping time reduced rapidly—even less than 2 slots. Therefore, the RSU can choose to close its sleeping option in order to respond to the nodes quickly. However, this does not mean those idle nodes would remain active, and they can still choose sleeping mode.

5.3.3. Energy Efficiency Analysis

Unlike 802.11p, when the node in PC-S is idle, it can turn to sleep. So, the saved energy in its sleeping time can be calculated to measure the energy efficiency. If the energy efficiency is denoted by η , the following equation can be obtained:
η P C S = E [ T S l p _ P C S ] P i ( E [ T S l p _ P C S ] T W S ) P s T S W P s 2 i E [ T S _ P C S ] P t + E [ T S l p _ P C S ] P i + ( E [ T A T _ P C S ] + E [ T I B S _ P C S ] ) P r
where E [ T S _ P C S ] P t is the energy consumption when a node sends its data, T S W P s 2 i is the energy consumption when a node awakens from sleeping state, E [ T S l p _ P C S ] P i is the energy consumption if it keeps idle state during the sleep time, and ( E [ T A T _ P C S ] + E [ T I B S _ P C S ] ) P r is the energy consumption of overhearing when it accesses a subnet.
However, the nodes of 802.11p always remain in idle state, even if they have no transmission request. So, the following equation can be obtained:
η P = E [ T I d l _ P ] P r E [ T I d l _ P ] P i E [ T S _ P ] P t + E [ T I d l _ P ] P r + ( E [ T A T _ P ] + E [ T I B S _ P ] ) P r
where E [ T S _ P ] P t is the energy consumption when a node of 802.11p sends its data, E [ T I d l _ P ] P i is the energy consumption during its idle state, E [ T I d l _ P ] P r is the energy consumption if it keeps overhearing during E [ T I d l _ P ] , and ( E [ T A T _ P ] + E [ T I B S _ P ] ) P r is the energy consumption of overhearing when it accesses a subnet.
In Figure 12, the energy efficiency of a node under different arrival rates and sleeping factors is compared. The variations of energy efficiency when system load was not very high ( N = 10 , γ = 1 ) is given in Figure 12a. The variations when load was relatively high ( N = 20 , γ = 3 ) are given in Figure 12b. Thanks to employing the sleeping mechanism, the node in PC-S can save a great deal of energy when it is idle and turns to sleeping mode. However, the node in 802.11p just switches to the idle state from overhearing, which led to only less than 20 % energy savings, even when the load was light.
In addition, as shown in Figure 12a, the energy efficiency of PC-S with different θ came close when load was not high. On the other hand, larger θ resulted in better energy efficiency performance. However, according to Figure 12b, when γ was larger, the improvement of this performance was clearly less with the increment of λ .
If some packets are lost because of the channel error, the node must retransmit them, which means the arrival rate of the node becomes a little larger than before. Based on Figure 12, the larger λ , the less energy is saved. Thus, if channel error occurs, the energy efficiency should be reevaluated under the new arrival rate λ . In this case, the energy efficiency performed more poorly than that of the unaffected system.

5.4. Discussion

All the experiments must be done under normalized stability conditions: N λ ( β + γ ) < 1 . If the service time and the switch-over time are constant, then the maximum number of nodes in a subnet is calculated as follows:
M a x ( N ) = [ 1 λ ( β + γ ) ] , λ , β , γ > 0
Obviously, M a x ( N ) is decreasing with the increment of λ after β and γ adjustment. For example, if β = 9 slots and γ = 1 slot, then the maximum number of nodes in the coverage of a RSU is M a x ( N ) = 1 / 10 λ , 0 < λ 0.1 , which is decided by λ .
When N λ ( β + γ ) 1 , it means the system is oversaturated and ineffective. As a result, the data packets piled up in the nodes will increase in number and the RSU will not be able to transmit them on time> This means that the mean cyclic period, the average waiting time, and the queue length will become enormously high, as shown clearly in Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9.
If the AP chooses to activate the sleeping option on and turns to sleep, it will not wake up until the sleeping time is expired, even if some nodes are awakened by new packet arrivals. Considering the QoS requirement, the sleeping period of the AP should be less than the maximum latency of the packet, which is related to the moving speed, the packet type, etc.
Nevertheless, by introducing the sleeping factor caused by passive vacation, the calculation errors of performance parameters were reduced from more than 9 % to almost 0. Experimental results also verified the correctness and effectiveness of the theoretical analysis model.

6. Conclusions

Polling-based proposals in autonomic wireless communication are meaningful when they also consider QoS performance while dealing with energy savings. Towards this end, PC-S appears as the first solution that theoretically addresses sleep state in the system’s mathematical model for the autonomic V2I communication in VANETs and at the same time considers performance. Combined with passive vacation, this paper established a k-limited ( k = 1 ) analysis model as an expanding protocol that can be used in VANETs for smart cities by employing the embedded Markov chain theory and the probability generating function. For the first time, the exact expressions of first-order and high-order performance characteristics with the sleeping factor were obtained (i.e., the precise expressions of the mean cyclic period, mean waiting time, and mean queue length are achieved). The influence of the sleep mechanism caused by zero-arrival state on the system performances was also analyzed theoretically. Experiments showed that the system model with sleep state caused by the passive vacation of zero-arrival was more suitable for the real scenes than those without zero-arrival state or sleep state. Furthermore, they showed that zero-arrival state and the following sleep state should not be ignored in the theoretical analysis. Meanwhile, compared with IEEE 802.11p, PC-S was more energy-efficient, regardless of whether the load was light or heavy. The longer the sleeping time of a node without data transmission request, the more energy can be saved, and the less electromagnetic interferences from neighbors is, which is an extra benefit of turning off radio transceivers.
Although energy is not the key factor for OBU because it can be easily charged, for those nodes set by roadsides, their energy should be considered carefully. Even if the sleeping option is closed and the OBUs are allowed to keep idle when there are no transmission requests, the suggested mathematical model is still more satisfactory. This is because it pays particular attention to the passive vacation caused by zero-arrival of nodes that often happens, and their precision is verified.
In order to validate the performance of PC-S in some more realistic environments, ongoing work is aimed at implementing PC-S with communication errors involved in the programmable wireless platforms.

Author Contributions

M.H., Z.G., Z.Z. and M.A. conceived and designed the experiments; M.H., Z.G. and L.B. performed the experiments and analyzed the data; M.A. and E.D. contributed analysis tools; G.J. gave us very helpful suggestion and improved the English writing; M.H. and Z.G. wrote the paper.

Funding

This research was funded by the [National Natural Science Foundation of China], grant numbers [61463049, 61463051].

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

The generation function of N-dimensional distributions of ξ i ( n + 1 ) is:
G i + 1 ( z 1 , z 2 , . . . , z i , . . . , z N ) = lim n E [ k = 1 N z k ξ k ( n + 1 ) ] = R i [ k = 1 N A k ( z k ) ] { 1 z i B i [ k = 1 N A k ( z k ) ] [ G i ( z 1 , . . . , z N ) G i ( z 1 , . . . , z N ) | z i = 0 ] + G i ( z 1 , . . . , z N ) | z i = 0 } + S [ A i ( z i ) ] G i ( 0 , . . . , 0 ) i = 1 , . . . , N .
The expressions of the first derivative of G i ( z ) are:
g i + 1 ( j ) = g i ( j ) + β i λ j [ 1 G i ( z ) | z i = 0 ] + γ i λ j , i j
g i + 1 ( i ) = g i ( i ) + β i λ i [ 1 G i ( z ) | z i = 0 ] [ 1 G i ( z ) | z i = 0 ] + γ i λ i + ζ λ i G i ( 0 )
Let G i ( 0 ) denote G i ( z ) | z i = 0 , which means the system status when ξ i ( n ) = 0 at t n , calculate j = 0 N g i + 1 ( j ) , the relationship is given by:
[ 1 G i ( 0 ) ] = j = 1 N γ j λ j + ζ λ i G ( 0 ) 1 j = 1 N β j λ j .
Define θ as the mean cyclic period that the average time the AP takes to serve all the demanding nodes for a round. Assume the system is symmetrical, i.e., λ i = λ , β i = β ( i = 1 , . . . , N ) , then we have:
λ θ P C S = j = 1 N γ j λ j + ζ λ i G ( 0 ) 1 j = 1 N β j λ j = j = 1 N γ λ + ζ λ G ( 0 ) 1 j = 1 N β λ
Further, the expressions of the second derivative of G i + 1 ( z ) are:
g i + 1 ( j , l ) = lim z 1 , , z i , , z N 1 2 G i + 1 ( z ) z j z l = R ( 1 ) λ 2 + λ 2 γ + [ B ( 1 ) λ 2 + 2 λ 2 β γ + λ 2 β ] [ 1 G i ( 0 ) ] + ( λ β + λ γ ) [ g i ( j ) + g i ( l ) ] λ β [ g i 0 ( j ) + g i 0 ( l ) ] + g i ( j , l ) i j l , j = 1 , 2 , . . . , N
g i + 1 ( j , i ) = lim z 1 , , z i , , z N 1 2 G i + 1 ( z ) z j z i = R ( 1 ) λ 2 + λ 2 γ + [ B ( 1 ) λ 2 + 2 λ 2 β γ + λ 2 β λ β λ γ ] [ 1 G i ( 0 ) ] + ( λ β + λ γ ) [ g i ( j ) + g i ( i ) ] λ β [ g i 0 ( j ) + g i 0 ( i ) ] g i ( j ) + g i 0 ( j ) + g i ( j , i ) i j , j = 1 , 2 , . . . , N
g i + 1 ( j , j ) = lim z 1 , , z i , , z N 1 2 G i + 1 ( z ) 2 z j = R ( 1 ) λ 2 + A ( 1 ) γ + [ B ( 1 ) λ 2 + A ( 1 ) β + 2 λ 2 β γ ] [ 1 G i ( 0 ) ] + 2 ( λ β + λ γ ) [ g i ( j ) + g i 0 ( j ) ] + 2 λ γ g i 0 ( j ) + g i ( j , j ) i j , j = 1 , 2 , . . . , N
g i + 1 ( i , i ) = lim z 1 , , z i , , z N 1 2 G i + 1 ( z ) 2 z i = R ( 1 ) λ 2 + A ( 1 ) γ + [ B ( 1 ) λ 2 + A ( 1 ) β + 2 λ 2 β γ 2 λ β 2 λ γ + 2 ] [ 1 G i ( 0 ) ] + 2 λ γ g i 0 ( i ) + 2 ( λ β + λ γ ) [ g i ( i ) + g i 0 ( i ) ] 2 [ g i ( i ) + g i 0 ( i ) ] + g i ( i , i ) + [ S ( 1 ) λ 2 + A ( 1 ) ζ ] G i ( 0 ) i = 1 , 2 , . . . , N
g i + 1 ( i , l ) = lim z 1 , , z i , , z N 1 2 G i + 1 ( z ) z i z l = R ( 1 ) λ 2 + λ 2 γ + [ B ( 1 ) λ 2 + 2 λ 2 β γ + λ 2 β λ β λ γ ] [ 1 G i ( 0 ) ] + ( λ β + λ γ ) [ g i ( i ) + g i ( l ) ] λ β [ g i 0 ( i ) + g i 0 ( l ) ] g i ( l ) + g i 0 ( l ) + g i ( i , l ) i l , l = 1 , 2 , . . . , N

References

  1. Hartenstein, H.; Laberteaux, K.P. A Tutorial Survey on Vehicular Ad Hoc Networks. IEEE Commun. Mag. 2008, 6, 164–171. [Google Scholar] [CrossRef]
  2. Hadded, M.; Muhlethaler, P.; Laouiti, A.; Zagrouba, R.; Saidane, L. TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 2461–2492. [Google Scholar] [CrossRef]
  3. Masini, B.M.; Bazzi, A.; Zanella, A. A Survey on the Roadmap to Mandate on Board Connectivity and Enable V2V-Based Vehicular Sensor Networks. Sensors 2018, 18, 2207. [Google Scholar] [CrossRef] [PubMed]
  4. Gongjun, Y.; Rawat, D.B. Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks. Ad Hoc Netw. 2016, 58, 25–35. [Google Scholar]
  5. Silva, C.M.; Masini, B.M.; Gianluigi, F.; Ilaria, T. A survey on infrastructure-based vehicular networks. Mob. Inf. Syst. 2017, 2017, 6123868. [Google Scholar] [CrossRef]
  6. IEEE. IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; IEEE: Piscataway, NJ, USA, 2012; pp. 1–445. [Google Scholar]
  7. Palacios, R.; Mengistie, M.G.; Alonso-Zarate, J.; Kliazovich, D. Analysis of an energy-efficient MAC protocol based on polling for IEEE 802.11 WLANs. In Proceedings of the IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 5941–5947. [Google Scholar]
  8. Horng, S.; Lin, S. Optimal cyclic service of the centralized broadband wireless networks with k-limited discipline. Simul. Model. Pract. Theory 2011, 19, 382–392. [Google Scholar] [CrossRef]
  9. Tsao, S.; Huang, C. A survey of energy efficient MAC protocols for IEEE 802.11 WLAN. Comput. Commun. 2011, 34, 54–67. [Google Scholar] [CrossRef]
  10. Booysen, M.; Zeadally, S.; Rooyen, G. Survey of media access control protocols for vehicular ad hoc networks. IET Commun. 2011, 5, 1619–1631. [Google Scholar] [CrossRef]
  11. Omar, H.; Zhuang, W.; Li, L. VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs. IEEE Trans. Mob. Comput. 2013, 12, 1724–1736. [Google Scholar] [CrossRef] [Green Version]
  12. Bing, Z.; Mao-De, M.; Liu, C.; Shu, Y. Improvement of polling and scheduling scheme for real-time transmission with HCCA of IEEE 802.11p protocol. J. China Univ. Posts Telecommun. 2013, 20, 60–66. [Google Scholar]
  13. Balador, A.; Böhm, A.; Calafate, C.; Cano, J. A reliable token-based MAC protocol for V2V communication in urban VANET. In Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications, Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar]
  14. Panagiotakis, A.; Nicopolitidis, P.; Papadimitriou, G.; Sarigiannidis, P. Performance Increase for Highly-Loaded RoF Access Networks. IEEE Commun. Lett. 2015, 19, 1628–1631. [Google Scholar] [CrossRef]
  15. Feng, L.; Li, J.; Lin, X. A New Delay Analysis for IEEE 802.11 PCF. IEEE Trans. Veh. Technol. 2013, 62, 4064–4069. [Google Scholar] [CrossRef]
  16. Vuuren, M.; Winands, E. Iterative approximation of k-limited polling systems. Queueing Syst. 2007, 55, 161–178. [Google Scholar] [CrossRef] [Green Version]
  17. Ye, W.; Heidemann, J.; Estrin, D. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA, 23–27 June 2002; pp. 1567–1576. [Google Scholar]
  18. Dam, T. An adaptive energy-efficient MAC protocol for wireless sensor. In Proceedings of the 1st International Conference on Embedded Networked Sensor System (ACM SenSys’03), Los Angeles, CA, USA, 5–7 November 2003. [Google Scholar]
  19. Zhi, A.; Tan, H.; Seah, W. Design and performance analysis of MAC schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting. Ad Hoc Netw. 2011, 9, 300–323. [Google Scholar]
  20. Hnin, Y.; JIANG, X.; Susumu, H. Energy saving in wireless sensor networks. J. Commun. Comput. 2009, 6, 20–27. [Google Scholar]
  21. LI, Y.; Zhou, X.; You, X.; Liu, Z. IMECN–A New Topology Control Algorithm for Wireless Sensor Networks. Acta Electron. Sin. 2010, 38, 48–53. [Google Scholar]
  22. Liu, L.; Qin, X.L.; Dai, H.; Yan, W.Z.; Pan, J.J. An Energy-Efficient Spatio-Temporal Query Processing Algorithm in Wireless Sensor Networks. Acta Electron. Sin. 2010, 38, 54–59. [Google Scholar]
  23. Zhang, D.; Li, J.; Guo, L. Study on multi-channel reservation based MAC protocol for sensor networks. J. Commun. 2011, 32, 126–137. [Google Scholar]
  24. Zhang, D.S.; Li, J.; Guo, L. Asynchronous Multi-Channel MAC Protocol for WSNs. J. Softw. 2012, 23, 613–628. [Google Scholar] [CrossRef]
  25. Lin, C.; Chan, C.; King, C.; Lee, H. A cyclic MAC scheduler for collecting data from heterogeneous sensors. Comput. Commun. 2011, 34, 1630–1644. [Google Scholar] [CrossRef]
  26. Wang, Y.; Cao, G. Minimizing service delay in directional sensor networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1790–1798. [Google Scholar]
  27. Anchora, L.; Capone, A.; Mighali, V.; Patrono, L.; Simone, F. A novel MAC scheduler to minimize the energy consumption in a Wireless Sensor Network. Ad Hoc Netw. 2014, 16, 88–104. [Google Scholar] [CrossRef]
  28. Zhao, D. Study of polling systems with limited service. J. Electron. Inf. Technol. 1997, 19, 44–49. [Google Scholar]
  29. He, M.; Guan, Z.; Bao, L.; Ge, J. Mean cyclic period analysis of polling access control for wireless sensor networks. Chin. J. Sci. Instrum. 2016, 37, 2637–2644. [Google Scholar]
Figure 1. Application scenarios under the Polling Control with Sleeping media access control (PC-S MAC) protocol. OBU: on-board unit; RSU: roadside unit.
Figure 1. Application scenarios under the Polling Control with Sleeping media access control (PC-S MAC) protocol. OBU: on-board unit; RSU: roadside unit.
Sustainability 11 00503 g001
Figure 2. PC-S MAC: Active OBU1/node1 and OBU3/node3 transmit safety and traffic data packets to the RSU in order, while OBU2/node2 in idle state turns into sleep after receiving the beacon and downlink data from the RSU. CE: CFP_END; STA: station; PIFS: point interframe space; SIFS: short interframe space.
Figure 2. PC-S MAC: Active OBU1/node1 and OBU3/node3 transmit safety and traffic data packets to the RSU in order, while OBU2/node2 in idle state turns into sleep after receiving the beacon and downlink data from the RSU. CE: CFP_END; STA: station; PIFS: point interframe space; SIFS: short interframe space.
Sustainability 11 00503 g002
Figure 3. State transition diagram of the PC-S MAC. AN: Applicant Node; CM: Cluster Member; DN: Dissociative Node.
Figure 3. State transition diagram of the PC-S MAC. AN: Applicant Node; CM: Cluster Member; DN: Dissociative Node.
Sustainability 11 00503 g003
Figure 4. Comparisons of performance parameters in different λ and γ when N = 10 , ζ = 5 .
Figure 4. Comparisons of performance parameters in different λ and γ when N = 10 , ζ = 5 .
Sustainability 11 00503 g004
Figure 5. Comparisons of variation of mean cyclic period in different λ , ζ , and N when γ = 1 .
Figure 5. Comparisons of variation of mean cyclic period in different λ , ζ , and N when γ = 1 .
Sustainability 11 00503 g005
Figure 6. Comparisons of variation of g i ( i ) in different λ , ζ , and N when γ = 1 .
Figure 6. Comparisons of variation of g i ( i ) in different λ , ζ , and N when γ = 1 .
Sustainability 11 00503 g006
Figure 7. Comparisons of variation of E [ W ] in different λ , ζ , and N when γ = 1 .
Figure 7. Comparisons of variation of E [ W ] in different λ , ζ , and N when γ = 1 .
Sustainability 11 00503 g007
Figure 8. Comparisons of variation of E [ L ] in different λ , ζ , and N when γ = 1 .
Figure 8. Comparisons of variation of E [ L ] in different λ , ζ , and N when γ = 1 .
Sustainability 11 00503 g008
Figure 9. Performance parameters variation comparisons in different λ , γ , ζ and N.
Figure 9. Performance parameters variation comparisons in different λ , γ , ζ and N.
Sustainability 11 00503 g009
Figure 10. Comparisons of node sleeping time in different λ , γ , ζ , and N.
Figure 10. Comparisons of node sleeping time in different λ , γ , ζ , and N.
Sustainability 11 00503 g010
Figure 11. Comparisons of sleeping time of RSU in different λ , ζ and N.
Figure 11. Comparisons of sleeping time of RSU in different λ , ζ and N.
Sustainability 11 00503 g011
Figure 12. Comparisons of node energy efficiency in different λ , γ , ζ , and N
Figure 12. Comparisons of node energy efficiency in different λ , γ , ζ , and N
Sustainability 11 00503 g012
Table 1. Test bed.
Table 1. Test bed.
ParametersValuesParametersValues
N (nodes)10, 20, 30 P t (slots)1.65
λ (packets/slot)0.0005–0.005 P r (W)1.4
β (slots)9 P i (W)1.15
γ (slots)1, 3 P s 2 i (W)1.725
ζ (slots)5, 10, 20 P s , P s 2 i (W)0.0045
T S W (slots)2.5
Table 2. Comparison of theoretical results and simulation results of θ between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 1 slots, and ζ = 10 slots.
Table 2. Comparison of theoretical results and simulation results of θ between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 1 slots, and ζ = 10 slots.
λ Theoretical Value of θ of 802.11p (slots)Simulation Value of θ of 802.11p (slots)Calculation Error of 802.11p (%)Theoretical Value of θ of PC-S (slots)Simulation Value of θ of PC-S (slots)Calculation Error of PC-S (%)
0.000510.467311.45719.46%19.961219.96060.003%
0.00110.990111.96958.91%20.039620.03900.003%
0.001511.560712.52848.37%20.218020.21780.001%
0.00212.192413.14867.84%20.499320.49950.001%
0.002512.909213.85177.30%20.876920.87590.0048%
0.00313.696914.61636.71%21.356921.35800.0052%
0.003514.588915.50046.25%21.954621.95490.0014%
0.00415.633816.52555.70%22.677822.67830.0022%
0.004516.809217.68035.18%23.574023.57470.003%
Table 3. Comparison of theoretical results and simulation results of g i ( i ) between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 1 slots, and ζ = 10 slots.
Table 3. Comparison of theoretical results and simulation results of g i ( i ) between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 1 slots, and ζ = 10 slots.
λ Theoretical Value of g i ( i ) of 802.11p (slots)Simulation Value of g i ( i ) of 802.11p (slots)Calculation Error of 802.11p (%)Theoretical Value of g i ( i ) of PC-S (slots)Simulation Value of g i ( i ) of PC-S (slots)Calculation Error of PC-S (%)
0.00050.00520.00579.62%0.01010.01000.0996%
0.0010.01110.01219.01%0.02020.02020.00%
0.00150.01750.01908.57%0.03090.03090.00%
0.0020.02470.02678.1%0.04190.04200.2381%
0.00250.03300.03547.27%0.05370.05380.1859%
0.0030.04220.04516.87%0.06640.06650.1504%
0.00350.05280.05616.25%0.08020.08040.2488%
0.0040.06540.06925.81%0.09540.09580.4175%
0.00450.08000.08435.38%0.11310.11360.4401%
Table 4. Comparison of theoretical results and simulation results of θ between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 3 slots, and ζ = 5 slots.
Table 4. Comparison of theoretical results and simulation results of θ between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 3 slots, and ζ = 5 slots.
λ Theoretical Value of θ of 802.11p (slots)Simulation Value of θ of 802.11p (slots)Calculation Error of 802.11p (%)Theoretical Value of θ of PC-S (slots)Simulation Value of θ of PC-S (slots)Calculation Error of PC-S (%)
0.000531.416632.30842.84%35.799635.79970.0003%
0.00132.963833.75432.4%36.802836.80110.0046%
0.001534.667735.36282.01%37.533837.53500.0032%
0.00236.581437.18161.64%39.457839.45940.0041%
0.002538.700739.21641.33%41.158441.15670.0041%
0.00341.090841.52141.05%43.131843.13310.003%
0.003543.784144.14090.81%45.498745.49770.0022%
0.00446.888247.17380.61%48.194648.19390.0015%
0.004550.397350.61870.44%51.454951.45720.0045%
Table 5. Comparison of theoretical results and simulation results of g i ( i ) between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 3 slots, and ζ = 5 slots.
Table 5. Comparison of theoretical results and simulation results of g i ( i ) between 802.11p and PC-S when N = 10 , β = 9 slots, γ = 3 slots, and ζ = 5 slots.
λ Theoretical Value of g i ( i ) of 802.11p (slots)Simulation Value of g i ( i ) of 802.11p (slots)Calculation Error of 802.11p (%)Theoretical Value of g i ( i ) of PC-S (slots)Simulation Value of g i ( i ) of PC-S (slots)Calculation Error of PC-S (%)
0.00050.01590.01632.52%0.01810.01810.00%
0.0010.03350.03432.39%0.03750.03750.00%
0.00150.05340.05452.06%0.05860.05860.00%
0.0020.07620.07751.71%0.08250.08260.1212%
0.00250.10230.10371.37%0.10930.10930.00%
0.0030.13280.13421.05%0.13970.13970.00%
0.00350.16880.17020.83%0.17610.17620.0568%
0.0040.21240.21400.75%0.21840.21850.0458%
0.00450.26520.26640.45%0.27150.27140.0368%

Share and Cite

MDPI and ACS Style

He, M.; Guan, Z.; Bao, L.; Zhou, Z.; Anisetti, M.; Damiani, E.; Jeon, G. Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities. Sustainability 2019, 11, 503. https://doi.org/10.3390/su11020503

AMA Style

He M, Guan Z, Bao L, Zhou Z, Anisetti M, Damiani E, Jeon G. Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities. Sustainability. 2019; 11(2):503. https://doi.org/10.3390/su11020503

Chicago/Turabian Style

He, Min, Zheng Guan, Liyong Bao, Zhaoxu Zhou, Marco Anisetti, Ernesto Damiani, and Gwanggil Jeon. 2019. "Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities" Sustainability 11, no. 2: 503. https://doi.org/10.3390/su11020503

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop