Next Article in Journal
Quantum Oscillator at Temperature T and the Evolution of a Charged-Particle State in the Electric Field in the Probability Representation of Quantum Mechanics
Next Article in Special Issue
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network
Previous Article in Journal
Inverted Oscillator Quantum States in the Probability Representation
Previous Article in Special Issue
Improving Localization Accuracy under Constrained Regions in Wireless Sensor Networks through Geometry Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs

School of Informatics, Xiamen University, Xiamen 361005, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(2), 218; https://doi.org/10.3390/e25020218
Submission received: 7 December 2022 / Revised: 30 December 2022 / Accepted: 16 January 2023 / Published: 22 January 2023
(This article belongs to the Special Issue Wireless Sensor Networks and Their Applications)

Abstract

:
Vehicular ad hoc networks (VANETs) have recently drawn a large amount of attention because of their enormous potential in road safety improvement and traffic management as well as infotainment service support. As the standard of medium access control (MAC) and physical (PHY) layers for VANETs, IEEE 802.11p has been proposed for more than a decade. Though performance analyses of IEEE 802.11p MAC have been performed, the existing analytical methods still need to be improved. In this paper, to assess the saturated throughput and the average packet delay of IEEE 802.11p MAC in VANETs, a two-dimensional (2-D) Markov model is introduced by considering the capture effect under Nakagami-m fading channel. Moreover, the closed-form expressions of successful transmission, collided transmission, saturated throughput, and average packet delay are carefully derived. Finally, the simulation results are demonstrated to verify the accuracy of the proposed analytical model, which also proves that this analytical model is more precise than the existing ones in terms of saturated throughput and average packet delay.

1. Introduction

In recent years, vehicular ad hoc networks (VANETs) have captured a great deal of attention from both industry and academia because of their enormous potential in improving road safety, efficiency of traffic management, and diversity of infotainment services [1,2]. To support both safety and non-safety applications, vehicle-to-vehicle (V2V), vehicle-to-pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle-to-network (V2N) communication modes are all required in VANETs. However, accessing the wireless channel effectively is key to supporting differentiated applications [3]. As one of the main channel access standards for VANETs, IEEE 802.11p outlines the specifications of medium access control (MAC), i.e., the distributed coordination function (DCF) and the enhanced distributed channel access (EDCA). There are four access categories (ACs) defined in EDCA, and each AC queue, as an enhanced variant of the DCF, called an enhanced distributed channel access function (EDCAF) that contends for transmission opportunities (TXOPs) using a set of EDCA parameters [4]. It is worth mentioning that DCF and EDCA will still be adopted in the evolving version, i.e., IEEE 802.11bd [5]. Since the DCF protocol is the fundamental channel access mechanism, it is necessary to complete a precise performance analysis of IEEE 802.11p DCF in VANETs.
Though many analytical models have been proposed to analyze the DCF protocol, none of them are very precise, especially for those that do not consider the capture effect (i.e., the common phenomenon in wireless channels) [6,7,8,9,10,11,12,13,14,15,16,17,18,19]. In wireless communication scenarios, the capture effect may occur when the received signal power from one transmitter is higher than that of the others at the receiver. In actuality, the existence of the capture effect is beneficial to the system performance of the IEEE 802.11-based wireless networks [20,21,22]. However, only a few analytical models consider the capture effect under different fading channels in VANETs [20,21,22,23,24,25]. Since the Nakagami-m fading is more in line with the wireless channel environment in VANETs [26], it is necessary to analyze the IEEE 802.11p DCF under this fading channel model. Though the capture effect under the Nakagami-m fading channel is considered in [25], only the formulation for the normalized throughput is given, not the close-formed one. The average packet delay is also not mentioned, even though it is an important metric. To the best of our knowledge, there is no existing analytical model deriving the close-formed expressions of successful transmission, collided transmission, saturated throughput, and average packet delay together while also considering the capture effect under Nakagami-m fading channel in VANETs. Motivated by this, we propose a novel analytical model to evaluate the real performance of IEEE 802.11p DCF by different metrics in VANETs. The main contributions are twofold.
A 2-D Markov model is introduced and the close-formed expressions of successful transmission, collided transmission, saturated throughput and average packet delay while also considering the capture effect under Nakagami-m fading channel are carefully derived.
The simulation results are presented to verify the accuracy of the proposed analytical model in terms of saturated throughput and average packet delay, which has a more precise accuracy than existing models. In fact, the capture effect can increase the saturated throughput and lower the average packet delay.

2. Related Works

G. Bianchi first proposed a two-dimensional (2D) Markov chain model (i.e., the famous Bianchi’s model [6]) to analyze the saturation throughput of the DCF protocol, with the assumptions of no backoff freezing mechanism and no retry limits. Since then, a great deal of research has been conducted based on this pioneering work. For instance, the authors in [7] presented an extension of Bianchi’s model to a nonsaturated environment, while the authors in [8] particularly considered the backoff freezing mechanism. In [9], the authors modeled collision alleviating DCF with finite retry limits. In [10], the authors introduced two models for analyzing the access delay and throughput of DCF in a single-hop setting under both saturated and unsaturated traffic loads. In [11], the authors analyzed the saturated throughput and delay of the IEEE 802.11p unicast with one AC (i.e., DCF), and then proposed an optimization methodology to improve the performances of DCF. In [12], the broadcast performance of the IEEE 802.11 MAC is analyzed in VANETs under the nonsaturated condition based on a one-dimensional (1D) Markov model modified from Bianchi’s model. The authors in [13] also investigated the throughput stability of DCF networks, and the authors in [14] modelled the EDCA with considering freezing mechanism, finite retry limits, and idle state for four ACs under both saturated and nonsaturated conditions.
However, all of the above-mentioned studies are based on the hypothesis of ideal (a.k.a. perfect) channel condition. Hence, the authors in [15] analyzed the system performance of the DCF based on Bianchi’s model under different channel conditions. In addition, the authors in [16] presented a probabilistic analysis of the communication performance with the DCF in a multi-platooning scenario, while the transmission error for a packet is assumed as a constant probability. Similarly, the authors in [17] also adopted the fixed probability to represent the propagation error when analyzing the saturation throughput of steganography in the IEEE 802.11p DCF protocol. In [18], the authors also analyzed the IEEE 802.11p EDCA under saturation traffic condition with constant probabilities of transmission errors. In [19], the authors proposed an analytical model for NC-PNC MAC (a hybrid MAC based on the DCF) to investigate the performance of periodical broadcast of safety messages in VANETs under the Nakagami-m fading channel, where the erasure probability was 0 if a receiver was located within the communication range of a transmitter, and if not, the average erasure probability was used. Unfortunately, all of these studies ignore the influence from capture effect in their analytical models.
Since the capture effect is a common phenomenon in wireless networks, it must be considered for the analytical results to be accurate [20]. Moreover, the authors in [21] show that the capture effect can lead to a significant throughput gain in CSMA networks, where the wireless channel has undergone block Rayleigh fading. In [22], the authors analyzed the saturation throughput of DCF with heterogeneous node transmit power levels while also considering the capture effect under the free-space propagation model. The authors in [27] considered the capture effect under free-space propagation model but used it to analyze the broadcast performance of DCF. Moreover, the capture effect under free-space propagation model was also adopted in [28]. The authors in [23] analyzed the saturation throughput of the DCF by considering the capture effect in a Rayleigh fading environment; in [24], the authors also analyzed the saturation throughput of the DCF, but they considered both the capture effect in a Rayleigh fading channel as well as the retry limits. Moreover, the authors in [25] analyzed the DCF with the capture effect in Hoyt, Rice, and Nakagami-m fading environments, but the freezing mechanism and the retry limits were ignored and the authors only considered the system throughput without giving closed-form expressions.
Therefore, in this paper, a novel analytical model that considers the freezing mechanism, finite retry limits, and capture effect under Nakagami-m fading channel is proposed to analyze the performance of IEEE 802.11p DCF more accurately. And then, the closed-form expressions of successful transmission, collided transmission, saturated throughput, and average packet delay are carefully derived. It should be pointed out that, as the DCF is the basis of EDCA, this analytical model can be easily extended to analyze the EDCA in VANETs.

3. Analytical Model

3.1. Description of DCF

In DCF-based networks, the nodes contend for the channel by using a carrier sense multiple access with collision avoidance (CSMA/CA) with a slotted binary exponential backoff (BEB) scheme. According to the DCF, each node with a packet to transmit senses the channel first. If the channel is idle for a period of time that exceeds the distributed inter frame space (DIFS), the node transmits the packet. Otherwise, it defers the transmission to avoid collision by starting a random backoff process, where the transmission is only permitted at the beginning of slots. When the backoff is initiated, the random backoff time is uniformly chosen in the range [ 0 ,   C W 1 ] , where C W is the contention window with the minimum W 0 at the first transmission attempt. The backoff counter is decremented by one at the end of each idle slot. When the backoff counter reaches zero, the node commences transmission irrespective of the channel status. However, the counter is frozen when the channel is busy and resumed when the channel is idle again for more than a DIFS. If a packet (DATA) is successfully received, the receiver sends back an acknowledgement (ACK) after a period of short inter-frame space (SIFS) to inform the transmitter for the correct reception. If no ACK is received within a specified ACK timeout interval, the transmitter will assume a failed transmission and schedule a retransmission by BEB algorithm. That is, C W is doubled and another backoff period is initiated. If the maximum of contention window ( W M = 2 M W 0 ) is reached and the transmission is still unsuccessful, C W is maintained at W M for at most f attempts. Otherwise, the packet will be discarded. The C W is reset to W 0 after a successful transmission or reaching the packet’s retry limits ( M + f ).
In fact, the DCF includes two access techniques: the basic access mode and the request-to-send/clear-to-send (RTS/CTS) mode. The former detailed above is a default two-way handshaking mechanism using DATA/ACK packets and the latter is a four-way handshaking mechanism using RTS/CTS packets to reserve the channel before packet transmission. The RTS/CTS mode follows the same backoff rules as the basic mode, which is to reduce the risk of large packet collision caused by the hidden node problem. As these two control packets include the duration of the ongoing transmission, the nodes update their network allocation vector (NAV) by the received RTS or CTS and defer the transmission for the specified duration to avoid collision. The major notions used in the analysis model are summarized in Table 1.

3.2. Probabilities of Transmission and Collision

According to [25], when the received signal power which comes from one node is greater than the sum of that of the others, the capture effect occurs at the targeted node. Since the Nakagami-m fading is more in line with the characteristics of the wireless channel in VANET scenario, it has been widely adopted in the performance analysis of VANETs [26]. Therefore, in this paper, the performance analysis of the DCF is under the Nakagami-m fading channel with considering the capture effect. For an inference-limited system, the condition for capture is γ t / k = 1 , k t n γ k > z , where γ t is concerned signal power from one node,   γ k is the interference signal power from other nodes, and z   is the capture threshold. Under the hypothesis of perfect power control, the capture probability conditioned on n 1 interferers for the concerned node can be calculated by:
p c a p ( n , z ) = 0 f γ t ( γ t ) Pr [ γ t / k = 1 , k t n γ k > z ] d γ t = 0 f γ t ( γ t ) [ 0 γ t / z f γ n 1 ( γ n 1 ) d γ n 1 ] d γ t ( a ) _ _ 1 Γ ( m ) Γ ( m n m ) k = 0 ( 1 ) k Γ ( m n + k ) k ! ( m n m + k ) z m n m + k
where f γ t ( γ t ) is the instantaneous received power in Nakagami-m fading channel and f γ n 1 ( γ n 1 ) is the n 1 fold convolution of f γ t ( γ t ) , which are respectively expressed as:
f γ t ( γ t ) = m m γ t m 1 γ ¯ m Γ ( m ) e m γ t γ ¯ , γ 0
f γ n 1 ( γ n 1 ) = m m ( n 1 ) γ ¯ m ( n 1 ) Γ ( m n m ) γ n 1 m ( n 1 ) 1 e m γ n 1 γ ¯
where m is the shape parameter ranging from 1/2 to . γ ¯ is the average received power determined by γ ¯ = P t x · C · r i α , where P t x is the transmission power, α is the path-loss exponent, and C is a constant related to the antenna gains, the carrier frequency, and the speed of light, which are the same for all nodes. For simplicity, the average received power from different nodes is the same for the receiver [21,29,30]. In fact, if the uplink is considered in VANETs, the RSU only cares about the number of vehicles in its coverage. However, the distance between the vehicle and the RSU has an effect on the communication quality, which can lead to unfairness for different vehicles communicating with the RSU from different distances. Therefore, for fairness, the assumption of power control is made, which means that the average values of received power from different vehicles at the RSU are the same. This assumption is reasonable and can also be found in the references [21,23,24,29,31]. The derivation of step (a) in (1) is detailed in our previous work in [31].
As shown in Figure 1, a 2-D Markov chain model is introduced for modeling the behavior of the DCF protocol while considering finite retry limits and backoff counter freezing. In this model, the saturation condition is considered, i.e., each node always has at least one packet to transmit. Here, the states of a node at time t can be represented as { s ( t ) ,   b ( t ) } , where s ( t ) with values from {0, 1,…, M + f } and b ( t ) with values from {0, 1,…, W i 1 }) are defined as the random backoff stage and the value of backoff counter at time t , respectively. These random variables are dependent because the maximum value of the backoff counter depends on the backoff stage:
W i = { 2 i W 0 ,             0 i M W M , M < i M + f
Let b ( i , k ) be the stationary distribution of the proposed 2-D Markov chains. Then, the one-step state transition probabilities can be given by:
P { ( i , k ) | ( i , k + 1 ) } = 1 p b , k [ 0 , W i 1 ) , i [ 0 , M + f ]
P { ( i , k ) | ( i , k ) } = p b , k ( 0 , W i 1 ] , i [ 0 , M + f ]
P { ( i , k ) | ( i 1 , 0 ) } = p c W i , k [ 0 , W i 1 ] , i ( 0 , M + f ]
P { ( 0 , k ) | ( i , 0 ) } = 1 p c W 0 , k [ 0 , W i 1 ] , i [ 0 , M + f )
P { ( 0 , k ) | ( M + f , 0 ) } = 1 W 0 , k [ 0 , W 0 1 ]
Therefore, we calculate the following steady state probabilities:
b ( i , 0 ) = ( p c ) i b ( 0 , 0 ) , i ( 0 , M + f ]
b ( i , k ) = 1 1 p b W i k W i b ( i , 0 ) = W i k W i ( p c ) i 1 p b b ( 0 , 0 ) , k ( 0 , W 0 1 ] , i ( 0 , M + f ]
Then, according to the normalization condition for stationary distribution, we have:
1 = i = 0 M + f k = 0 W i 1 b ( i , k )
Therefore, based on (6)–(8), we can obtain:
b ( 0 , 0 ) = 2 ( 1 p b ) ( 1 p c ) ( 1 2 p c ) ψ + 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 )
where ψ is represented as:
ψ = W 0 ( 1 p c ) ( 1 ( 2 p c ) M + 1 ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 ) + W 0 p c ( 2 p c ) M ( 1 2 p c ) ( 1 ( p c ) f )
Therefore, the probability that a node transmits in a randomly chosen slot can be expressed as:
τ t r a = i = 0 M + f b ( i , 0 ) = 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 ) ψ + 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 )
where p b , the probability that the channel is busy for a concerned node, can be calculated as:
p b = 1 ( 1 τ t r a ) n 1
Since the capture effect is considered, the probabilities of collided transmission in a given slot for a concerned node can be calculated by:
p c = j = 1 n 1 [ 1 p c a p ( j + 1 , z ) ] C n 1 j ( τ t r a ) j ( 1 τ t r a ) n j 1
where C n 1 i = ( n 1 ) ! / [ j ! ( n j 1 ) ! ] , and   p c a p   ( · , · ) is the capture probability calculated by (1). As seen, the nonlinear system composed of Equations (11) and (13) contains only two unknown parameters, i.e., τ t r a and p c . Therefore, their values can be obtained by numerical calculation, and the system has a unique solution.

3.3. Normalized Throughput

According to [6], the average length of a virtual slot can be calculated as:
E [ S l o t ] = ( 1 p t r a ) σ + p s p t r a T s + p t r a ( 1 p s ) T c
Let η denote the normalized throughput, i.e., the ratio of the duration of successful transmission of the payload to the average length of a virtual slot, then we have:
η = T s E [ P L ] E [ S l o t ] = p s p t r a E [ P L ] / R t ( 1 p t r a ) σ + p s p t r a T s + p t r a ( 1 p s ) T c
where E [ P L ] is the average payload of packet and R t is the channel rate. For simplicity, suppose all nodes send packets with the same length. p t r a denotes the probability that at least one node transmits in a concerned slot, and p s denotes the probability that there is a node successfully transmits in a certain slot conditioned on that at least one node transmits. σ , T s , T c denote the average durations of empty slot, successful transmission, and channel collision, respectively. Assume there are n nodes competing for the transmission chance in the network, then p t r a can be computed by:
p t r a = 1 ( 1 τ t r a ) n
Therefore p s can be calculated by:
p s = p s u c p t r a = i = 1 n C n i ( τ t r a ) i ( 1 τ t r a ) n i p c a p ( i , z ) 1 ( 1 τ t r a ) n
where p s u c is the probability of successful transmission in a randomly chosen slot and C n i = n ! / [ i ! ( n i ) ! ] .
For the basic mode, the average durations of successful transmission and failed transmission are computed as follows:
{ T s b a s = T H + T E [ P L ] + T S I F S + T P D + T A C K + T D I F S + T P D T c b a s = T H + T E [ P L ] + T D I F S + T P D
where the packet header is H = P H Y h d r + M A C h d r and T H = H R t is the duration of transmitting it.   T E [ P L ] = E [ P L ] R t ,   T S I F S ,   T D I F S , and T A C K = A C K R t are the durations of transmitting the packet payload, SIFS, DIFS, and transmitting ACK, respectively. T P D is the propagation delay. For the RTS/CTS mode, we have:
{ T s r t s = T R T S + T S I F S + T P D + T C T S + T S I F S + T P D + T H + T E [ P L ] + T S I F S + T P D + T A C K + T D I F S + T P D T c r t s = T R T S + T D I F S + T P D
where T R T S = R T S R t and T C T S = C T S R t is the time duration required to transmit RTS and CTS frames, respectively.

3.4. Average Packet Delay

The average delay for a successfully transmitted packet is defined as the time interval from the beginning that the packet is at the head of MAC queue for transmission to the end that an ACK for this packet is successfully received. It should be pointed out that the delay time for a packet dropped due to reaching the retry limit is not included. Therefore, the average delay for a successful transmission can be calculated as:
E [ D ] = E [ S l o t ] E [ S l o t N u m ]
where E [ S l o t ] is the average length of a virtual slot represented as (14) and E [ S l o t N u m ] is the average number of virtual slots required for a successful transmission calculated by:
E [ S l o t N u m ] = 1 j = 0 n 1 C n 1 j ( τ t r a ) j + 1 ( 1 τ t r a ) n j 1 p c a p ( j + 1 , z ) p d r o p 1 p d r o p E [ X d r o p ]
where the first term is the expected number of virtual slots for the successfully transmitted packet (including the average duration of the dropped packet due to reaching the retry limit) and the second term is the average number of virtual slots of dropped packet due to reaching the retry limit conditioned on the existing successful transmission. The probability of a dropped packet being caused by reaching the retry limit ( p d r o p ) and the average number of virtual slots required for a dropped packet ( E [ X d r o p ] ) can be severally calculated by:
p d r o p = ( p c ) M + f + 1
E [ X d r o p ] = i = 0 M + f W i 1 2 = W 0 ( 2 M + 1 1 ) + f W 0 2 M M f 1 2
Then, substitute (14), (21)–(23) and (18) (or (19)) into (20) with the values of τ t r a and p c , the average packet delay of a successful transmission for the basic mode (or RTS/CTS mode) can easily be obtained.

4. Model Validation

In this section, the simulation results are provided to validate the effectiveness of the proposed analytical model for both basic and RTS/CTS modes. All the results are calculated using MATLAB (as in references [3,21,26,27,31]) and the Monte Carlo method is used. The analytical results are calculated by the derived expressions, while the simulation results are found using an event-driven custom simulation program, written in MATLAB, that closely follows all the 802.11p DCF protocol details for each independently transmitting vehicle. For the sake of simplicity, the considered simulation scenario is that all vehicles communicate with a RSU as shown in Figure 2 (e.g., the drive-thru network scenario in [32]). In fact, the vehicle velocity, the traffic density, and the coverage of the RSU eventually lead to different numbers of vehicles in the coverage of the RSU. Therefore, we take the number of vehicles (which is equivalent to the vehicle density when the coverage of the RSU is given) into account for simplicity in the simulation, as in references [11,12,14,17,18,19,23,26,27,28,31].
To verify the improvement of the proposed model, it was compared with Cao’s model [14] with a single saturated AC queue (an extreme case) that uses the same simulation parameters for fairness. The main parameters used are listed in Table 2.
The transmission probability of a vehicle in a concerned slot depends on the values of W 0 , M , f , and the number of contending vehicles n . It is also influenced by the collision probability from Equations (11) and (14). As seen in Figure 3, when the number of vehicles increases, the collision probability increases because more vehicles contend for the channel, which leads to more vehicles performing the backoff procedure and deferring from accessing the channel. This causes the transmission probability to decrease, as shown in Figure 4. In addition, the values of both collision probability and transmission probability of the proposed analytical model with no freezing mechanism are presented, which are all higher than that of considering it. Without the freezing mechanism, regardless of the channel’s condition, the backoff counter of the vehicle will always decrease by 1, as in [24] (inconsistent with the DCF protocol). That is to say, the vehicle can acquire the transmission opportunity with less waiting time, which enlarges the transmission probability of the vehicle. Accordingly, the collision probability will increase because more vehicles may transmit at the same time. Obviously, the values of both the collision probability and the transmission probability for the proposed analytical model are very close to the simulation results, meaning that they are more accurate than the values in Cao’s model. In other word, it is obvious that the capture effect can effectively decrease the collision probability and gently increase the transmission probability. Therefore, the capture effect must be considered when analyzing the IEEE 802.11p DCF protocol in VANETs.
In Figure 5, the normalized saturated throughput is given for both basic mode and RTS/CTS mode. Obviously, the saturated throughput decreases as the number of contending vehicles increases in the basic mode because more vehicles contend for the channel, leading to wasted channel resources. In the RTS/CTS mode, even though more vehicles want to access the channel, the usage of RTS/CTS can decrease the packet collision, which eventually stabilizes the normalized throughput. Since ignoring the freezing mechanism in the proposed model enlarges the collision probability (shown in Figure 3), the normalized throughput is lower than that of considering it, especially in the basic mode. This occurs because more collisions result in more waste of channel resources, which will lower the normalized throughput. At the same time, the analytical results of the proposed model are very consistent with the simulation results, which are all higher than the results of Cao’s model, which does not consider the capture effect. In fact, the normalized saturated throughput can be improved distinctly by the capture effect, especially in the basic mode. That is to say, the basic mode is more sensitive to the capture effect than the RTS/CTS mode. This occurs because the capture effect can make transmission more successful. In addition, when the number of vehicles is increasing, the saturated throughput of the RTS/CTS mode can be higher than that of the basic mode for the situation when the packet collision is replaced by a smaller length of colliding packets (i.e., RTS/CTS).
In Figure 6, the average packet delay in both modes is presented. As seen in the figure, when the number of vehicles increases, more vehicles contend for the channel, which enlarges the average packet delay. Since ignoring the freezing mechanism in the proposed model results in higher transmission probability (shown in Figure 4) can allow more chances for the vehicle to transmit in a period of time, and more collision will happen. Though more collisions lead to a higher probability of dropping packets (due to reaching the retry limit), the average packet delay is close to that which occurs when considering the freezing mechanism in the basic mode as its calculation excludes the time occupied by a packet that is dropped because it has reached the retry limit (as described in the first paragraph of Section 3.4). However, in RTS/CTS mode, the average packet delay of ignoring the freezing mechanism decreases as the number of vehicles increases, and more so than it does when considering the freezing mechanism. In fact, the vehicle can receive more transmission opportunities by using short control packets (i.e., RTS/CTS) when ignoring the freezing mechanism, which results in more successful transmission of data frames in a certain period of time, and accordingly, a decrease in the average packet delay. Nevertheless, the freezing mechanism is one of the key characteristics of the DCF that must be considered when analyzing the DCF’s performance. Moreover, the average packet delay of the proposed model is less than it is in Cao’s model in both two modes that consider the capture effect, but are consistent with the simulation result. Since the capture effect can increase the probability of successful transmission, the number of retransmissions decreases, as does the average packet delay. Moreover, the proposed model makes it is easy to find that the basic mode is more sensitive to the capture effect than it is to the RTS/CTS mode.

5. Conclusions

In this study, we propose a novel analytical model for analyzing the IEEE 802.11p DCF protocol that considers the capture effect under the Nakagami-m fading channel, which is different from the existing models and more suitable to the real VANET scenario. The comparisons between the simulations and the analytical results verify the accuracy of the proposed analytical model. The results show that the normalized saturated throughput that considers the capture effect is higher than it is without the capture effect. Moreover, the capture effect causes the average packet delay to decrease. Therefore, when analyzing IEEE 802.11p DCF (or EDCA) or designing the improved MAC protocols in VANETs, the capture effect under Nakagami-m fading channel is a noticeably valuable element that is worthy of consideration.

Author Contributions

Conceptualization, Y.W. and L.C.; methodology, Y.W. and L.C.; software, Y.W.; validation, J.S. and L.C.; formal analysis, Y.W.; investigation, L.C.; writing—original draft preparation, Y.W.; writing—review and editing, Y.W. and L.C.; supervision, J.S. and L.C.; project administration, L.C.; funding acquisition, L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Science and Technology Key Project of Fujian Province (Grant No. 2021HZ021004).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.A.F.; Loureiro, A.A.F. Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw. 2016, 44, 90–103. [Google Scholar] [CrossRef]
  2. Wu, Q.; Liu, H.; Wang, R.; Fan, P.; Fan, Q.; Li, Z. Delay-sensitive task offloading in the 802.11 p-based vehicular fog computing systems. IEEE Internet Things J. 2019, 7, 773–785. [Google Scholar] [CrossRef]
  3. Wu, Q.; Xia, S.; Fan, P.; Fan, Q.; Li, Z. Velocity-adaptive V2I fair-access scheme based on IEEE 802.11 DCF for platooning vehicles. Sensors 2018, 18, 4198. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. IEEE Standard 802.11p: 2010. IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Wireless Access in Vehicular Environments. Available online: https://ieeexplore.ieee.org/document/5514475/ (accessed on 1 November 2022).
  5. Torgunakov, V.; Loginov, V.; Khorov, E. A Study of Channel Bonding in IEEE 802.11 bd Networks. IEEE Access 2022, 10, 25514–25533. [Google Scholar] [CrossRef]
  6. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  7. Duffy, K.; Malone, D.; Leith, D.J. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett. 2005, 9, 715–717. [Google Scholar] [CrossRef]
  8. Weng, C.E.; Chen, H.C. The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. Comput. Stand. Inter. 2016, 44, 144–149. [Google Scholar] [CrossRef]
  9. Madhavi, T.; Rao, G.S.B. Modelling collision alleviating DCF protocol with finite retry limits. Electron. Lett. 2015, 51, 185–187. [Google Scholar] [CrossRef]
  10. Felemban, E.; Ekici, E. Single hop IEEE 802.11 DCF analysis revisited: Accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases. IEEE Trans. Wirel. Commun. 2011, 10, 3256–3266. [Google Scholar] [CrossRef]
  11. Xie, Y.; Ho, I.W.H.; Magsino, E.R. The modeling and cross-layer optimization of 802.11 p VANET unicast. IEEE Access 2017, 6, 171–186. [Google Scholar] [CrossRef]
  12. Yang, Q.; Zheng, J.; Shen, L. Modeling and performance analysis of periodic broadcast in vehicular ad hoc networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  13. Zhao, Q.; Feng, L.; Zhao, L.; Li, Z.; Liang, Y. SatOpt partition: Dividing throughput-stability region for IEEE 802.11 DCF networks. IEEE Trans. Veh. Technol. 2020, 69, 10278–10290. [Google Scholar] [CrossRef]
  14. Cao, S.; Lee, V.C.S. An accurate and complete performance modeling of the IEEE 802.11p MAC sublayer for VANET. Comput. Commun. 2020, 149, 107–120. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Li, S.; Shang, Z.; Zhang, Q. Performance Analysis of IEEE 802.11 DCF under Different Channel Conditions. In Proceedings of the IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 24–26 May 2019; pp. 1–4. [Google Scholar]
  16. Peng, H.; Li, D.; Abboud, K.; Zhou, H.; Zhao, H.; Zhuang, W.; Shen, X. Performance analysis of IEEE 802.11p DCF for multiplatooning communications with autonomous vehicles. IEEE Trans. Veh. Technol. 2017, 66, 2485–2498. [Google Scholar] [CrossRef]
  17. Almohammedi, A.A.; Shepelev, V. Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel. IEEE Access 2021, 9, 14459–14469. [Google Scholar] [CrossRef]
  18. Harkat, Y.; Amrouche, A.; Lamini, E.S.; Kechadi, M.T. Modeling and performance analysis of the IEEE 802.11p EDCA mechanism for VANET under saturation traffic conditions and error-prone channel. AEU-Int. J. Electron. Commun. 2019, 101, 33–43. [Google Scholar] [CrossRef]
  19. Zhang, M.; Chong, P.H.J.; Seet, B.C. Performance analysis and boost for a MAC protocol in vehicular networks. IEEE Trans. on Veh. Technol. 2019, 68, 8721–8728. [Google Scholar] [CrossRef]
  20. Nyandoro, A.; Libman, L.; Hassan, M. Service differentiation using the capture effect in 802.11 wireless LANs. IEEE Trans. Wirel. Commun. 2007, 6, 2961–2971. [Google Scholar] [CrossRef]
  21. Sun, X. Maximum throughput of CSMA networks with capture. IEEE Wirel. Commun. Lett. 2016, 6, 86–89. [Google Scholar] [CrossRef]
  22. Lei, L.; Zhang, T.; Zhou, L.; Song, X.; Cai, S. Saturation throughput analysis of IEEE 802.11 DCF with heterogeneous node transmit powers and capture effect. Int. J. Ad Hoc Ubiquitous Comput. 2017, 26, 1–11. [Google Scholar] [CrossRef]
  23. Shah, A.F.M.S.; Ilhan, H.; Tureli, U. Modeling and performance analysis of the IEEE 802.11 MAC for VANETs under capture effect. In Proceedings of the IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Sofia, Bulgaria, 8–9 April 2019; pp. 1–5. [Google Scholar]
  24. Han, H.; Pei, Z.; Zhu, W.; Li, N. Saturation throughput analysis of IEEE 802.11b DCF considering capture effects. In Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  25. Leonardo, E.J.; Yacoub, M.D. Exact formulations for the throughput of IEEE 802.11 DCF in Hoyt, Rice, and Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2013, 12, 2261–2271. [Google Scholar] [CrossRef]
  26. Bharati, S.; Zhuang, W.; Thanayankizil, L.V.; Bai, F. Link-layer cooperation based on distributed TDMA MAC for vehicular networks. IEEE Trans. Veh. Technol. 2016, 66, 6415–6427. [Google Scholar] [CrossRef]
  27. Bazzi, A.; Masini, B.M.; Zanella, A.; Thibault, I. On the performance of IEEE 802.11 p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Trans. Veh. Technol. 2017, 66, 10419–10432. [Google Scholar] [CrossRef]
  28. Shagdar, O.; Nashashibi, F.; Tohme, S. Performance study of CAM over IEEE 802.11p for cooperative adaptive cruise control. In Proceedings of the Wireless Days, Porto, Portugal, 29–31 March 2017; pp. 70–76. [Google Scholar]
  29. Sanchez-Garcia, J.; Smith, D.R. Capture probability in Rician fading channels with power control in the transmitters. IEEE Trans. Commun. 2002, 50, 1889–1891. [Google Scholar] [CrossRef]
  30. Zanella, A.; Zorzi, M. Theoretical analysis of the capture probability in wireless systems with multiple packet reception capabilities. IEEE Trans. Commun. 2012, 60, 1058–1071. [Google Scholar] [CrossRef]
  31. Wang, Y.; Chen, L.; Shi, J. A novel capture-aware TDMA-based MAC protocol for safety messages broadcast in vehicular ad hoc networks. IEEE Access 2019, 7, 116542–116554. [Google Scholar] [CrossRef]
  32. Wang, M.; Shen, Q.; Zhang, R.; Liang, H.; Shen, X. Vehicle-density-based adaptive MAC for high throughput in drive-thru networks. IEEE Internet Things J. 2014, 1, 533–543. [Google Scholar] [CrossRef]
Figure 1. 2-D Markov chain model.
Figure 1. 2-D Markov chain model.
Entropy 25 00218 g001
Figure 2. V2I scenario.
Figure 2. V2I scenario.
Entropy 25 00218 g002
Figure 3. Collision probability.
Figure 3. Collision probability.
Entropy 25 00218 g003
Figure 4. Transmission probability.
Figure 4. Transmission probability.
Entropy 25 00218 g004
Figure 5. Normalized throughput.
Figure 5. Normalized throughput.
Entropy 25 00218 g005
Figure 6. Average packet delay.
Figure 6. Average packet delay.
Entropy 25 00218 g006
Table 1. Notions used in the model.
Table 1. Notions used in the model.
NotationDefinition
T E [ P L ] Average length of Payload
T H Duration of header
T A C K Duration of ACK
T R T S Duration of RTS
T C T S Duration of CTS
T S I F S Duration of SIFS
T D I F S Duration of DIFS
R t Channel rate
m The parameter of Nakagami fading
σ Duration of a backoff slot
T s Average duration of a successful transmission
T c Average duration of a collided transmission
T P D Propagation delay
M Maximum backoff stage
f Retransmission times after reaching the maximum backoff stage
n Number of nodes in the network
z Capture threshold
γ k The signal power from node k
γ ¯ Average received power at each node
p c a p Probability of capture effect
p b Probability that the channel is busy
p c Probability that the node observes a collided transmission
W i Contention window of backoff stage i
W 0 Minimum contention window
W M Maximum contention window
τ t r a Probability that a node transmits in a randomly chosen slot
p t r a Probability that there is at least one transmission in the concerned slot
p s Probability that one node successfully transmits in a concerned slot conditioned on that at least one node transmits
E [ S l o t ] Average length of a virtual slot
η Normalized throughput
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterSettingParameterSetting
E [ P L ] 512 bytes T S I F S 32 μ s
P H Y h d r 224 bits T D I F S 58 μ s
M A C h d r 192 bits σ 13 μ s
ACK304 bits T P D 1 μ s
RTS352 bits W 0 32
CTS304 bits W M 1024
R t 11 Mbps M 5
m 1.5 f 2
z 2Simulation time200 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Shi, J.; Chen, L. Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs. Entropy 2023, 25, 218. https://doi.org/10.3390/e25020218

AMA Style

Wang Y, Shi J, Chen L. Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs. Entropy. 2023; 25(2):218. https://doi.org/10.3390/e25020218

Chicago/Turabian Style

Wang, Yang, Jianghong Shi, and Lingyu Chen. 2023. "Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs" Entropy 25, no. 2: 218. https://doi.org/10.3390/e25020218

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop