You are currently viewing a new version of our website. To view the old version click .
Entropy
  • Article
  • Open Access

22 January 2023

Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs

,
and
School of Informatics, Xiamen University, Xiamen 361005, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Networks and Their Applications

Abstract

Vehicular ad hoc networks (VANETs) have recently drawn a large amount of attention because of their enormous potential in road safety improvement and traffic management as well as infotainment service support. As the standard of medium access control (MAC) and physical (PHY) layers for VANETs, IEEE 802.11p has been proposed for more than a decade. Though performance analyses of IEEE 802.11p MAC have been performed, the existing analytical methods still need to be improved. In this paper, to assess the saturated throughput and the average packet delay of IEEE 802.11p MAC in VANETs, a two-dimensional (2-D) Markov model is introduced by considering the capture effect under Nakagami-m fading channel. Moreover, the closed-form expressions of successful transmission, collided transmission, saturated throughput, and average packet delay are carefully derived. Finally, the simulation results are demonstrated to verify the accuracy of the proposed analytical model, which also proves that this analytical model is more precise than the existing ones in terms of saturated throughput and average packet delay.

1. Introduction

In recent years, vehicular ad hoc networks (VANETs) have captured a great deal of attention from both industry and academia because of their enormous potential in improving road safety, efficiency of traffic management, and diversity of infotainment services [1,2]. To support both safety and non-safety applications, vehicle-to-vehicle (V2V), vehicle-to-pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle-to-network (V2N) communication modes are all required in VANETs. However, accessing the wireless channel effectively is key to supporting differentiated applications [3]. As one of the main channel access standards for VANETs, IEEE 802.11p outlines the specifications of medium access control (MAC), i.e., the distributed coordination function (DCF) and the enhanced distributed channel access (EDCA). There are four access categories (ACs) defined in EDCA, and each AC queue, as an enhanced variant of the DCF, called an enhanced distributed channel access function (EDCAF) that contends for transmission opportunities (TXOPs) using a set of EDCA parameters [4]. It is worth mentioning that DCF and EDCA will still be adopted in the evolving version, i.e., IEEE 802.11bd [5]. Since the DCF protocol is the fundamental channel access mechanism, it is necessary to complete a precise performance analysis of IEEE 802.11p DCF in VANETs.
Though many analytical models have been proposed to analyze the DCF protocol, none of them are very precise, especially for those that do not consider the capture effect (i.e., the common phenomenon in wireless channels) [6,7,8,9,10,11,12,13,14,15,16,17,18,19]. In wireless communication scenarios, the capture effect may occur when the received signal power from one transmitter is higher than that of the others at the receiver. In actuality, the existence of the capture effect is beneficial to the system performance of the IEEE 802.11-based wireless networks [20,21,22]. However, only a few analytical models consider the capture effect under different fading channels in VANETs [20,21,22,23,24,25]. Since the Nakagami-m fading is more in line with the wireless channel environment in VANETs [26], it is necessary to analyze the IEEE 802.11p DCF under this fading channel model. Though the capture effect under the Nakagami-m fading channel is considered in [25], only the formulation for the normalized throughput is given, not the close-formed one. The average packet delay is also not mentioned, even though it is an important metric. To the best of our knowledge, there is no existing analytical model deriving the close-formed expressions of successful transmission, collided transmission, saturated throughput, and average packet delay together while also considering the capture effect under Nakagami-m fading channel in VANETs. Motivated by this, we propose a novel analytical model to evaluate the real performance of IEEE 802.11p DCF by different metrics in VANETs. The main contributions are twofold.
A 2-D Markov model is introduced and the close-formed expressions of successful transmission, collided transmission, saturated throughput and average packet delay while also considering the capture effect under Nakagami-m fading channel are carefully derived.
The simulation results are presented to verify the accuracy of the proposed analytical model in terms of saturated throughput and average packet delay, which has a more precise accuracy than existing models. In fact, the capture effect can increase the saturated throughput and lower the average packet delay.

3. Analytical Model

3.1. Description of DCF

In DCF-based networks, the nodes contend for the channel by using a carrier sense multiple access with collision avoidance (CSMA/CA) with a slotted binary exponential backoff (BEB) scheme. According to the DCF, each node with a packet to transmit senses the channel first. If the channel is idle for a period of time that exceeds the distributed inter frame space (DIFS), the node transmits the packet. Otherwise, it defers the transmission to avoid collision by starting a random backoff process, where the transmission is only permitted at the beginning of slots. When the backoff is initiated, the random backoff time is uniformly chosen in the range [ 0 ,   C W 1 ] , where C W is the contention window with the minimum W 0 at the first transmission attempt. The backoff counter is decremented by one at the end of each idle slot. When the backoff counter reaches zero, the node commences transmission irrespective of the channel status. However, the counter is frozen when the channel is busy and resumed when the channel is idle again for more than a DIFS. If a packet (DATA) is successfully received, the receiver sends back an acknowledgement (ACK) after a period of short inter-frame space (SIFS) to inform the transmitter for the correct reception. If no ACK is received within a specified ACK timeout interval, the transmitter will assume a failed transmission and schedule a retransmission by BEB algorithm. That is, C W is doubled and another backoff period is initiated. If the maximum of contention window ( W M = 2 M W 0 ) is reached and the transmission is still unsuccessful, C W is maintained at W M for at most f attempts. Otherwise, the packet will be discarded. The C W is reset to W 0 after a successful transmission or reaching the packet’s retry limits ( M + f ).
In fact, the DCF includes two access techniques: the basic access mode and the request-to-send/clear-to-send (RTS/CTS) mode. The former detailed above is a default two-way handshaking mechanism using DATA/ACK packets and the latter is a four-way handshaking mechanism using RTS/CTS packets to reserve the channel before packet transmission. The RTS/CTS mode follows the same backoff rules as the basic mode, which is to reduce the risk of large packet collision caused by the hidden node problem. As these two control packets include the duration of the ongoing transmission, the nodes update their network allocation vector (NAV) by the received RTS or CTS and defer the transmission for the specified duration to avoid collision. The major notions used in the analysis model are summarized in Table 1.
Table 1. Notions used in the model.

3.2. Probabilities of Transmission and Collision

According to [25], when the received signal power which comes from one node is greater than the sum of that of the others, the capture effect occurs at the targeted node. Since the Nakagami-m fading is more in line with the characteristics of the wireless channel in VANET scenario, it has been widely adopted in the performance analysis of VANETs [26]. Therefore, in this paper, the performance analysis of the DCF is under the Nakagami-m fading channel with considering the capture effect. For an inference-limited system, the condition for capture is γ t / k = 1 , k t n γ k > z , where γ t is concerned signal power from one node,   γ k is the interference signal power from other nodes, and z   is the capture threshold. Under the hypothesis of perfect power control, the capture probability conditioned on n 1 interferers for the concerned node can be calculated by:
p c a p ( n , z ) = 0 f γ t ( γ t ) Pr [ γ t / k = 1 , k t n γ k > z ] d γ t = 0 f γ t ( γ t ) [ 0 γ t / z f γ n 1 ( γ n 1 ) d γ n 1 ] d γ t ( a ) _ _ 1 Γ ( m ) Γ ( m n m ) k = 0 ( 1 ) k Γ ( m n + k ) k ! ( m n m + k ) z m n m + k
where f γ t ( γ t ) is the instantaneous received power in Nakagami-m fading channel and f γ n 1 ( γ n 1 ) is the n 1 fold convolution of f γ t ( γ t ) , which are respectively expressed as:
f γ t ( γ t ) = m m γ t m 1 γ ¯ m Γ ( m ) e m γ t γ ¯ , γ 0
f γ n 1 ( γ n 1 ) = m m ( n 1 ) γ ¯ m ( n 1 ) Γ ( m n m ) γ n 1 m ( n 1 ) 1 e m γ n 1 γ ¯
where m is the shape parameter ranging from 1/2 to . γ ¯ is the average received power determined by γ ¯ = P t x · C · r i α , where P t x is the transmission power, α is the path-loss exponent, and C is a constant related to the antenna gains, the carrier frequency, and the speed of light, which are the same for all nodes. For simplicity, the average received power from different nodes is the same for the receiver [21,29,30]. In fact, if the uplink is considered in VANETs, the RSU only cares about the number of vehicles in its coverage. However, the distance between the vehicle and the RSU has an effect on the communication quality, which can lead to unfairness for different vehicles communicating with the RSU from different distances. Therefore, for fairness, the assumption of power control is made, which means that the average values of received power from different vehicles at the RSU are the same. This assumption is reasonable and can also be found in the references [21,23,24,29,31]. The derivation of step (a) in (1) is detailed in our previous work in [31].
As shown in Figure 1, a 2-D Markov chain model is introduced for modeling the behavior of the DCF protocol while considering finite retry limits and backoff counter freezing. In this model, the saturation condition is considered, i.e., each node always has at least one packet to transmit. Here, the states of a node at time t can be represented as { s ( t ) ,   b ( t ) } , where s ( t ) with values from {0, 1,…, M + f } and b ( t ) with values from {0, 1,…, W i 1 }) are defined as the random backoff stage and the value of backoff counter at time t , respectively. These random variables are dependent because the maximum value of the backoff counter depends on the backoff stage:
W i = { 2 i W 0 ,             0 i M W M , M < i M + f
Figure 1. 2-D Markov chain model.
Let b ( i , k ) be the stationary distribution of the proposed 2-D Markov chains. Then, the one-step state transition probabilities can be given by:
P { ( i , k ) | ( i , k + 1 ) } = 1 p b , k [ 0 , W i 1 ) , i [ 0 , M + f ]
P { ( i , k ) | ( i , k ) } = p b , k ( 0 , W i 1 ] , i [ 0 , M + f ]
P { ( i , k ) | ( i 1 , 0 ) } = p c W i , k [ 0 , W i 1 ] , i ( 0 , M + f ]
P { ( 0 , k ) | ( i , 0 ) } = 1 p c W 0 , k [ 0 , W i 1 ] , i [ 0 , M + f )
P { ( 0 , k ) | ( M + f , 0 ) } = 1 W 0 , k [ 0 , W 0 1 ]
Therefore, we calculate the following steady state probabilities:
b ( i , 0 ) = ( p c ) i b ( 0 , 0 ) , i ( 0 , M + f ]
b ( i , k ) = 1 1 p b W i k W i b ( i , 0 ) = W i k W i ( p c ) i 1 p b b ( 0 , 0 ) , k ( 0 , W 0 1 ] , i ( 0 , M + f ]
Then, according to the normalization condition for stationary distribution, we have:
1 = i = 0 M + f k = 0 W i 1 b ( i , k )
Therefore, based on (6)–(8), we can obtain:
b ( 0 , 0 ) = 2 ( 1 p b ) ( 1 p c ) ( 1 2 p c ) ψ + 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 )
where ψ is represented as:
ψ = W 0 ( 1 p c ) ( 1 ( 2 p c ) M + 1 ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 ) + W 0 p c ( 2 p c ) M ( 1 2 p c ) ( 1 ( p c ) f )
Therefore, the probability that a node transmits in a randomly chosen slot can be expressed as:
τ t r a = i = 0 M + f b ( i , 0 ) = 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 ) ψ + 2 ( 1 p b ) ( 1 2 p c ) ( 1 ( p c ) M + f + 1 )
where p b , the probability that the channel is busy for a concerned node, can be calculated as:
p b = 1 ( 1 τ t r a ) n 1
Since the capture effect is considered, the probabilities of collided transmission in a given slot for a concerned node can be calculated by:
p c = j = 1 n 1 [ 1 p c a p ( j + 1 , z ) ] C n 1 j ( τ t r a ) j ( 1 τ t r a ) n j 1
where C n 1 i = ( n 1 ) ! / [ j ! ( n j 1 ) ! ] , and   p c a p   ( · , · ) is the capture probability calculated by (1). As seen, the nonlinear system composed of Equations (11) and (13) contains only two unknown parameters, i.e., τ t r a and p c . Therefore, their values can be obtained by numerical calculation, and the system has a unique solution.

3.3. Normalized Throughput

According to [6], the average length of a virtual slot can be calculated as:
E [ S l o t ] = ( 1 p t r a ) σ + p s p t r a T s + p t r a ( 1 p s ) T c
Let η denote the normalized throughput, i.e., the ratio of the duration of successful transmission of the payload to the average length of a virtual slot, then we have:
η = T s E [ P L ] E [ S l o t ] = p s p t r a E [ P L ] / R t ( 1 p t r a ) σ + p s p t r a T s + p t r a ( 1 p s ) T c
where E [ P L ] is the average payload of packet and R t is the channel rate. For simplicity, suppose all nodes send packets with the same length. p t r a denotes the probability that at least one node transmits in a concerned slot, and p s denotes the probability that there is a node successfully transmits in a certain slot conditioned on that at least one node transmits. σ , T s , T c denote the average durations of empty slot, successful transmission, and channel collision, respectively. Assume there are n nodes competing for the transmission chance in the network, then p t r a can be computed by:
p t r a = 1 ( 1 τ t r a ) n
Therefore p s can be calculated by:
p s = p s u c p t r a = i = 1 n C n i ( τ t r a ) i ( 1 τ t r a ) n i p c a p ( i , z ) 1 ( 1 τ t r a ) n
where p s u c is the probability of successful transmission in a randomly chosen slot and C n i = n ! / [ i ! ( n i ) ! ] .
For the basic mode, the average durations of successful transmission and failed transmission are computed as follows:
{ T s b a s = T H + T E [ P L ] + T S I F S + T P D + T A C K + T D I F S + T P D T c b a s = T H + T E [ P L ] + T D I F S + T P D
where the packet header is H = P H Y h d r + M A C h d r and T H = H R t is the duration of transmitting it.   T E [ P L ] = E [ P L ] R t ,   T S I F S ,   T D I F S , and T A C K = A C K R t are the durations of transmitting the packet payload, SIFS, DIFS, and transmitting ACK, respectively. T P D is the propagation delay. For the RTS/CTS mode, we have:
{ T s r t s = T R T S + T S I F S + T P D + T C T S + T S I F S + T P D + T H + T E [ P L ] + T S I F S + T P D + T A C K + T D I F S + T P D T c r t s = T R T S + T D I F S + T P D
where T R T S = R T S R t and T C T S = C T S R t is the time duration required to transmit RTS and CTS frames, respectively.

3.4. Average Packet Delay

The average delay for a successfully transmitted packet is defined as the time interval from the beginning that the packet is at the head of MAC queue for transmission to the end that an ACK for this packet is successfully received. It should be pointed out that the delay time for a packet dropped due to reaching the retry limit is not included. Therefore, the average delay for a successful transmission can be calculated as:
E [ D ] = E [ S l o t ] E [ S l o t N u m ]
where E [ S l o t ] is the average length of a virtual slot represented as (14) and E [ S l o t N u m ] is the average number of virtual slots required for a successful transmission calculated by:
E [ S l o t N u m ] = 1 j = 0 n 1 C n 1 j ( τ t r a ) j + 1 ( 1 τ t r a ) n j 1 p c a p ( j + 1 , z ) p d r o p 1 p d r o p E [ X d r o p ]
where the first term is the expected number of virtual slots for the successfully transmitted packet (including the average duration of the dropped packet due to reaching the retry limit) and the second term is the average number of virtual slots of dropped packet due to reaching the retry limit conditioned on the existing successful transmission. The probability of a dropped packet being caused by reaching the retry limit ( p d r o p ) and the average number of virtual slots required for a dropped packet ( E [ X d r o p ] ) can be severally calculated by:
p d r o p = ( p c ) M + f + 1
E [ X d r o p ] = i = 0 M + f W i 1 2 = W 0 ( 2 M + 1 1 ) + f W 0 2 M M f 1 2
Then, substitute (14), (21)–(23) and (18) (or (19)) into (20) with the values of τ t r a and p c , the average packet delay of a successful transmission for the basic mode (or RTS/CTS mode) can easily be obtained.

4. Model Validation

In this section, the simulation results are provided to validate the effectiveness of the proposed analytical model for both basic and RTS/CTS modes. All the results are calculated using MATLAB (as in references [3,21,26,27,31]) and the Monte Carlo method is used. The analytical results are calculated by the derived expressions, while the simulation results are found using an event-driven custom simulation program, written in MATLAB, that closely follows all the 802.11p DCF protocol details for each independently transmitting vehicle. For the sake of simplicity, the considered simulation scenario is that all vehicles communicate with a RSU as shown in Figure 2 (e.g., the drive-thru network scenario in [32]). In fact, the vehicle velocity, the traffic density, and the coverage of the RSU eventually lead to different numbers of vehicles in the coverage of the RSU. Therefore, we take the number of vehicles (which is equivalent to the vehicle density when the coverage of the RSU is given) into account for simplicity in the simulation, as in references [11,12,14,17,18,19,23,26,27,28,31].
Figure 2. V2I scenario.
To verify the improvement of the proposed model, it was compared with Cao’s model [14] with a single saturated AC queue (an extreme case) that uses the same simulation parameters for fairness. The main parameters used are listed in Table 2.
Table 2. Simulation parameters.
The transmission probability of a vehicle in a concerned slot depends on the values of W 0 , M , f , and the number of contending vehicles n . It is also influenced by the collision probability from Equations (11) and (14). As seen in Figure 3, when the number of vehicles increases, the collision probability increases because more vehicles contend for the channel, which leads to more vehicles performing the backoff procedure and deferring from accessing the channel. This causes the transmission probability to decrease, as shown in Figure 4. In addition, the values of both collision probability and transmission probability of the proposed analytical model with no freezing mechanism are presented, which are all higher than that of considering it. Without the freezing mechanism, regardless of the channel’s condition, the backoff counter of the vehicle will always decrease by 1, as in [24] (inconsistent with the DCF protocol). That is to say, the vehicle can acquire the transmission opportunity with less waiting time, which enlarges the transmission probability of the vehicle. Accordingly, the collision probability will increase because more vehicles may transmit at the same time. Obviously, the values of both the collision probability and the transmission probability for the proposed analytical model are very close to the simulation results, meaning that they are more accurate than the values in Cao’s model. In other word, it is obvious that the capture effect can effectively decrease the collision probability and gently increase the transmission probability. Therefore, the capture effect must be considered when analyzing the IEEE 802.11p DCF protocol in VANETs.
Figure 3. Collision probability.
Figure 4. Transmission probability.
In Figure 5, the normalized saturated throughput is given for both basic mode and RTS/CTS mode. Obviously, the saturated throughput decreases as the number of contending vehicles increases in the basic mode because more vehicles contend for the channel, leading to wasted channel resources. In the RTS/CTS mode, even though more vehicles want to access the channel, the usage of RTS/CTS can decrease the packet collision, which eventually stabilizes the normalized throughput. Since ignoring the freezing mechanism in the proposed model enlarges the collision probability (shown in Figure 3), the normalized throughput is lower than that of considering it, especially in the basic mode. This occurs because more collisions result in more waste of channel resources, which will lower the normalized throughput. At the same time, the analytical results of the proposed model are very consistent with the simulation results, which are all higher than the results of Cao’s model, which does not consider the capture effect. In fact, the normalized saturated throughput can be improved distinctly by the capture effect, especially in the basic mode. That is to say, the basic mode is more sensitive to the capture effect than the RTS/CTS mode. This occurs because the capture effect can make transmission more successful. In addition, when the number of vehicles is increasing, the saturated throughput of the RTS/CTS mode can be higher than that of the basic mode for the situation when the packet collision is replaced by a smaller length of colliding packets (i.e., RTS/CTS).
Figure 5. Normalized throughput.
In Figure 6, the average packet delay in both modes is presented. As seen in the figure, when the number of vehicles increases, more vehicles contend for the channel, which enlarges the average packet delay. Since ignoring the freezing mechanism in the proposed model results in higher transmission probability (shown in Figure 4) can allow more chances for the vehicle to transmit in a period of time, and more collision will happen. Though more collisions lead to a higher probability of dropping packets (due to reaching the retry limit), the average packet delay is close to that which occurs when considering the freezing mechanism in the basic mode as its calculation excludes the time occupied by a packet that is dropped because it has reached the retry limit (as described in the first paragraph of Section 3.4). However, in RTS/CTS mode, the average packet delay of ignoring the freezing mechanism decreases as the number of vehicles increases, and more so than it does when considering the freezing mechanism. In fact, the vehicle can receive more transmission opportunities by using short control packets (i.e., RTS/CTS) when ignoring the freezing mechanism, which results in more successful transmission of data frames in a certain period of time, and accordingly, a decrease in the average packet delay. Nevertheless, the freezing mechanism is one of the key characteristics of the DCF that must be considered when analyzing the DCF’s performance. Moreover, the average packet delay of the proposed model is less than it is in Cao’s model in both two modes that consider the capture effect, but are consistent with the simulation result. Since the capture effect can increase the probability of successful transmission, the number of retransmissions decreases, as does the average packet delay. Moreover, the proposed model makes it is easy to find that the basic mode is more sensitive to the capture effect than it is to the RTS/CTS mode.
Figure 6. Average packet delay.

5. Conclusions

In this study, we propose a novel analytical model for analyzing the IEEE 802.11p DCF protocol that considers the capture effect under the Nakagami-m fading channel, which is different from the existing models and more suitable to the real VANET scenario. The comparisons between the simulations and the analytical results verify the accuracy of the proposed analytical model. The results show that the normalized saturated throughput that considers the capture effect is higher than it is without the capture effect. Moreover, the capture effect causes the average packet delay to decrease. Therefore, when analyzing IEEE 802.11p DCF (or EDCA) or designing the improved MAC protocols in VANETs, the capture effect under Nakagami-m fading channel is a noticeably valuable element that is worthy of consideration.

Author Contributions

Conceptualization, Y.W. and L.C.; methodology, Y.W. and L.C.; software, Y.W.; validation, J.S. and L.C.; formal analysis, Y.W.; investigation, L.C.; writing—original draft preparation, Y.W.; writing—review and editing, Y.W. and L.C.; supervision, J.S. and L.C.; project administration, L.C.; funding acquisition, L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Science and Technology Key Project of Fujian Province (Grant No. 2021HZ021004).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.A.F.; Loureiro, A.A.F. Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw. 2016, 44, 90–103. [Google Scholar] [CrossRef]
  2. Wu, Q.; Liu, H.; Wang, R.; Fan, P.; Fan, Q.; Li, Z. Delay-sensitive task offloading in the 802.11 p-based vehicular fog computing systems. IEEE Internet Things J. 2019, 7, 773–785. [Google Scholar] [CrossRef]
  3. Wu, Q.; Xia, S.; Fan, P.; Fan, Q.; Li, Z. Velocity-adaptive V2I fair-access scheme based on IEEE 802.11 DCF for platooning vehicles. Sensors 2018, 18, 4198. [Google Scholar] [CrossRef] [PubMed]
  4. IEEE Standard 802.11p: 2010. IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Wireless Access in Vehicular Environments. Available online: https://ieeexplore.ieee.org/document/5514475/ (accessed on 1 November 2022).
  5. Torgunakov, V.; Loginov, V.; Khorov, E. A Study of Channel Bonding in IEEE 802.11 bd Networks. IEEE Access 2022, 10, 25514–25533. [Google Scholar] [CrossRef]
  6. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  7. Duffy, K.; Malone, D.; Leith, D.J. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett. 2005, 9, 715–717. [Google Scholar] [CrossRef]
  8. Weng, C.E.; Chen, H.C. The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. Comput. Stand. Inter. 2016, 44, 144–149. [Google Scholar] [CrossRef]
  9. Madhavi, T.; Rao, G.S.B. Modelling collision alleviating DCF protocol with finite retry limits. Electron. Lett. 2015, 51, 185–187. [Google Scholar] [CrossRef]
  10. Felemban, E.; Ekici, E. Single hop IEEE 802.11 DCF analysis revisited: Accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases. IEEE Trans. Wirel. Commun. 2011, 10, 3256–3266. [Google Scholar] [CrossRef]
  11. Xie, Y.; Ho, I.W.H.; Magsino, E.R. The modeling and cross-layer optimization of 802.11 p VANET unicast. IEEE Access 2017, 6, 171–186. [Google Scholar] [CrossRef]
  12. Yang, Q.; Zheng, J.; Shen, L. Modeling and performance analysis of periodic broadcast in vehicular ad hoc networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  13. Zhao, Q.; Feng, L.; Zhao, L.; Li, Z.; Liang, Y. SatOpt partition: Dividing throughput-stability region for IEEE 802.11 DCF networks. IEEE Trans. Veh. Technol. 2020, 69, 10278–10290. [Google Scholar] [CrossRef]
  14. Cao, S.; Lee, V.C.S. An accurate and complete performance modeling of the IEEE 802.11p MAC sublayer for VANET. Comput. Commun. 2020, 149, 107–120. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Li, S.; Shang, Z.; Zhang, Q. Performance Analysis of IEEE 802.11 DCF under Different Channel Conditions. In Proceedings of the IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 24–26 May 2019; pp. 1–4. [Google Scholar]
  16. Peng, H.; Li, D.; Abboud, K.; Zhou, H.; Zhao, H.; Zhuang, W.; Shen, X. Performance analysis of IEEE 802.11p DCF for multiplatooning communications with autonomous vehicles. IEEE Trans. Veh. Technol. 2017, 66, 2485–2498. [Google Scholar] [CrossRef]
  17. Almohammedi, A.A.; Shepelev, V. Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel. IEEE Access 2021, 9, 14459–14469. [Google Scholar] [CrossRef]
  18. Harkat, Y.; Amrouche, A.; Lamini, E.S.; Kechadi, M.T. Modeling and performance analysis of the IEEE 802.11p EDCA mechanism for VANET under saturation traffic conditions and error-prone channel. AEU-Int. J. Electron. Commun. 2019, 101, 33–43. [Google Scholar] [CrossRef]
  19. Zhang, M.; Chong, P.H.J.; Seet, B.C. Performance analysis and boost for a MAC protocol in vehicular networks. IEEE Trans. on Veh. Technol. 2019, 68, 8721–8728. [Google Scholar] [CrossRef]
  20. Nyandoro, A.; Libman, L.; Hassan, M. Service differentiation using the capture effect in 802.11 wireless LANs. IEEE Trans. Wirel. Commun. 2007, 6, 2961–2971. [Google Scholar] [CrossRef]
  21. Sun, X. Maximum throughput of CSMA networks with capture. IEEE Wirel. Commun. Lett. 2016, 6, 86–89. [Google Scholar] [CrossRef]
  22. Lei, L.; Zhang, T.; Zhou, L.; Song, X.; Cai, S. Saturation throughput analysis of IEEE 802.11 DCF with heterogeneous node transmit powers and capture effect. Int. J. Ad Hoc Ubiquitous Comput. 2017, 26, 1–11. [Google Scholar] [CrossRef]
  23. Shah, A.F.M.S.; Ilhan, H.; Tureli, U. Modeling and performance analysis of the IEEE 802.11 MAC for VANETs under capture effect. In Proceedings of the IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Sofia, Bulgaria, 8–9 April 2019; pp. 1–5. [Google Scholar]
  24. Han, H.; Pei, Z.; Zhu, W.; Li, N. Saturation throughput analysis of IEEE 802.11b DCF considering capture effects. In Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  25. Leonardo, E.J.; Yacoub, M.D. Exact formulations for the throughput of IEEE 802.11 DCF in Hoyt, Rice, and Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2013, 12, 2261–2271. [Google Scholar] [CrossRef]
  26. Bharati, S.; Zhuang, W.; Thanayankizil, L.V.; Bai, F. Link-layer cooperation based on distributed TDMA MAC for vehicular networks. IEEE Trans. Veh. Technol. 2016, 66, 6415–6427. [Google Scholar] [CrossRef]
  27. Bazzi, A.; Masini, B.M.; Zanella, A.; Thibault, I. On the performance of IEEE 802.11 p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Trans. Veh. Technol. 2017, 66, 10419–10432. [Google Scholar] [CrossRef]
  28. Shagdar, O.; Nashashibi, F.; Tohme, S. Performance study of CAM over IEEE 802.11p for cooperative adaptive cruise control. In Proceedings of the Wireless Days, Porto, Portugal, 29–31 March 2017; pp. 70–76. [Google Scholar]
  29. Sanchez-Garcia, J.; Smith, D.R. Capture probability in Rician fading channels with power control in the transmitters. IEEE Trans. Commun. 2002, 50, 1889–1891. [Google Scholar] [CrossRef]
  30. Zanella, A.; Zorzi, M. Theoretical analysis of the capture probability in wireless systems with multiple packet reception capabilities. IEEE Trans. Commun. 2012, 60, 1058–1071. [Google Scholar] [CrossRef]
  31. Wang, Y.; Chen, L.; Shi, J. A novel capture-aware TDMA-based MAC protocol for safety messages broadcast in vehicular ad hoc networks. IEEE Access 2019, 7, 116542–116554. [Google Scholar] [CrossRef]
  32. Wang, M.; Shen, Q.; Zhang, R.; Liang, H.; Shen, X. Vehicle-density-based adaptive MAC for high throughput in drive-thru networks. IEEE Internet Things J. 2014, 1, 533–543. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.