Next Article in Journal
Wireless Biological Electronic Sensors
Next Article in Special Issue
Multi-Sensor Information Fusion for Optimizing Electric Bicycle Routes Using a Swarm Intelligence Algorithm
Previous Article in Journal
Adaptive Integration of the Compressed Algorithm of CS and NPC for the ECG Signal Compressed Algorithm in VLSI Implementation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

1
College of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
2
College of Science and Information, Qingdao Agricultural University, Qingdao 266109, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(10), 2293; https://doi.org/10.3390/s17102293
Submission received: 27 August 2017 / Revised: 22 September 2017 / Accepted: 1 October 2017 / Published: 9 October 2017
(This article belongs to the Special Issue Smart Vehicular Mobile Sensing)

Abstract

:
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

1. Introduction

Vehicular Ad Hoc Networks (VANETs) are part of the Intelligent Transportation System (ITS), which aim to provide safety-critical and commercial services on the road. VENETs can perform Vehicle To Vehicle (V2V) and Vehicle To Infrastructure (V2I) communications by On Board Units (OBUs) and Road Side Units (RSUs). Through V2V and V2I communications, vehicles can exchange information to support safety-related applications (e.g., emergency brake, collision avoidance, and automatic notification of crash on roads), transport efficiency applications (e.g., intersection management, navigation and lane merging assistance, etc.) and infotainment applications (e.g., voice over IP, video, web browsing and mobile multiplayer gaming, etc.) [1,2,3]. The transport efficiency applications and infotainment applications are regarded as non-safety applications.
Different applications have different Quality-of-Service (QoS) requirements. The traffic of safety applications has stringent requirements on highly reliable and real-time transmissions, while the non-safety applications require efficient and high throughput. Recent works [4,5,6,7] manifest that non-safety applications can have different communication requirements. On one hand, in terms of throughput, video and mobile multiplayer gaming need higher throughput than that of lane merging assistance [4,5]. On the other hand, non-safety applications also have different delay requirements, from no special real-time requirements of traveller information support applications (e.g., points of interest advertisements, map download) to guaranteed near-real time needs of some interactive entertainment applications (e.g., mobile multiplayer gaming and voice over IP) [6,7,8]. Providing QoS support for non-safety applications has the great potential to increase the chance of success for VANETs and to accelerate their market penetration [4]. Due to the wide variety of ITS applications, Medium Access Control (MAC) protocols need to be able to support a wide range of QoS requirements.
Wireless Access in Vehicular Environments (WAVE) is a protocol for the VANETs. WAVE includes IEEE 802.11p [9] and IEEE 1609.4 [10] protocols. In IEEE 802.11p protocol, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) MAC mechanism is employed which is based on the prioritized Enhanced Distributed Channel Access (EDCA)—IEEE 802.11e protocol [11], to provide QoS for different ITS applications. WAVE defines seven channels: one Control Channel (CCH) and six Service Channels (SCHs). The multichannel MAC architecture and operation are specified in the IEEE 1609.4 protocol. In IEEE 1609.4 protocol, the channel time is divided into multiple Synchronization Intervals (SIs) with a fixed length of 100 ms for each SI. An SI consists of a 50 ms CCH Interval (CCHI) and a 50 ms SCH Interval (SCHI). During the CCHI, all vehicles need tune to CCH for the transmissions of safety-related messages or control messages such as WAVE Service Advertisement (WSA) messages, any other kind of communications which is running on the SCHs must be frozen, and vice versa.
However, the 802.11p contention-based access and the fixed channel switching defined in the IEEE 1609.4 make high throughput and time-bounded data delivery very difficult to be ensured in such a system [12,13]. On one hand, EDCA mechanism originally provided by IEEE 802.11e [11] that differentiates traffic types is based on different static MAC parameter values which can not adapt to the characteristics of ever-changing vehicle density. On the other hand, for example, in a high density VANETs environment, the nodes may not have enough time to perform effective negotiations and make SCH reservations on a highly congested CCH, and thus the utilization of SCHs is affected. On the contrary, under a VANETs environment with light vehicle density but requiring heavy network service (e.g., near points of interests), CCHI may be idle for a long time, while the 50 ms SCHI is not enough to transmit bulk and near-real time flows, like QoS-sensitive video/audio traffic, typical of many infotainment applications [4], which could be strongly penalized nonetheless their high channel access priority. Therefore, the all traffic experience the low throughput and additional unavoidable delay due to the WAVE channel switching procedure. The SCH resource is also wasted. In addition, when the number of nodes is sufficiently large, the maximum achievable aggregate throughput of the network depends on the number of channels, but not the number of nodes [14]. So, the number of SCHs and the duration on the SCHs are critical factors affecting the system throughput.
In [15], the length of the CCH interval is dynamically adjusted according to the number of vehicles, and the interval and channel are thus used efficiently. However, the packet collisions of the safety messages may not be mitigated in dense traffic. In [16], Time Division Multiple Access (TDMA)-based safety message transmission was proposed. With the help of RSU, nodes can use less time to transmit safety messages without contention and perform SCH reservation on CCH during CCHI, and thus leave more time for non-safety message transmission. In fact, during the CCHI, all SCHs are idle, therefore, the SCH resources are underutilized. By assigning disjoint time slots to the vehicles with different positions and directions, the collision problem of safety message transmission is mitigated in a moving-vehicle environment [17]. The nodes transmit non-safety messages on SCHs while the nodes transmitting safety messages based on TDMA mechanism on CCH. Therefore, the protocol in [17] can ensure the reliable transmissions for safety messages and high throughput for non-safety messages. Since additional information for slot occupancy is required, more time for broadcasting safety messages is needed, and consequently, the time left for SCH reservation is less. Therefore, the improvement of throughput of non-safety messages may be still limited. By dynamically adjusting the Contention Window (CW) size, the work in [5] can provide different QoS levels for kinds of non-safety applications with different priorities on the SCHs. However, the SCHs are idle when the nodes transmit messages on the CCH, the SCHs are still underutilized.
In this paper, we propose an Efficient and QoS supported Multichannel MAC (EQM-MAC) protocol, which is specifically targeted to provide high throughput, low delay and differentiated treatment to non-safety applications. In the EQM-MAC protocol, the non-safety messages can be transmitted over the whole SI. Therefore, the system saturation throughput and the utilization of SCHs can be greatly enhanced. The EQM-MAC protocol dynamically adjusts the CWs of WSA packets to achieve the predefined throughput ratio between non-safety packets with different priorities according to the traffic density. Therefore, the QoS delivery of non-safety packets is ensured.
The main feature of the EQM-MAC protocol and thus the contributions of this paper can be summarized as follows:
(1)
The EQM-MAC protocol uses less time to deliver safety messages and allocates more time to make time slot reservations and channel coordination for SCHs. Therefore, nodes have more opportunities to perform SCH reservation to deliver different service classes packets, and the number of successful reservations can be greatly increased.
(2)
The non-safety messages can be simultaneously transmitted on SCHs during the whole SI. Therefore, the saturation throughput and the utilization of SCHs can be further increased.
(3)
EQM-MAC protocol can offer sufficient QoS in terms of throughput and delay for non-safety messages through adjusting the minimum CW according to the vehicle density.
The rest of this paper is organized as follows: Section 2 reviews related work. Section 3 describes the proposed EQM-MAC protocol in detail. Section 4 first presents a Markov chain model to analyze the transmission probabilities for WSA messages with different priorities, so as to drive the mean reservation time for SCHs, and then conducts performance analysis of throughput and delay. Simulation evaluation is given in Section 5. Finally, Section 6 concludes this paper.

2. Related Works

There are many works aim to provide reliable and real-time delivery of safety messages and efficient throughput of non-safety messages under multichannel vehicular environments. Some alternating (also called split-phase) channel access schemes have been proposed [15,16,18,19]. The authors in [15] proposed a Variable CCH Interval (VCI) multichannel MAC protocol to dynamically adjust the length of CCHI according to the number of vehicles on the road. The VCI protocol can maintain the prioritized transmission of critical safety messages and help enhancing saturated throughput of SCHs compared to IEEE 1609.4 protocol. An Adaptive multi-Priority Distributed Multichannel (APDM) MAC protocol is presented in [18]. The APDM protocol uses two Markov chain analytical models to achieve the optimal transmission probabilities for safety message with high priority and WSA with low priority. An Application Oriented Cross-layer Multi-channel (AOCM) MAC protocol was proposed for VANETs in [19]. Based on real-time statistics and prediction for different types of messages coming from upper application layer, the AOCM MAC protocol, with low computational complexity, can derive the optimal CCHI to ensure timely and reliable transmission of safety-related messages and enhance the throughput of SCHs. The work [16] proposed a Coordinated multichannel MAC (C-MAC) protocol. With the help of RSU, C-MAC can decrease the overhead of the reservation slots for safety messages, lower the collision probability of safety messages and improve the throughput of service channels. All the above protocols employ alternating channel access schemes, however, the SCHs are idle during the transmission of safety and control messages, resulting in an inefficient utilization of bandwidth of SCHs.
In fact, most multichannel schemes suffer from underutilization of SCHs [20,21]. This condition is often associated with the fact that nodes have very little time to make SCH reservations or when transmitting the safety-related messages, all the nodes switch to the CCH and the SCH is idle or both of the above cases. The authors in [20] proposed Asynchronous Multi-Channel Medium Access Control with a Distributed time-division multiple-access mechanism (AMCMAC-D). The AMCMAC-D scheme supports simultaneous disseminations on different SCHs while allowing rendezvous and broadcasting of safety messages on the CCH. The proposed scheme allows messages with different priorities having different numbers of time slots. Thus the utilization of the CCH and SCHs can be improved. However, in the AMCMAC-D scheme, the safety messages employ CSMA/CA mechanism to disseminate which is still a contention-based mechanism, and more time is required to transmit the safety messages especially under heavy vehicle density. Therefore, the nodes have less opportunities to make SCH reservations, and AMCMAC-D scheme cannot take full advantage of channel resources. A Coordinated Reliable and Efficient multichannel MAC (CRE-MAC) protocol for VANETs is proposed in [22], to meet requirements of delay-sensitive safety applications and throughput-sensitive non-safety applications. The CRE-MAC protocol employs contention-free transmission for safety messages and allows transmission of non-safety messages during a whole SI. Therefore, the reliable and timely transmission of safety messages, and the network throughput of non-safety messages are greatly improved.
All above the protocols (schemes) take the non-safety messages transmitted over the SCHs with the same priority and thus these protocols (schemes) cannot provide QoS supported for the non-safety applications with different priorities.
There are works focusing on studying the QoS mechanisms to provide guaranteed non-safety services to on-board passengers from the RSU [23,24]. The work [23] proposed a comprehensive analysis model taking into account both the QoS features and the vehicle mobility to seek solutions to optimally adjust the parameters towards the controllable QoS provision to vehicle. The work [24] provided a scheduling algorithm incorporating with EDCA to provision controlled QoS to vehicles. The scheduling algorithm controls TXOP of vehicles iteratively to maximize the integrated throughput according to the current queue length and packet error rate. In contrast to [23,24], our proposed EQM-MAC protocol works on the multichannel environments and focus on providing different proportions throughput for non-safety packets with different priorities. There are studies [5,25], which work under multichannel environments to provide different QoS levels for non-safety applications with different priorities on the SCHs. Ref. [5] adaptively tunes the CW for different services at each nodes and dynamically adjusts the CCHI to obtain the CW and optimal CCHI based on the traffic conditions. [25] presents a dedicated multichannel MAC scheme with QoS-provision channel allocation mechanism which is based on the EDCA channel throughput analysis to enhance the QoS performance of non-safety services. However, in above both schemes, the SCHs are idle when the safety packets are delivering on the CCH, and thus, the throughput of SCHs is reduced and the SCHs are still under utilization.

3. Efficient and QoS Supported Multichannel MAC Protocol

In this paper, we propose an Efficient and QoS supported Multichannel MAC (EQM-MAC) protocol, which is specifically targeted to provide high throughput, low delay and QoS differentiation for non-safety applications. A summary of the important notations used in this paper is given in Table 1.
In our proposed EQM-MAC protocol, each vehicle is equipped with two transceivers (Note that the cost of two transceivers is practically trivial, as compared to the cost of the vehicle itself), which are denoted by Transceiver I and Transceiver II, respectively, which can operate simultaneously on different channels. Transceiver I is always tuned on the CCH while Transceiver II can be tuned to any SCH. The Coordinated Universal Time (UTC) [10] mechanism is used for time synchronization among all vehicles by Global Position System (GPS). Time is divided into multiple synchronization intervals with 100 ms for each SI, as shown in Figure 1.
On CCH, an synchronization interval includes two intervals: Safety interval and WSA interval. The Safety interval is used to service the safety-related messages, while in WSA interval, nodes conduct statistics and measurement for channel coordination and channel assignment. The Safety interval is further divided into two intervals [22]: Contention-Free Interval (CFI) and Vehicle Identification Interval (VII). A new synchronization interval begins from the CFI, during which RSU broadcasts a Coordination and Length Information (CLI) packet, and the vehicle nodes subsequently transmit the safety (e.g., beacon/emergency ) messages. The CLI packet contains the scheduling information for safety slots during the CFI, the minimum CW size for four Access Categories (ACs) (also called service classes in this paper), T C F I , T V I I and T W I , where T C F I , T V I I and T W I denote the length of CFI, VII and WSA interval, respectively. For the sake of reliable delivery, each CLI packet will be broadcast twice. Each node knows its transmission order during CFI by receiving the CLI packet. During the VII, each new arriving vehicle derives a safety slot using DFSA [16,22,26]. The identity of each node is distinguished by a MAC address as well as a short IDentifier (ID), which serves to reduce the overhead for transmitting a CLI packet. The ID is chosen by each node at random, included in the header of each packet transmitted on CCH, and changed if the node detects that its ID is already in use by another node [17,27]. During the WSA interval, nodes make negotiations and reserve the SCHs for non-safety message transmissions for the next synchronization interval. After the negotiation is successful, in the next synchronization interval, the service provider and the service user switch to the SCHs that they have agreed over to complete the non-safety message transmission.

3.1. SCH Selection and Access Reservation Scheme

As shown in Table 2, each vehicle maintains a SCH Usage List (SUL). The SUL stores the available slots on each SCH of the next synchronization interval. According to the SUL, nodes make negotiations and reserve the SCHs by two-way WSA/Request For Service (RFS) handshake for the next synchronization interval. Each service provider sends a WSA packet, containing the service information, the AC and the selected [SCH, slot] to be used, as well as other information [10]. When a node has non-safety messages to deliver, it will select a slot of the corresponding SCH according to its SUL, and then, during the WSA interval, it employs CSMA/CA mechanism to contend the CCH for delivering the WSA message including its selected [SCH, slot]. When the receiver receives the intended WSA message, the receiver sends an Acknowledgement (ACK) message to the sender, if the [SCH, slot] is available for the receiver, or with a Non-acknowledgement (NACK) packet otherwise. Each service user can also initiatively broadcast an RFS packet associated with the selected [SCH, slot] to make an agreement with a service provider. To ensure load balancing of SCHs, the node selects the SCH that accommodates the most available slots in its SUL. If more than one SCH is available, the sender preferentially selects the same SCH used in the previous non-safety message transmission. On the other hand, to enhance the utilization of SCHs, EQM-MAC protocol allows the nodes to reserve multiple times, which means that the non-safety packets can be transmitted multiple times on SCHs during an synchronization interval. Since the transceiver I always senses and monitors the CCH, the multichannel hidden terminal problem [22] and miss-receiver problem [28] can be avoid.

3.2. Analysis of Differentiated Minimum Contention Window

In our study, we give a tractable yet reasonable model to characterize the performance of the proposed EQM-MAC protocol. In our model, we give the assumptions as follows:
Assumption 1 (Poisson distribution of vehicles on load).
Statistic analysis of the empirical data in [29] proves that an exponential distribution is a good fit for highway vehicle traffic according to inter-vehicle distance. Assuming that the vehicle nodes are placed on the line according to a Poisson point process with network density β (in nodes per meter), the probability of j vehicles existing within length l, P ( j , l ) , can be given by
P ( j , l ) = ( β l ) j e β l j !
Then the average number of vehicles, N, within the RSU coverage R is β R .
Assumption 2 (Uniform distribution of vehicle speed).
In each lane of each direction, the speed of vehicles has uniform distribution between V m i n and V m a x with mean V a v g = V min + V max 2 and variance ϕ 2 = ( V max V min ) 2 12 , where V m i n and V m a x represent the minimum and maximum speed of vehicles, respectively.
Assumption 3 (Ideal channel conditions).
The vehicle nodes are under saturated conditions, which indicates that each node has WSA or RFS packets available to send after a successful reservation during the WSA interval.
Assumption 4 (Ideal channel conditions).
No bit errors due to channel fading, no hidden terminal problems and no capture effect, Thus, the packets transmission failure is only due to collisions.
Assumption 5 (Only one access category in one node).
Each node only transmits a single non-safety traffic flow belonging to one AC, and thus, it avoids the need to take into account the interval virtual collisions [30].
We also assume that transmission rate on the CCH and SCHs are constant and the same. The non-safety messages on the SCHs have the same size, which means that all the non-safety messages occupy the same size of slot on the SCHs.
Now we analyze the minimum CW size for different service classes. There are four classes of service classified by different bandwidth requirement over SCHs corresponding to four ACs of WSA packets on the CCH. Different ACs in the IEEE 802.11p EDCA are identified by channel access parameter including CW and Arbitration Inter-frame Space (AIFS). The AIFS Number (AIFSN) is used to determine the duration of AIFS according to
A I F S [ i ] = S I F S + A I F S N [ i ] × σ
where A I F S N [ i ] is an integer greater than or equal to 2, and S I F S and σ denote the duration of an Short Inter Frame Space (SIFS) and the duration of an idle time slot, respectively. Let m and m denote the maximum times the CW can be doubled and the maximum number of retransmissions, respectively. For simplicity, we assume that each A C i (i = 0, 1, 2, 3) has the same m and m , and A C 0 and A C 3 corresponds to the highest priority and the lowest priority, respectively.
In order to derive the proper minimum CW size for different service classes, we model a two-dimensional Markov chain evolved from [15,31,32] to obtain the stationary probability τ i that a node transmits a WSA or an RFS packet corresponding to A C i in an arbitrary time slot during WSA interval, as shown in Figure 2.
Let s ( i , t ) and b ( i , t ) be a stochastic process representing the backoff stage and backoff timer of WSA/RFS traffic belonging to A C i at time t, respectively. Let W i , j ( j [ 0 , m ] ) represent the CW in the jth backoff stage of A C i . For the first transmission attempt, CW of A C i is set to the minimum value W i , 0 . When the collision is detected, for the first m steps, the CW of A C i is doubled and then retransmission is started. The CW remains unchanged for ( m m ) steps. To sum up, the CW size of A C i in the jth stage, W i , j , can be give as:
W i , j = 2 j W i , 0 2 m W i , 0 j m m < j m
Let b i , j , k = lim t s ( i , t ) = j , b ( i , t ) = k , 0 j m , 0 k W i , j 1 denote the stationary distribution of the chain of WSA/RFS traffic in Figure 2. Let P i denote the collision probability that a node delivering a WSA/RFS packet with A C i collides with other nodes when access the channel.
Theorem 1.
The stationary probability τ i that a vehicle node sends a WSA or an RFS packet corresponding to A C i in a random time slot is τ i = ( 1 P i m + 1 ) · b i , 0 , 0 / ( 1 P i ) .
Proof. 
As shown in Figure 2, the one-step transition probabilities are:
P i , j , k | i , j , k = P i 0 k W i , j 1 , 0 j m P i , j , k 1 | i , j , k = 1 P i 1 k W i , j 1 , 0 j m P i , j , k | i , j 1 , 0 = P i W i , j 0 k W i , j 1 , 1 j m P i W i , m 0 k W i , m 1 , m < j m P i , 0 , k | i , j , 0 = ( 1 P i ) W i , 0 0 k W i , 0 1 , 0 j m 1 1 W i , 0 0 k W i , 0 1 , j = m
The meaning of each line in Equation (4) is as follows:
(1)
When the channel is busy, the backoff timer is frozen;
(2)
When the channel is free, the backoff timer will subtract one;
(3)
Within m backoff stage, collision makes backoff stage increase and CW double. Otherwise, collision makes CW remain 2 m , W i , 0 ;
(4)
When a WSA/RFS packet is successfully transmitted or reaches its maximum retransmission number m, the backoff timer is reset.
From the Markov chain in the Figure 2, we can obtain that
b i , j 1 , 0 · P i = b i , j , 0 b i , j , 0 = P i j · b i , 0 , 0 1 j m
As the Markov chain is regular, we have
b i , j , k = W i , j k W i , j ( 1 P i ) b i , j , 0 = 2 j W i , 0 k 2 j W i , 0 ( 1 P i ) b i , j , 0 , 0 j m , 1 < k W i , j 1 2 m W i , 0 k 2 m W i , 0 ( 1 P i ) b i , j , 0 , m < j m , 1 < k W i , j 1 .
Thus, applying the normalization condition for stationary distribution, we can have
1 = j = 0 m k = 0 W i , j 1 b i , j , k = j = 0 m b i , 0 , 0 P i j + j = 0 m k = 1 W i , j 1 W i , j k W i , j ( 1 P i ) b i , j , 0
Using Equations (5)–(7), we get
1 b i , 0 , 0 = 1 2 ( 1 P i ) 1 ( 2 P i ) m + 1 W i , 0 1 2 P i 1 P i m + 1 1 P i + 1 P i m + 1 1 P i , m m 1 2 ( 1 P i ) [ 2 m W i , 0 ( P i m + 1 P i m + 1 ) 1 + P i m + 1 1 P i + 1 ( 2 P i ) m + 1 W i , 0 1 2 P i ] + 1 P i m + 1 1 P i , m > m .
Then, the transmission probability τ i can be expressed as
τ i = j = 0 m b i , j , 0 = j = 0 m P i j · b i , 0 , 0 = 1 P i m + 1 1 P i b i , 0 , 0 .
where b i , 0 , 0 is shown in Equation (8).
Let N i denote the number of nodes delivering non-safety packets which belong to A C i . The total number of nodes, N, can be expressed as
N = i = 0 3 N i
Collision occurs when more than one node are transmitting at the same time slot, so the collision probability P i is
P i = 1 ( 1 τ i ) N i 1 h = 0 , h i 3 ( 1 τ h ) N h
According to Equations (9) and (11), variables τ i and P i can be solved by the numerical methods in [32]. Note that 0 < τ i < 1 and 0 < P i < 1 . ☐
Let P i , s u c denote the probability that a node transmits WSA/RFS packets belonging to A C i in a slot time to make a successful reservation during the WSA interval on the CCH, and thus, P i , s u c can be computed as follows:
P i , s u c = N i τ i ( 1 τ i ) N i 1 h = 0 , h i 3 ( 1 τ h ) N h
By following the procedure in [31], the saturation throughput S i , c c h for the traffic belonging to A C i ( i = 1 , 2 , 3 , 4 ) on CCH can be calculated by
S i , c c h = P i , s u c L w s a ( 1 P b ) σ + i = 0 3 P i , s u c ( T s + A I F S [ i ] ) + ( P b i = 0 3 P i , s u c ) T c o l
where P b , T s , T c o l and L w s a represent the probability that the channel is busy (i.e, at least one node transmits during a time slot), the average time used for successfully transmitting a WSA packet (It does not include A I F S [ i ] ), the average time wasted by a WSA packet collision and the average payload of a WSA packet, respectively. P b can be calculated by
P b = 1 h = 0 3 ( 1 τ h ) N h
We assume that the L w s a for different traffic belonging to A C i ( i = 1 , 2 , 3 , 4 ) is equal. T c o l can be calculated according to Equation (21). Now we analyze the throughput obtained according to Equation (13). It is clear that, for different traffic belonging to A C i ( i = 1 , 2 , 3 , 4 ) , the denominator of Equation (13) is the same, and the L w s a is also equal as assumed. Therefore, the throughput S i , c c h can be represented by P i , s u c . Let S i denote the throughput of nodes delivering non-safety packets belonging to A C i on SCHs. The throughput S i obtained on SCHs is determined by the number of successful SCH reservations of nodes with A C i on CCH, and is ultimately determined by the throughput, S i , c c h , on CCH. Therefore, the S i can be represented by P i , s u c .
In order to offer QoS supported delivery in SCHs, different A C s have different minimum CWs. Let S j and S g ( j , g = 0 , 1 , 2 , 3 ) be the saturation throughput obtained on SCHs due to delivering service data packets belonging to A C j and A C g , respectively. Thus, we have
R S j / S g = S j S g = P j , s u c P g , s u c = N j τ j ( 1 τ j ) N j 1 h = 0 , h j 3 ( 1 τ h ) N h N g τ g ( 1 τ g ) N g 1 h = 0 , h g 3 ( 1 τ h ) N h = N j τ j ( 1 τ g ) N g τ g ( 1 τ j )
where R S j / S g represents the ratio of S j to S g . If the predefined throughput ratio between different service classes and the minimum CW for any certain non-safety service class is given, we can obtain the minimum CWs for other service classes.

4. Performance Analysis

In this section, we analyze the throughput and delay of our proposed model in a highway environment.

4.1. Throughput Analysis

Note that, the throughput obtained according to Equation (13) is based on a single channel environment, and it does not consider the features of channel switching defined in IEEE 1609.4 protocol [10]. Although throughput S i is determined by P i , s u c in both single channel and channel switching environments, we still need another way to obtain throughput S i under multichannel environments.
We use a contention model to analyze the average time consumed on CCH for a SCH reservation. In each time slot during the WSA interval, channel is idle with probability P i d l e . Otherwise, the transmitting is successful with probability P s u c and channel collision occurs with probability P c o l .
P i d l e = h = 0 3 ( 1 τ h ) N h
P s u c = i = 0 3 P i , s u c = i = 0 3 N i τ i ( 1 τ i ) N i 1 h = 0 , h i 3 ( 1 τ h ) N h
P c o l = 1 P i d l e P s u c = 1 h = 0 3 ( 1 τ h ) N h i = 0 3 N i τ i ( 1 τ i ) N i 1 h = 0 , h i 3 ( 1 τ h ) N h
Let T r e s e r denote the duration from the time instant when a WSA or an RFS becomes the head of the MAC to the time instant when a reservation is successfully made or dropped due to reaching the maximum retransmission number. We assume that the nodes are under saturated conditions. Let Z represent the time interval between two consecutive free time slots before a reservation is successfully made. According to the backoff mechanism, the probability of consecutive packets collisions or consecutive successful reservations is too small to be considered [15,33]. So, variable Z only contains a collision or a free time slot, therefore, we can have
Z = σ + B
the random variable B can be expressed as follows:
B = 0 , P i d l e / ( P i d l e + P c o l ) T c o l , P c o l / ( P i d l e + P c o l ) .
where T c o l denotes the time of a collision, and is composed of a maximum AIFS time, A I F S [ ] , the time T w s a for transmitting a WSA/RFS packet, and the duration of the propagation delay δ . For simplicity, we set T w s a equal to the time T r f s for transmitting an RFS, i.e., T w s a = T r f s . Then, we have
T c o l = A I F S [ ] + T w s a + δ T w s a = L w s a R d
where R d represents the data rate on both CCH and SCHs.
According to Equations (19) and (20), the mean interval of variable Z can be expressed as,
E [ Z ] = σ + P c o l · T c o l P i d l e + P c o l
The probability that successful transmission occurs after the kth free time slot follows a geometric distribution.
P ( K = k ) = ( 1 P s u c ) k 1 · P s u c , k = 1 , 2 , 3
Based on Equations (22) and (23), the mean reservation time can be given by:
E [ T r e s e r ] = 1 P s u c 1 · E [ Z ] + σ + T s u c = σ + P c o l · T c o l P s u c + T s u c .
where T s u c denotes the duration of a successful reservation. Let T a c k = L a c k / R d be the cost of transmitting the payload L a c k of an ACK packet. Since ACs with longer AIFS are prevented from accessing some channel [4,34], we also consider the different AIFS for different A C s , T s u c can be calculated by
T s u c = i = 0 3 P i , s u c ( A I F S [ i ] + T w s a + S I F S + T a c k + 2 δ ) P s u c = i = 0 3 P i , s u c ( A I F S [ i ] + T w s a + S I F S + T a c k + 2 δ ) i = 0 3 P i , s u c
To calculate the throughput of SCHs, we define the following symbols.
(1)
Let T S I and M denote the length of a SI and the number of lanes in each direction, respectively.
The RSU estimates the number of newly entering vehicles, n n e w , during a SI by [22]
n n e w = 2 M · V a v g · β · T S I
T V I I can be estimated as follows [22]:
T V I I = L t o t a l · T r r t s + m · T c p
where T c p and T r r t s represent the duration of transmitting a Coordination Packet (CP) and an Reservation Request To Send (RRTS) packet, respectively. m and L t o t a l in Equation (27) represent the number of rounds that a node has to be experienced before it is identified by RSU and the total Frame length, respectively which can be easily derived according to Algorithm 1 in [22].
(2)
Let T S a S l o t denote the duration for transmitting a safety-related message. According to Figure 1, we have
T S I = T C F I + T V I I + T W I
T C F I = N · T S a S l o t + 2 T C L I .
where T C L I denotes the transmission delay of a CLI packet, and now, we calculate it. As an example of large dimensioning, we assume that the maximum number of nodes which can exist in an RSU converge is N m a x , and N m a x equals to 200. A CLI packet includes scheduling slot information of each identified node during CFI, the minimum CW size for four ACs, T C F I , T V I I and T W I . If the maximum number of nodes is N m a x , at least l o g 2 N m a x bits are required to represent a node ID, where · denotes the ceiling function. An ID of 8 bits is sufficient for the network size assumed. Since each node corresponds to a safety slot during CFI, 8 bits are sufficient to identify a safety slot. Since the number of different ACs, N A C , is four and the maximum CW, C W m a x , is 1024 in IEEE 802.11p [9] and IEEE 1609.4 protocol [10], and thus 2 bits and 10 bits are sufficient to represent a AC and a minimum CW, respectively. Due to an SI with a length of 100 ms, 8 bits are sufficient to represent, respectively, T C F I , T V I I and T W I . Therefore, we can derive T C L I by
T C L I = 2 log 2 N max N max R d + log 2 N A C + log 2 C W max N A C R d + log 2 T C F I + log 2 T V I I + log 2 T W I R d = 2 × 8 × 200 + ( 2 + 10 ) × 4 + 3 × 8 b i t s 6 M b p s = 0.55 ms
Therefore, we let T C L I be 1 ms in this paper.
(3)
Let N s c h represent the number of available SCHs in the VANETs.
(4)
Let G c c h denote the total number of successful SCHs reservation on CCH during the WSA interval. Let G s c h be the number of non-safety packets transmitted over all N s c h SCHs during the whole SI. We have
G c c h = T W I E [ T r e s e r ] .
G s c h = N s c h · T S I T d a t a
where T d a t a denotes the duration of a non-safety packet transmission on the SCH. Therefore, T d a t a can be calculated by
T d a t a = D I F S + T h + T d a + S I F S + T a c k + 2 δ
where D I F S is the cost of a Distributed Inter Frame Space (DIFS), T h is the cost of MAC header and PHY header attached to the non-safety packet, and T d a = L d a t a / R d denotes the duration of transmitting the payload L d a t a of a non-safety packet. Note, we still use constant DIFS instead of AIFS for clarify and simplicity when calculate T d a t a for non-safety packets with different ACs.
The real number of non-safety packets on all SCHs satisfies such situation that the number of reservations made on CCH during WSA interval equals to the number of non-safety packets transmitted on all SCHs during SI, i.e., G c c h = G s c h . This means that, there are not enough idle time slots left in the WSA interval for making more reservations on CCH or in the SI for transmitting more non-safety packets on all SCHs. Therefore, the total throughput obtained on SCHs, S s c h , can be given by
S s c h = min T W I E [ T r e s e r ] , N s c h · T S I T d a t a · L d a t a T S I
Without loss of generality, we consider two priority classes, let’s say A C 0 and A C 1 . Given the predefined throughput ratio R S 0 / S 1 of non-safety service with A C 0 to A C 1 , then the throughput obtained on SCHs of nodes delivering non-safety packets with A C 0 and A C 1 , respectively, S 0 and S 1 , can be calculated by
S 0 = S s c h × R S 0 / S 1 1 + R S 0 / S 1 S 1 = S s c h × 1 1 + R S 0 / S 1

4.2. Delay Analysis

The delay of the non-safety message transmissions is the interval from the time instant that a non-safety packet contends to access the CCH to the time instant that this packet is successfully transmitted on SCH. The delay includes three parts: WSA interval (during which nodes perform SCH reservations), SI (during which the non-safety packets are transmitted) and synchronization intervals (which the nodes need to be experienced before a successful transmission). As the SCH reservations and the transmissions of non-safety messages are random, the delay in the WSA interval and SI can be approximated as half of each interval length.
The main factor of delay is the number of synchronization intervals before a successful transmission due to relatively long value compared to the other two parts. If a node, due to unsuccessful reservation during the WSA interval or without enough time for transmission on SCH during the next SI, does not successfully perform a transmission, it will wait for the next next SI and go on until a successful transmission. Let ζ 0 and ζ 1 be the average number of successful transmissions on the SCHs of each node with A C 0 and A C 1 in an synchronization interval, respectively. It can be calculated by the total number of successful transmissions during an synchronization interval over the total number of contending nodes, as given by,
ζ 0 = n 0 , s u c N 0 ζ 1 = n 1 , s u c N 1
where n 0 , s u c and n 1 , s u c denote the number of successful transmissions of non-safety packets with A C 0 and A C 1 on the SCHs during an synchronization interval, respectively, and they can be calculated by
n 0 , s u c = min T W I E [ T r e s e r ] , N s c h · T S I T d a t a × R s 0 / s 1 1 + R s 0 / s 1 n 1 , s u c = min T W I E [ T r e s e r ] , N s c h · T S I T d a t a × 1 1 + R s 0 / s 1
Therefore, the total transmission delay T 0 , d e l a y and T 1 , d e l a y of non-safety packets with A C 0 and A C 1 , respectively, can be expressed as
T 0 , d e l a y = 1 2 · T W I + ( 1 ζ 0 1 ) · T S I + 1 2 · T S I = 1 2 · T W I + ( 1 ζ 0 1 2 ) · T S I T 1 , d e l a y = 1 2 · T W I + ( 1 ζ 1 1 ) · T S I + 1 2 · T S I = 1 2 · T W I + ( 1 ζ 1 1 2 ) · T S I

5. Performance Evaluation

In this section, we evaluate the performance of the proposed EQM-MAC protocol through a simulation study. We compare the performance of EQM-MAC protocol with the following protocols (schemes).
  • The IEEE 1609.4 protocol [10]: This is the default multichannel protocol with fixed CCH interval (50 ms) and SCH interval (50 ms). All nodes use the CSMA/CA mechanism to perform channel access for the transmissions of safety-related and WSA messages on the CCH, and switch to the specific SCH to disseminate non-safety messages during the SCHI.
  • The multichannel TDMA MAC protocol specifically for VANETs scenario (VeMAC) [17]: VeMAC protocol is considered to be the very beginning in research of TDMA MAC for V2V communication. Each node has two transceivers: Transceiver 1 is always tuned to CCH to transmit safety messages and make SCH reservations while transceiver 2 can be tuned to any SCH to transmit non-safety messages. The VeMAC protocol works in a distributed way, and thus each node requires to exchange additional information to obtain a time slot for transmitting safety-related messages [17]. According to the protocol, the length of a VeMAC (packet) is about 650 bytes ( N m a x = 200 ), and the duration for transmitting this packet is thus about 0.9 ms given R d = 6 Mbps [17]. In the following analysis, the length of each frame defined in VeMAC protocol is 200. For facilitation of the analysis, each node always makes a successful SCH reservation in a frame, and service provider can only transmit one service packet for a successful SCH reservation in a frame.
  • The Coordinated multichannel MAC (C-MAC) protocol [16]: With the coordination of the RSU, C-MAC protocol provides contention-free broadcasting for safety-related messages, and thus lowers the collision probabilities for transmissions of safety-related messages. Through optimizing the SCH interval, the maximal saturation throughput of SCHs is obtained.
  • The QoS supported Variable CCH Interval (Q-VCI) MAC protocol [5]: The Q-VCI protocol can support the QoS delivery in a multi-rate multichannel VANETs environments by adjusting the minimum CW for different service classes at each node. In addition, the Q-VCI protocol adaptively tunes the CCHI to ensure the transmissions of safety-related messages and to maximize the throughput of SCHs according to the traffic conditions. We set α , data rate for two SCHs and data rate for the other SCHs, respectively, be 3, 6 Mbps and 9 Mbps in the Q-VCI MAC protocol.

5.1. Simulation Scenario

The simulation platform is the network simulator NS3 [35], in which V2V and V2I communicate over an experience Rayleigh fading channel. The simulation scenario is on a 6-km-long highway with 2-lanes in each direction as shown in Figure 3. The speed of vehicles is uniformly distributed in [80, 120] km/h and [60, 100] km/h. We set the duration T S a S l o t of each slot in the CFI be 0.4 ms when safety-related packet size is 200 bytes and transmission data rate is 6 Mbps. Every vehicle has a GPS and a single-radio WAVE communication device. All nodes can act as both service providers and service users. Simulation time is 2 min and the final result is the average of each simulation result. We evaluate our proposed EQM-MAC protocol under different traffic densities to guarantee scalability, reliability and efficiency. Configuration parameters are summarized in Table 3.

5.2. Simulation Results

Figure 4 shows the minimum Contention Window (CW) for A C 1 under different R S 0 / S 1 . The minimum CW for A C 0 is 32. When the number of nodes delivering each AC packets is fixed, the minimum CW for nodes belonging to A C 1 , W 1 , 0 , increases with higher R S 0 / S 1 . This is because that, when the number of nodes is fixed, the larger CW incurs smaller probabilities of successful reservations, and thus lower throughput can be achieved on the SCHs, which can be seen from Equation (15). It is evident that the minimum CW for nodes with A C 1 become larger when fewer nodes with A C 0 deliver packets. For example, if R S 0 / S 1 = 4, W 1 , 0 = 184 when N 0 = 40 and N 1 = 60, while W 1 , 0 = 245 when N 0 = 40 and N 1 = 80. This is because, based on predefined value ( R S 0 / S 1 and W 0 , 0 ), EQM-MAC protocol can adjust minimum CW for other service classes to ensure the packets with higher priority to be transmitted. Therefore, the EQM-MAC protocol can differentiate the transmission opportunities for the packets with different service classes.
Figure 5 shows the saturation throughput on SCHs in terms of R S 0 / S 1 (Figure 5a,b) and the number of nodes delivering two ACs (Figure 5c,d). To enhance the utilization of SCHs, EQM-MAC protocol allows each node to make reservations and transmit non-safety packets multiple times on SCHs during an synchronization interval. From Figure 5a,b, we can observe that, with the increase of R S 0 / S 1 , the saturation throughput for A C 0 increases, while the saturation throughput for A C 1 decreases. This is because that, when the number of nodes delivering two ACs is fixed, with the increase of R S 0 / S 1 , the proposed EQM-MAC protocol allocates larger CW to nodes delivering packets with A C 1 , and thus the saturation throughput for A C 0 increases and the saturation throughput for A C 0 decreases. From Figure 5c,d, we find that, the total throughput for packets with payload L d a t a = 3000 bytes keeps its maximum level at first and then reduces when the number of nodes rises further, while the throughput for packets with payload L d a t a = 1000 bytes decreases with the increase of the number of nodes. The reasons is that, taking L d a t a = 3000 bytes and R S 0 / S 1 = 2 for example, when the number of nodes is less than 140, each node has a great chance to make SCH reservations and has enough time to transmit on SCHs. However, when the number of nodes becomes larger, due to the increase of T r e s e r and the shortage of the WSA interval, each node has little chance to make SCH reservations and thus the probability of successful reservations decreases. Since each transmission with long payload L d a t a carries more data than that of short payload L d a t a , total throughput of long payload L d a t a is higher than that of short payload L d a t a . It is also clear that the throughput of packets with A C 0 is more than that of packets with A C 1 as shown in Figure 5, which demonstrates the QoS differentiation in the EQM-MAC protocol. Analytical and simulation results match well. Our proposed protocol is validated.
Figure 6 shows the analysis and simulation results of the delay performance of the proposed EQM-MAC protocol on the basis of R S 0 / S 1 (Figure 6a,b) and the number of nodes delivering two ACs (Figure 6c,d). From Figure 6a,b, we can see that, on one hand, with the increase of R S 0 / S 1 , the packets with A C 0 maintain the same lower delay. Therefore, the proposed EQM-MAC protocol can ensure the near-real time needs of some interactive entertainment applications such as mobile multiplayer gaming and voice over IP. On the other hand, with the increase of R S 0 / S 1 , the delay for packets with A C 1 rises. The reason is that, when the number of nodes delivering packets belonging to A C 0 ( A C 1 ) is fixed, with the increase of R S 0 / S 1 , the EQM-MAC protocol allocates larger CW to nodes delivering packets with A C 1 to ensure the reservation of higher priority AC, which reduces the probability of successful reservations for nodes delivering A C 1 , and thus the higher priority AC has a higher probability of successful reservations and maintains the same lower delay. Therefore, the EQM-MAC protocol has the capability of QoS differentiation. In addition, different payloads have no effect on transmission delay of packets with A C 0 , and they have the same delay. The reason is that, EQM-MAC protocol can give larger CW for nodes with A C 1 to guarantee the reservation of higher priority AC ( A C 0 ), and thus the nodes with A C 0 (although have different payloads) all have great chances to make SCH reservations and have enough time to transmit on SCHs. The delay decreases first and then increases when the number of nodes becomes larger, as shown in Figure 6c,d. Since the number of nodes increases, the increase of safety interval incurs a shorter WSA interval. We take the nodes delivering packets with A C 1 and L d a t a = 1000 bytes in Figure 6c for example to perform the following analysis. When the number of nodes is below 100, the length T W I of WSA interval accounts for the major part of the delay. Moreover, each node can make reservations at least once and all reservations can be successfully transmitted on SCHs. Therefore, the delay decreases to less than 100 ms. As the number of nodes further increases, it leads to a shorter WSA interval, and thus more intense contentions and less reservations. The nodes need more than one synchronization interval to transmit and thus the delay increases. When the number of nodes is 100, for example, the number of successful reservations of WSA packets is still more than the number of nodes. According to Equations (36) and (38), the delay is thus less than 100 ms. From Figure 6c, we also can observe that different values of payload L d a t a or different ACs can bring about the same value of delay. For example, the delay of all nodes delivering two ACs is the same in the range of 10 nodes and 60 nodes. This is because each nodes cana successfully make reservations at least once and successfully transmit on SCHs at the arrival of the next next synchronization interval. When the number of nodes delivering the packets with A C 1 is in the range of 70 and 130, the delay of transmissions with long payload ( L d a t a = 3000 bytes) is larger than that with short payload ( L d a t a = 1000 bytes). This is because the number of successful reservations is the same for various payloads, but the transmission with longer payload incurs fewer available slots on SCHs and requires more synchronization intervals. When the number of nodes reaches 140, the transmissions of packets belonging to A C 1 with all kinds of payload have the same delay. This is due to the fact that the number of successful reservations is smaller and less than the number of nodes, so the nodes require several synchronization intervals before making successful reservations. Again, the analytical results match the simulation curves very well.
Figure 7 shows the saturation throughput on the basis of the number of nodes using the five different protocols. As the figure shows that, in the IEEE 1609.4, C-MAC and Q-VCI protocols, the throughput is getting lower when the number of nodes becomes larger. This is because the collision probability increases with the increase of number of nodes. For C-MAC and Q-VCI protocols, more time is set aside to CCH interval and the less time is given for SCH interval, while, for the IEEE 1609.4 protocol, the increasing number of nodes brings about more fierce competition on SCHs. In VeMAC protocol, due to the fixed frame length, the more nodes lead to the more number of successful SCH reservations, as we assumed in the front of this section, and thus the higher throughput on the SCHs. Since the proposed EQM-MAC protocol spends less time in Safety interval than IEEE 1609.4, VeMAC, C-MAC and Q-VCI protocols, its total throughput is higher than that of the other four protocols. Moreover, in the EQM-MAC protocol, an synchronization interval only contains both Safety interval and WSA interval for SCH reservations, and at the same time, the nodes can transmit non-safety messages on SCHs during the whole synchronization interval. Although the Q-VCI protocol uses higher data rate to transmit higher priority AC, the EQM-MAC protocol supports simultaneous transmissions on CCH and SCHs, and thus the EQM-MAC protocol always has the higher throughput than that of Q-VCI protocol under different R S 0 / S 1 . On the other hand, the VeMAC protocol also can use SCHs during the whole synchronization interval, however, each node in VeMAC requires additional information to perform SCH reservation, thus the number of successful SCH reservations in VeMAC protocol is less than that in our proposed EQM-MAC protocol. Therefore, the EQM-MAC protocol can enhance the throughput and utilization of SCHs. For example, when R S 0 / S 1 = 2 and L d a t a = 3000 bytes as shown in Figure 7d, EQM-MAC protocol can increase the average total throughput by 271%, 145%, 93% and 88%, compared with IEEE 1609.4, VeMAC, C-MAC and Q-VCI protocol, respectively. The proposed EQM-MAC protocol can provide efficient and QoS supported delivery of throughput, and the higher throughput requirement of higher priority service can thus be ensured.
Figure 8 shows the average delay of non-safety packets versus the number of nodes using various protocols. The delay increases as the number of nodes increases except VeMAC protocol. This is because, for EQM-MAC, C-MAC and Q-VCI protocol, the collision probability increases when the number of nodes increases on the CCH, and thus the number of successful reservations decreases. Due to using contention-based mechanism on both CCH and SCH in IEEE 1609.4 protocol, the collision probability of transmission non-safety packets on SCHs increases with the number of nodes increasing. Since each node in VeMAC protocol can successful transmit a non-safety message in a frame, thus the delay of non-safety messages is constant and is about the half of a frame length. In most cases, the delay performance of packets of EQM-MAC protocol outperforms the others. The reason is that the EQM-MAC protocol can allow more time T W I for reservations than the VeMAC, C-MAC and Q-VCI protocol. Compared to the IEEE 1609.4 protocol, the EQM-MAC protocol employs coordination and contention-free transmissions on SCHs. We take R S 0 / S 1 = 2 and L d a t a = 1000 bytes in Figure 8c for example to perform the following analysis. When the number of nodes is less than 40, the delay of nodes delivering packets with A C 0 ( A C 1 ) of EQM-MAC protocol is slightly higher than that of the VeMAC, C-MAC and Q-VCI protocol, since the EQM-MAC protocol has longer T W I to wait before transmission than the other three protocols. However, as the number of nodes gets larger, EQM-MAC protocol displays significantly better performance for both A C 0 and A C 1 than that of the IEEE 1609.4, C-MAC and Q-VCI protocol. This is because, with the increase of the number of nodes, when using the IEEE 1609.4 protocol, the transmissions on SCHs are contention-based, and the contention becomes more intense, while, when using C-MAC and Q-VCI protocol, more time is allocated for safety messages and thus less time is left for non-safety messages. It can be also noted that, when the number of nodes is over 100, the delay of packets with A C 1 in the EQM-MAC protocol is higher than that in the VeMAC protocol. The reason is that, in the EQM-MAC protocol, the minimum CW for A C 0 is 32 and that for A C 1 is even larger, while in VeMAC protocol, the minimum CW for both ACs is always 32. The EQM-MAC protocol can ensure non-safety packets with lower transmission delay, and near-real time needs of some interactive entertainment applications can thus be guaranteed.

6. Conclusions

In this paper, we proposed an Efficient and QoS supported Multichannel MAC (EQM-MAC) protocol for VANETs. With the coordination of an RSU, the EQM-MAC protocol uses less time to deliver and reserve time slots for safety messages on the CCH, and thus, the time allocated for SCH reservation can be increased. The EQM-MAC protocol supports simultaneous transmissions on different SCHs during the whole SI, thus it enhances the saturation throughput and utilization of SCHs, and decreases the delay. On the other hand, the EQM-MAC protocol can provide QoS supported delivery on SCHs in terms of differentiated throughput and delay, by adaptively tuning the minimum CW for different non-safety service classes.
In our future work, based on the current work, we will design and develop an efficient inter-RSU communication mechanism that is able to reduce the effect of interference between vehicles in the overlapping regions. We will examine the effect of packet error caused by the hidden terminal and wireless channel impairments such as noise, fading and Non Line Of Sight (NLOS). We will also work on the analysis and design of the multichannel protocol for both safety-related and non-safety services under complex VANETs scenarios such as urban scenario. Finally, the multichannel performance in VANETs under multi-hop wireless conditions will be considered.
References yes

Acknowledgments

This work was supported in part by the Foundation of National 863 Plan of China under Grant 2012AA111902, in part by the National Natural Science Foundation of China under Grant 61502072, in part by the Fundamental Research Funds for the Central Universities of China under Grant DUT16RC(4)17, and in part by the Post-Doctoral Science Foundation of China under Grant 2014M561229 and 2015T80251.

Author Contributions

Caixia Song researched the literatures, conceived the study concepts, designed the protocol and algorithm, and took charge of the entire manuscripts. Chao Yu revised the manuscript and the refinement of the article is completed under the supervision of Guozhen Tan.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  2. Hadded, M.; Muhlethaler, P.; Laouiti, A.; Zagrouba, R.; Saidane, L.A. TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 2461–2492. [Google Scholar] [CrossRef]
  3. Zheng, K.; Zheng, Q.; Chatzimisios, P.; Xiang, W.; Zhou, Y. Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions. IEEE Commun. Surv. Tutor. 2015, 17, 2377–2396. [Google Scholar] [CrossRef]
  4. Amadeo, M.; Campolo, C.; Molinaro, A. Enhancing IEEE 802.11p/WAVE to provide infotainment applications in VANETs. Ad Hoc Netw. 2012, 10, 253–269. [Google Scholar] [CrossRef]
  5. Wang, Q.; Leng, S.; Zhang, Y.; Fu, H. A QoS Supported Multi-Channel MAC for Vehicular Ad Hoc Networks. In Proceedings of the 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), Yokohama, Japan, 15–18 May 2011; pp. 1–5. [Google Scholar]
  6. Bradai, A.; Ahmed, T. ReViV: Selective rebroadcast mechanism for video streaming over VANET. In Proceedings of the 79th IEEE Vehicular Technology Conference (VTC Spring), Seoul, Korea, 18–21 May 2014; pp. 1–6. [Google Scholar]
  7. Rene, S.; Exposito, E.; Gineste, M.; Alins, J.; Esparza, O. Multipath TCP Architecture for Infotainment Multimedia Applications in Vehicular Networks. In Proceedings of the 81st IEEE Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015; pp. 1–5. [Google Scholar]
  8. Su, H.; Zhang, X. Clustering-based multichannel MAC protocols for QoS provisionings over vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2007, 56, 3309–3323. [Google Scholar]
  9. IEEE. IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments; IEEE Std. 802.11p-2010 (Amendment to IEEE Std 802.11-2007 as Amended by IEEE Std 802.11k-2008, IEEE Std. 802.11r-2008, IEEE Std 802.11y-2008, IEEE Std. 802.11n-2009, and IEEE Std 802.11w-2009); IEEE: New York, NY, USA, 2010; pp. 1–51. [Google Scholar]
  10. IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Multi-Channel Operation; IEEE Std. IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Multi-Channel Operation; IEEE Std. 1609.4-2010 (Revision of IEEE Std. 1609.4-2006); IEEE: New York, NY, USA, 2011; pp. 1–89. [Google Scholar]
  11. IEEE. IEEE Standard for Information technology–Local and Metropolitan Area Networks–Specific Requirements–Part 11: Wireless LAN Medium AccessControl (MAC) and Physical Layer (PHY) Specifications—Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements; IEEE Std. 802.11e-2005 (Amendment to IEEE Std. 802.11, 1999 Edition (Reaff 2003); IEEE: New York, NY, USA, 2005; pp. 1–212. [Google Scholar]
  12. Mo, J.; So, H.S.W.; Walrand, J. Comparison of Multichannel MAC Protocols. IEEE Trans. Mob. Comput. 2008, 7, 50–65. [Google Scholar]
  13. Hafeez, K.A.; Anpalagan, A.; Zhao, L. Optimizing the Control Channel Interval of the DSRC for Vehicular Safety Applications. IEEE Trans. Veh. Technol. 2016, 65, 3377–3388. [Google Scholar] [CrossRef]
  14. Almotairi, K.H.; Shen, X. A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks. IEEE Trans. Mob. Comput. 2015, 14, 1–13. [Google Scholar] [CrossRef]
  15. Wang, Q.; Leng, S.; Fu, H.; Zhang, Y. An IEEE 802.11p-Based Multichannel MAC Scheme with Channel Coordination for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2012, 13, 449–458. [Google Scholar] [CrossRef]
  16. Kim, Y.; Lee, M.; Lee, T.J. Coordinated Multichannel MAC Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2016, 65, 6508–6517. [Google Scholar] [CrossRef]
  17. Omar, H.A.; Zhuang, W.; Li, L. VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs. IEEE Trans. Mob. Comput. 2013, 12, 1724–1736. [Google Scholar] [CrossRef]
  18. Song, C.; Tan, G.; Yu, C.; Ding, N.; Zhang, F. APDM: An adaptive multi-priority distributed multichannel MAC protocol for vehicular ad hoc networks in unsaturated conditions. Comput. Commun. 2017, 104, 119–133. [Google Scholar] [CrossRef]
  19. Song, C.; Tan, G.; Ding, N.; Bu, J.; Zhang, F.; Liu, M. Application oriented cross-layer multi-channel MAC protocol for VANET. J. Commun. 2016, 37, 95–105. [Google Scholar]
  20. Han, C.; Dianati, M.; Tafazolli, R.; Liu, X.; Shen, X. A Novel Distributed Asynchronous Multichannel MAC Scheme for Large-Scale Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2012, 61, 3125–3138. [Google Scholar] [CrossRef]
  21. Campolo, C.; Molinaro, A. Multichannel communications in vehicular ad hoc networks: A survey. IEEE Commun. Mag. 2013, 51, 158–169. [Google Scholar] [CrossRef]
  22. Song, C.; Tan, G. A Coordinated Reliable and Efficient Multichannel MAC Protocol for Vehicular Ad Hoc Networks. Comput. Commun. 2017. (submitted). [Google Scholar] [CrossRef]
  23. Luan, T.H.; Ling, X.; Shen, X.S. Provisioning QoS controlled media access in vehicular to infrastructure communications. Ad Hoc Netw. 2012, 10, 231–242. [Google Scholar] [CrossRef]
  24. Alcaraz, J.J.; Vales-Alonso, J.; Garcia-Haro, J. Control-based scheduling with QoS support for vehicle to infrastructure communications. IEEE Wirel. Commun. 2009, 16, 32–39. [Google Scholar] [CrossRef]
  25. Cheng, N.; Lu, N.; Wang, P.; Wang, X.; Liu, F. A QoS-provision multi-channel MAC in RSU-assisted vehicular networks (poster). In Proceedings of the IEEE Vehicular Networking Conference (VNC), Amsterdam, The Netherlands, 14–16 November 2011; pp. 193–197. [Google Scholar]
  26. Cha, J.R.; Kim, J.H. Novel Anti-collision Algorithms for Fast Object Identification in RFID System. In Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS’05), Fukuoka, Japan, 20–22 July 2005; Volume 2, pp. 63–67. [Google Scholar]
  27. Borgonovo, F.; Capone, A.; Cesana, M.; Fratta, L. ADHOC MAC: New MAC architecture for ad hoc networks providing efficient and reliable point-to-point and broadcast services. Wirel. Netw. 2004, 10, 359–366. [Google Scholar] [CrossRef]
  28. Luo, T.; Motani, M.; Srinivasan, V. Cooperative Asynchronous Multichannel MAC: Design, Analysis, and Implementation. IEEE Trans. Mob. Comput. 2009, 8, 338–352. [Google Scholar] [CrossRef]
  29. Bai, F.; Krishnamachari, B. Spatio-temporal variations of vehicle traffic in VANETs: Facts and implications. In Proceedings of the ACM International Workshop on Vehicular Internetworking, Beijing, China, 25 September 2009; pp. 43–52. [Google Scholar]
  30. Yao, Y.; Rao, L.; Liu, X. Performance and reliability analysis of IEEE 802.11 p safety communication in a highway environment. IEEE Trans. Veh. Technol. 2013, 62, 4198–4212. [Google Scholar] [CrossRef]
  31. Xiao, Y. Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs. IEEE Trans. Wirel. Commun. 2005, 4, 1506–1515. [Google Scholar] [CrossRef]
  32. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  33. Sakurai, T.; Vu, H.L. MAC Access Delay of IEEE 802.11 DCF. IEEE Trans. Wirel. Commun. 2007, 6, 1702–1710. [Google Scholar] [CrossRef]
  34. Tinnirello, I.; Bianchi, G. Rethinking the IEEE 802.11e EDCA Performance Modeling Methodology. IEEE/ACM Trans. Netw. 2010, 18, 540–553. [Google Scholar] [CrossRef]
  35. NS3. Available online: https://www.nsnam.org/releases/ (accessed on 9 October 2017).
Figure 1. The framework of EQM-MAC protocol.
Figure 1. The framework of EQM-MAC protocol.
Sensors 17 02293 g001
Figure 2. Two-dimensional Markov chain for the priority A C i .
Figure 2. Two-dimensional Markov chain for the priority A C i .
Sensors 17 02293 g002
Figure 3. A scenario with 2 lanes in each direction on highway with RSU and moving vehicles.
Figure 3. A scenario with 2 lanes in each direction on highway with RSU and moving vehicles.
Sensors 17 02293 g003
Figure 4. Minimum contention window for A C 1 .
Figure 4. Minimum contention window for A C 1 .
Sensors 17 02293 g004
Figure 5. Saturation throughput on SCHs. (a) Saturation throughput versus R S 0 / S 1 ( N 0 = 20, N 1 = 20);(b) Saturation throughput versus R S 0 / S 1 ( N 0 = 40, N 1 = 60); (c) Saturation throughput versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 2); (d) Saturation throughput versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 6.)
Figure 5. Saturation throughput on SCHs. (a) Saturation throughput versus R S 0 / S 1 ( N 0 = 20, N 1 = 20);(b) Saturation throughput versus R S 0 / S 1 ( N 0 = 40, N 1 = 60); (c) Saturation throughput versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 2); (d) Saturation throughput versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 6.)
Sensors 17 02293 g005aSensors 17 02293 g005bSensors 17 02293 g005c
Figure 6. Non-safety packet delay. (a) Delay versus R S 0 / S 1 ( N 0 = 20, N 1 = 20); (b) Delay versus R S 0 / S 1 ( N 0 = 40, N 1 = 60); (c) Delay versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 2); (d) Delay versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 6.)
Figure 6. Non-safety packet delay. (a) Delay versus R S 0 / S 1 ( N 0 = 20, N 1 = 20); (b) Delay versus R S 0 / S 1 ( N 0 = 40, N 1 = 60); (c) Delay versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 2); (d) Delay versus the number of nodes ( N 0 = N 1 , R S 0 / S 1 = 6.)
Sensors 17 02293 g006aSensors 17 02293 g006b
Figure 7. Saturation throughput on SCHs versus the number of nodes for kinds of protocols ( N 0 = N 1 ). (a) R S 0 / S 1 = 1, L d a t a = 1000 bytes; (b) R S 0 / S 1 = 1, L d a t a = 3000 bytes; (c) R S 0 / S 1 = 2, L d a t a = 1000 bytes; (d) R S 0 / S 1 = 2, L d a t a = 3000 bytes; (e) R S 0 / S 1 = 6, L d a t a = 1000 bytes; (f) R S 0 / S 1 = 6, L d a t a = 3000 bytes.
Figure 7. Saturation throughput on SCHs versus the number of nodes for kinds of protocols ( N 0 = N 1 ). (a) R S 0 / S 1 = 1, L d a t a = 1000 bytes; (b) R S 0 / S 1 = 1, L d a t a = 3000 bytes; (c) R S 0 / S 1 = 2, L d a t a = 1000 bytes; (d) R S 0 / S 1 = 2, L d a t a = 3000 bytes; (e) R S 0 / S 1 = 6, L d a t a = 1000 bytes; (f) R S 0 / S 1 = 6, L d a t a = 3000 bytes.
Sensors 17 02293 g007aSensors 17 02293 g007b
Figure 8. Non-safety packet delay versus the number of nodes for kinds of protocols ( N 0 = N 1 ). (a) R S 0 / S 1 = 1, L d a t a = 1000 bytes; (b) R S 0 / S 1 = 1, L d a t a = 3000 bytes; (c) R S 0 / S 1 = 2, L d a t a = 1000 bytes; (d) R S 0 / S 1 = 2, L d a t a = 3000 bytes; (e) R S 0 / S 1 = 6, L d a t a = 1000 bytes; (f) R S 0 / S 1 = 6, L d a t a = 3000 bytes.
Figure 8. Non-safety packet delay versus the number of nodes for kinds of protocols ( N 0 = N 1 ). (a) R S 0 / S 1 = 1, L d a t a = 1000 bytes; (b) R S 0 / S 1 = 1, L d a t a = 3000 bytes; (c) R S 0 / S 1 = 2, L d a t a = 1000 bytes; (d) R S 0 / S 1 = 2, L d a t a = 3000 bytes; (e) R S 0 / S 1 = 6, L d a t a = 1000 bytes; (f) R S 0 / S 1 = 6, L d a t a = 3000 bytes.
Sensors 17 02293 g008
Table 1. Summary of important notations.
Table 1. Summary of important notations.
NotationDefinition
SISynchronization Interval
CFIContention-Free Interval
VIIVehicle Identification Interval
CLICoordination and Length Information
CPCoordination Packet
RRTSReservation Request To Send
RFSRequest For Service
ACK/NACKAcknowledgement / Non-acknowledgement
SULSCH Usage List
ACAccess Category
NThe total number of nodes
N i The number of nodes delivering non-safety packets with A C i
β The vehicle density on the highway (vehicles/m)
RThe RSU coverage
P ( j , l ) The probability that j vehicles exist within length l of the highway
n n e w The number of newly entering vehicles during an SI
MThe number of lanes in each direction
P i The collision probability that a node delivering a WSA/RFS packet
with A C i collides with other nodes when access the channel
τ i The stationary probability that a node sends WSA/RFS packets belonging to A C i
in a random time slot
P i , s u c The probability that a node transmits WSA/RFS packets belonging to A C i to make
a successful reservation
P s u c The probability that a successful transmission of WSA/RFS packets occurs in a time slot
P i d l e The probability that the channel is idle
P c o l The probability that the channel collision occurs
ZThe time interval between two consecutive free time slots before a reservation is
successfully made
T s u c The duration of a successful reservation
T c o l The duration for a transmission collision
when the node is performing a reservation
T w s a / T r f s The duration for transmitting a WSA/RFS packet
T a c k The duration for transmitting an ACK packet
δ The duration of the propagation delay
T r e s e r The duration from the time instant when a WSA/RFS becomes the head of the
MAC queue to the time instant when a reservation is successful made or dropped
due to reaching the maximum retransmission number
T S I The duration of an SI
T C F I The duration of CFI
T V I I The duration of VII
T W I The duration of WSA interval
T r r t s The duration of transmitting a RRTS packet
T c p The duration of transmitting a CP
T d a t a The duration of a non-safety packet transmission on the SCH
T h The cost of MAC-layer header and physical-layer header
T d a The duration of transmitting the payload of a non-safety packet
A I F S The arbitration inter frame space
A I F S N The AIFS number
S I F S The duration of an Short Inter Frame Space (SIFS)
D I F S The duration of a DIFS
σ The duration of an idle time slot
m The maximum times that the CW can be doubled
mThe maximum number of retransmissions
W i , 0 The minimum CW size of A C i
W i , j The CW size of A C i in the jth stage
b i , j , k The stationary distribution of k state in jth stage for A C i
N s c h The number of available SCHs in VANETs
G c c h The total number of successful SCH reservations on CCH
G s c h The number of non-safety packets transmitted over all N s c h SCHs during the whole SI
L w s a / L r f s The payload of a WSA/RFS packet
L a c k The payload of an ACK packet
L d a t a The payload of a non-safety packet
S s c h The total throughput obtained on N s c h SCHs
S i The throughput obtained on N s c h SCHs of nodes delivering non-safety packets
with A C i ( i = 0 , 1 , 2 , 3 )
R S 0 / S 1 The predefined throughput ratio of non-safety packets with A C 0 to A C 1
ζ i The average number of successful transmissions belonging to A C i ( i = 0 , 1 , 2 , 3 ) on the
SCHs of each node
n i , s u c The number of successful transmissions belonging to A C i ( i = 0 , 1 , 2 , 3 ) on the SCHs
T i , d e l a y The total transmission delay of non-safety packets belonging to A C i ( i = 0 , 1 , 2 , 3 )
R d The transmission data rate on both CCH and SCHs
N m a x The maximum number of nodes exists in an RSU converge
N m a s c h The maximum number of SCHs in vehicular environments
N A C The number of different ACs in vehicular networks
C W m a x The maximum CW size in vehicular networks
m The number of rounds that a node has to be experienced before it is identified by RSU
Table 2. Node’s SUL.
Table 2. Node’s SUL.
SCHAvailable Slots
12, 7, 8
22, 4, 6
31, 3
41, 5
Table 3. SYSTEM PARAMETER FOR SIMULATIONS
Table 3. SYSTEM PARAMETER FOR SIMULATIONS
ParametersValues
Number of SCHs ( N s c h )4
Number of CCH1
Date rate for each channel ( R d )6 Mbps
RSU coverage (R)300 m, 500 m
Number of lanes (M)2-lane in each direction
Channel bandwidth10 MHz
Channel modelRayleigh fading
Pathloss exponent4
Noise power−100 dBm
Transmission power23 dBm
Average of vehicle density ( β )0.02 to 0.3 vehicles/m
Vehicle velocity ( [ V m i n , V m a x ] )[60, 100], [80, 120] km/h
W 0 , 0 32
W 1 , 0 32∼1024
m 5
m10
MAC header256 bits
PHY header192 bits
The payload of a WSA/RFS packet ( L w s a / L r f s )216 bits + PHY header
The payload of an ACK packet ( L a c k )128 bits + PHY header
AIFSN for A C 0 ( A I F S N [ 0 ] )6
AIFSN for A C 1 ( A I F S N [ 1 ] )9
The duration of an SIFS ( S I F S )32 μ s
The duration of an DIFS ( D I F S )58 μ s
a slot time ( σ )13 μ s
The propagation delay ( δ )1 μ s
The duration of transmission an RRTS packet ( T r r t s )60 μ s
The duration of transmission a Coordination Packet ( T c p )100 μ s
The duration of transmission a safety-related packet T S a S l o t 0.4 ms
Sending frequency of safety messages10 Hz
The payload of a non-safety packet ( L d a t a )1000, 3000 bytes
Safety packet size200 bytes

Share and Cite

MDPI and ACS Style

Song, C.; Tan, G.; Yu, C. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks. Sensors 2017, 17, 2293. https://doi.org/10.3390/s17102293

AMA Style

Song C, Tan G, Yu C. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks. Sensors. 2017; 17(10):2293. https://doi.org/10.3390/s17102293

Chicago/Turabian Style

Song, Caixia, Guozhen Tan, and Chao Yu. 2017. "An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks" Sensors 17, no. 10: 2293. https://doi.org/10.3390/s17102293

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop