Next Article in Journal
Orthogonal Space-Time Block Coding for Double Scattering V2V Links with LOS and Ground Reflections
Next Article in Special Issue
Deep Reinforcement Learning-Based Power Allocation for Minimizing Age of Information and Energy Consumption in Multi-Input Multi-Output and Non-Orthogonal Multiple Access Internet of Things Systems
Previous Article in Journal
Classification of Targets and Distractors in an Audiovisual Attention Task Based on Electroencephalography
Previous Article in Special Issue
Heuristic Path Search and Multi-Attribute Decision-Making-Based Routing Method for Vehicular Safety Messages
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Analytical Model for the IEEE 802.11p/bd Medium Access Control, with Consideration of the Capture Effect in the Internet of Vehicles

1
School of Informatics, Xiamen University, Xiamen 361005, China
2
China Mobile Communications Group Shanxi Co., Ltd., Taiyuan 030032, China
*
Author to whom correspondence should be addressed.
Submission received: 31 October 2023 / Revised: 29 November 2023 / Accepted: 1 December 2023 / Published: 3 December 2023

Abstract

:
The traditional vehicular ad hoc network (VANET), which is evolving into the internet of vehicles (IoV), has drawn great attention for its enormous potential in road safety improvement, traffic management, infotainment service support, and even autonomous driving. IEEE 802.11p, as the vital standard for wireless access in vehicular environments, has been released for more than one decade and its evolution, IEEE 802.11bd, has also been released for a few months. Since the analytical models for the IEEE 802.11p/bd medium access control (MAC) play important roles in terms of performance evaluation and MAC protocol optimization, a lot of analytical models have been proposed. However, the existing analytical models are still not accurate as a result of ignoring some important factors of the MAC itself and real communication scenarios. Motivated by this, a novel analytical model is proposed, based on a novel two-dimensional (2-D) Markov chain model. In contrast to the existing studies, all the important factors are considered in this proposed model, such as the backoff freezing mechanism, retry limit, post-backoff states, differentiated packet arrival probabilities for empty buffer queue, and queue model of packets in the buffer. In addition, the influence of the capture effect under a Nakagami-m fading channel has also been considered. Then, the expressions of successful transmission, collided transmission, normalized unsaturated throughput, and average packet delay are all meticulously derived, respectively. At last, the accuracy of the proposed analytical model is verified via the simulation results, which show that it is more accurate than the existing analytical models.

1. Introduction

The vehicular ad hoc network (VANET) has been a widespread concern of academia and industry for its enormous potential in improving road safety, promoting traffic efficiency, providing infotainment services, and even supporting autonomous driving [1,2]. Benefiting from the rapid development of information and communication technology [3,4,5,6,7,8,9,10,11], the traditional VANET is evolving into the internet of vehicles (IoV) [12]. It can support heterogeneous vehicular communication modes, including vehicle-to-vehicle (V2V), vehicle-to-pedestrian (V2P), vehicle-to-infrastructure (V2I) and vehicle-to-network (V2N), as shown in Figure 1, for satisfying the requirements of different safety or non-safety applications [13,14]. However, the key to accomplish differentiated applications depends on whether the vehicles effectively access the wireless channel. As an important channel access standard for IoV, IEEE 802.11p outlines the specifications of the physical (PHY) layer and medium access control (MAC) layer, where the latter includes the distributed coordination function (DCF) and enhanced distributed channel access (EDCA). According to the EDCA, four access categories (ACs) are defined. In fact, each AC queue is called an enhanced distributed channel access function (EDCAF), which is an enhanced variant of the DCF. It contends for the transmission opportunity (TXOP) by using a set of EDCA parameters [15]. Actually, IEEE 802.11bd, as an evolving version of IEEE 802.11p, also adopts DCF and EDCA protocols [16]. Due to the fact that the DCF protocol is the essential channel access protocol of IEEE 802.11p/bd, it is necessary to propose an effective analytical model for evaluating the precise performance of IEEE 802.11p/bd DCF (or EDCA) in IoV.
Since the DCF is the basis of the IEEE 802.11 series of standards, a lot of analytical models based on Bianchi’s pioneering work in [17] have been proposed, under different assumptions, in different communication scenarios [15,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43]. However, none of them can completely show all the characteristics of the DCF and analyze the performance of the DCF precisely in IoV scenarios, especially for those ignoring the capture effect [17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35]. In fact, when the receiver receives the signal power from one transmitter that is higher than that of the other transmitters, the capture effect, which is a common phenomenon in wireless communication, may occur [43,44,45]. According to [45], the system performance of IEEE 802.11 networks can be improved by the capture effect. Nevertheless, there are only a few analytical models in the existing literature considering the capture effect under frequently used fading channels in vehicular communication [36,37,38,39,40,41,42,43]. According to [46,47], the Nakagami-m channel model represents small-scale fading in vehicular communication and reflects a realistic driving environment. Therefore, analyzing IEEE 802.11p/bd DCF under this fading channel model is necessary to show its real performance in IoV. Though the capture effect under the Nakagami-m fading channel is considered in [42], the authors only show the non-closed-form formulation for the normalized throughput. In addition, the capture effect under the Nakagami-m fading channel is also considered in our previous work in [43] under the saturated condition, which is a special case that all vehicles in the network always have packets to be transmitted. In fact, the vehicles are often under an unsaturated condition, which means that the buffer queues of vehicles do not always have packets waiting to be transmitted [26,48,49]. Motivated by this, we make the performance analysis of IEEE 802.11p/bd DCF more accurate by proposing a novel two-dimensional (2-D) Markov chain model, where all important characteristics of the DCF itself are included, and the capture effect under the Nakagami-m fading channel is considered, to make the analytical procedure more reasonable. To the best of our knowledge, it is the first analysis of the unsaturated performance of IEEE 802.11p/bd DCF with consideration of the capture effect under the Nakagami-m fading channel by proposing a novel 2-D Markov model different from the existing ones. The contributions of this paper are threefold.
  • A novel 2-D Markov chain model is proposed, which is different from the existing ones. In the proposed 2-D Markov chain model, all the key characteristics of the DCF are considered, i.e., backoff freezing mechanism, immediate access mechanism, finite retry limit, post-backoff procedure, different packet arrival probabilities under different channel states for the empty buffer and queuing model of the buffer queue.
  • The capture effect under a Nakagami-m fading channel is considered. Then, the closed-form expressions of successful transmission, collided transmission, normalized unsaturated throughput, and average packet delay are all meticulously derived, respectively.
  • To verify the accuracy of the proposed model, simulation results are given. In addition, it is also compared with the existing analytical models. As expected, the proposed model is more accurate than the existing models in terms of normalized unsaturated throughput and average packet delay.
The rest of this paper is organized as follows. Section 2 surveys the related research. Section 3 presents an overview of the DCF and develops a novel analytical model for the DCF. Section 4 validates the accuracy of the proposed analytical model for the DCF by comparing it with the existing models. Finally, Section 5 concludes the paper. In addition, Table 1 presents a list of abbreviations used in the paper.

2. Related Work

Due to the wide usage of the IEEE 802.11 series of standards in wireless local area networks, a lot of analytical models for the adopted MAC protocols (i.e., DCF or EDCA) under different network scenarios have been proposed for evaluating its performance and then designing a MAC protocol meeting the requirements of different scenarios by researchers around the world.
As is known, Bianchi, G. first proposed a 2-D Markov chain model (which is called Bianchi’s model [17]) to analyze the DCF protocol under ideal channel conditions and saturated conditions, without considering the backoff freezing mechanism and retry limit. Based on this pioneering work, a lot of research work has been conducted by worldwide researchers. For example, Duffy, K. et al. extended Bianchi’s model to the nonsaturated condition [18], while Madhavi, T. et al. modeled collision-alleviating DCF with a finite retry limit [19]. Though the backoff freezing mechanism and unsaturated condition are considered in [20], the finite retry limit and post-backoff procedure are missed. In addition, the finite retry limit is included in the model in [21], but the post-backoff procedure is still missed. In [22], the performances of saturated throughput and delay for the DCF based on [17], with consideration of the finite retry limit and backoff freezing mechanism, are analyzed. In addition, IEEE 802.11p DCF is analyzed and optimized under saturation conditions in [23], which is just based on the 2-D Markov chain model in [22]. Though the performances of saturated throughput and delay for IEEE 802.11p EDCA are analyzed in [24], the difference between the 2-D Markov chain models in [17,24] is the consideration of retry limit. Moreover, in [15,25], IEEE 802.11p EDCA is analyzed under unsaturation conditions with consideration of the retry limit and backoff freezing mechanism, while the latter considers the queuing model and ignores the post-backoff procedure. Moreover, Cao et al. analyzed the EDCA with consideration of the backoff freezing mechanism, finite retry limit and idle state for four ACs [26], which is more accurate than the model proposed in [15] for considering the queuing model. However, these studies are all on the basis of ideal channel conditions, which is not in line with the reality that the channel does have an effect on the DCF or EDCA protocol in IoV.
Hence, Zhang, Y. et al. analyzed the DCF based on [17] under different channel conditions [27]. In addition, Peng, H. et al. presented a probabilistic analysis of the DCF in a multiplatooning scenario, while a constant probability is used for the transmission error of a packet [28]. However, the backoff freezing mechanism and post-backoff procedure are both ignored. Therefore, Almohammedi, A.A. et al. considered the backoff freezing mechanism and unsaturated condition in the 2-D Markov chain model and analyzed the throughput of the DCF under a varying bit-error ratio (BER) [29]. In addition, Peng, J. et al. also investigated the impact of channel transmission error with a constant probability for a packet in [30]. Moreover, Alshanyour, A. et al. evaluated IEEE 802.11 DCF based on a three-dimensional (3-D) Markov chain model under saturated conditions, and just a constant BER was considered [31]. Meanwhile in [32], an hierarchical 3-D Markov model was proposed for analyzing the non-saturated IEEE 802.11 DCF-based networks under error-prone channel conditions (accomplished by varying the constant block error probability). In [33], Wang, N. et al. evaluated the IEEE 802.11p EDCA based on a 3-D Markov chain model under both saturated and unsaturated conditions, while the impact of channel fading and modulation was modeled with a constant BER for simplicity. In addition, Harkat, Y. et al. analyzed the saturation throughput and average access delay with a constant BER too [34]. In [35], a 3-D Markov chain model is also used to analyze the throughput and average access delay for EDCA under different values of BER.
Unfortunately, the above-mentioned analytical models all ignore the influence from the capture effect. Since the capture effect exists in wireless communication systems, it is necessary to consider it to make the analytical results more accurate [36,44,45,50]. Therefore, Shah, A.F.M.S. et al. analyzed the saturation throughput of DCF by considering the capture effect in a Rayleigh fading environment based on Bianchi’s model [36]. In [37], Lei, L. et al. analyzed the saturation throughput of the DCF with the consideration of the capture effect under the free-space propagation model based on a 3-D Markov chain model. However, the backoff freezing mechanism and post-backoff procedure are both disregarded. Meanwhile in [38,39], Daneshgaran, F. et al. analyzed the saturation throughput and unsaturated throughput with consideration of the capture effect under the Rayleigh fading channel, respectively. However, they ignored the post-backoff procedure and retry limit in their 2-D Markov models. In [40], Han, H. et al. also gave the saturation throughput of the DCF with consideration of the capture effect in a Rayleigh fading channel and the retry limit. Again, in [41], Sutton G.J. et al. modeled the DCF with the capture effect under a Rayleigh fading channel based on a 3-D Markov model, but the backoff freezing mechanism was ignored. Moreover, Leonardo, E. J. et al. analyzed throughput of the DCF with consideration of the capture effect under Hoyt, Rice, and Nakagami-m fading channels in [42], while ignoring the backoff freezing mechanism and the retry limit. In addition, the closed-form expressions of capture effect and throughput are missed. Though the capture effect under the Nakagami-m fading channel is included in our previous work [43], the saturation condition is assumed for convenience, which makes this model not very in line with reality.
Therefore, a novel analytical model considering all the important factors (i.e., backoff freezing mechanism, immediate access mechanism, finite retry limit, post-backoff procedure, different packet arrival probabilities under different channel states for the empty buffer, queuing model of buffer queue, and the capture effect under a Nakagami-m fading channel) is proposed for the performance analysis of IEEE 802.11p/bd DCF in real vehicular communication scenarios. Then, we carefully derive the closed-form expressions of successful transmission, collided transmission, unsaturated throughput and average packet delay, respectively. In fact, the proposed analytical model can be easily extended to the performance analysis of the EDCA. Similar extension methods can be referenced in [15,25,26].

3. The Proposed Analytical Model

In this section, a novel analytical model is proposed to evaluate the performance of the IEEE 802.11p/bd DCF protocol. Different from the existing work, we develop a novel 2-D Markov model to derive the closed-form expressions of normalized unsaturated throughput and average packet delay, which are the two main commonly used evaluation indicators. For convenience, the significant notations and variables used in the analysis procedure are summarized in Table 2.

3.1. Brief Description of DCF

According to the DCF protocol, the vehicles in the network contend for the wireless channel by the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism, which is based on the slotted binary exponential backoff (BEB) scheme. In fact, each vehicle with a packet to be transmitted needs to sense the channel before transmission. If the channel is idle for a duration exceeding the distributed interframe space (DIFS), the vehicle transmits the packet. This is a so-called immediate access mechanism. Otherwise, the backoff procedure is invoked to defer the transmission to avoid collision. According to the BEB scheme, the random backoff time is uniformly chosen in the range [ 0 , C W 1 ] , where C W is the contention window with the minimum C W m i n = W 0 . The backoff counter is decremented by one at the end of each idle slot and the vehicle transmits immediately when the backoff counter reaches zero. However, if the channel is busy, the backoff counter will be frozen. When the channel is idle again for more than one DIFS, the backoff counter will be resumed. The transmission for a data packet (DATA) from the source vehicle is successful if an acknowledgement (ACK) from the destination vehicle can be received by the source vehicle after a period of short interframe space (SIFS). Otherwise, this transmission has failed and a retransmission is scheduled by starting another backoff period with C W doubled. If the maximum of contention window ( C W m a x = W M = 2 M W 0 ) is reached and then C W can be set to W M at most for f times before discarding this packet. Hence, the value of C W is reset to C W m i n after a successful transmission or being discarded due to reaching the retry limit ( M + f ). A backoff procedure shall be performed immediately after the end of every transmission, even if no additional transmissions are currently queued. This is the so-called post-backoff mechanism.
The basic access mode and the request-to-send/clear-to-send (RTS/CTS) access mode are two access techniques supported by the DCF protocol. In fact, the basic access mode is a two-way handshaking mechanism using DATA/ACK packets, while the RTS/CTS access mode is a four-way handshaking mechanism using RTS/CTS packets to reserve the channel resource before transmission. In fact, the latter follows the same backoff rules as the former and reduces the risk of large packet collision by short RTS/CTS packets. Since the duration of the ongoing transmission is included in the above-mentioned control packet, each vehicle updates its network allocation vector (NAV) by the RTS or CTS and then defers transmission for a specified duration to avoid collision.

3.2. A Novel 2-D Markov Chain Model

In Figure 2, a novel 2-D Markov chain model is proposed for modeling the behavior of the DCF protocol in IoV. In this Markov chain model, the unsaturated condition is considered, i.e., the buffer of each vehicle will be empty with probability ( 1 q ) , where q denotes the probability that there exist packets in the buffer after a successful transmission or dropping a packet due to reaching the retry limit. The states for vehicles at time t are represented as s t , b ( t ) , where s t with values from {0, 1,…, M + f } is defined as the random backoff stage and b ( t ) with values from {0, 1,…, W i 1 }) is defined as the value of the backoff counter at time t . Moreover, the states s t e , b ( t ) refer to the states with empty buffer, which means that the buffer queue of one vehicle is empty after a successful transmission or a failure. These random variables are dependent because the maximum value of the backoff counter depends on the backoff stage
W i = 2 i W 0 , 0 i M W M , M < i M + f
Let b ( j , k ) be the stationary distribution of the 2-D Markov chain model in Figure 2. Then, the one-step state transition probabilities can be expressed as
P ( 0 e , k 1 ) ( 0 e , k ) = p i ( 1 a i ) ,   1 k W 0 1 P ( 0 , k 1 ) ( 0 e , k ) = p i a i ,   1 k W 0 1 P ( 0 , k ) ( 0 e , k ) = ( 1 p i ) a b ,   1 k W 0 1 P ( 0 e , k ) ( 0 e , k ) = ( 1 p i ) ( 1 a b ) ,   1 k W 0 1 P ( 0 , k ) ( 0 e , 0 ) = ( 1 p i ) a b / W 0 ,   1 k W 0 1 P ( 0 e , 0 ) ( 0 e , 0 ) = 1 p i a i ( 1 p i ) a b P ( 0 , 0 ) ( 0 e , 0 ) = p i a i + ( 1 p i ) a b / W 0 P ( j , k 1 ) ( j , k ) = p i ,   0 j M + f , 1 k W j 1 P ( j , k ) ( j , k ) = 1 p i ,   0 j M + f , 1 k W 0 1 P ( 0 , k ) ( j , 0 ) = ( 1 p c ) q / W 0 ,   0 j < M + f , 0 k W 0 1 P ( 0 e , k ) ( j , 0 ) = ( 1 p c ) ( 1 q ) / W 0 ,   0 j < M + f , 0 k W 0 1 P ( j + 1 , k ) ( j , 0 ) = p c / W min ( j + 1 , M ) ,   0 j < M + f , 0 k W 0 1 P ( 0 , k ) ( M + f , 0 ) = q / W 0 ,   0 k W 0 1 P ( 0 e , k ) ( M + f , 0 ) = ( 1 q ) / W 0 ,   0 k W 0 1
Therefore, based on Figure 2 and Equation (2), we can further obtain the following steady-state probabilities, i.e.,
b ( j , 0 ) = ( p c ) j b ( 0 , 0 ) ,   1 j M + f
b ( j , k ) = ( W j k ) ( p c ) j W j p i b ( 0 , 0 )
b ( 0 , 0 ) = ( 1 p c ) j = 0 M + f 1 b ( j , 0 ) + b ( M + f , 0 )
b ( 0 e , 0 ) = b ( 0 , 0 ) 1 q W 0 ( a b + p i a i p i a b ) 1 + k = 1 W 0 1 p i p i a i a b + p i p i a b k
The detail derivation processes of the above expressions are omitted to save space, and interested readers are encouraged to refer to [15,17]. By using the above expressions, we can easily obtain
j = 1 M + f k = 0 W j 1 b ( j , k ) = b ( 0 , 0 ) p c ( p c ) M + f + 1 1 p c + 1 2 p i 2 W 0 p c ( 1 ( 2 p c ) M ) 1 2 p c + W 0 2 M ( p c ) M + 1 ( 1 ( p c ) f ) + ( p c ) M + f + 1 p c 1 p c
k = 0 W 0 1 b ( 0 e , k ) + k = 0 W 0 1 b ( 0 , k ) = 1 + W 0 1 2 p i b ( 0 , 0 ) + 1 + ( W 0 1 ) ( 1 p i ) a b 2 p i b ( 0 e , 0 )
Then, according to the normalization condition for stationary distribution, we have
k = 0 W 0 1 b ( 0 e , k ) + j = 0 M + f k = 0 W j 1 b ( j , k ) = 1
After substituting Equations (6)–(8) into Equation (9), we can obtain
1 b ( 0 , 0 ) = 1 + W 0 1 2 p i + p c ( p c ) M + f + 1 1 p c + 1 q W 0 ( a b + p i a i p i a b ) 1 + ( W 0 1 ) ( 1 p i ) a b 2 p i 1 + k = 1 W 0 1 p i p i a i a b + p i p i a b k     + 1 2 p i 2 W 0 p c ( 1 ( 2 p c ) M ) 1 2 p c + W 0 2 M ( p c ) M + 1 ( 1 ( p c ) f ) + ( p c ) M + f + 1 p c 1 p c
Therefore, the probability that a concerned vehicle transmits in a randomly chosen slot can be expressed as
τ t r a = j = 0 M + f b ( j , 0 ) = 1 ( p c ) M + f + 1 1 p c b ( 0 , 0 )
Then, substituting (10) into (11), we can obtain
τ t r a = 1 ( p c ) M + f + 1 1 p c 1 + W 0 1 2 p i + p c ( p c ) M + f + 1 1 p c + 1 q W 0 ( a b + p i a i p i a b ) 1 + ( W 0 1 ) ( 1 p i ) a b 2 p i     1 + k = 1 W 0 1 p i p i a i a b + p i p i a b k + 1 2 p i 2 W 0 p c ( 1 ( 2 p c ) M ) 1 2 p c + W 0 2 M ( p c ) M + 1 ( 1 ( p c ) f ) + ( p c ) M + f + 1 p c 1 p c 1
where a i and a b are the probabilities of packet arrivals during an idle slot and a busy slot, respectively. If the arrival of a packet obeys Possion distribution, these two values are calculated as
a i = k = 1 ( λ σ ) k k ! e λ σ = 1 ( λ σ ) 0 0 ! e λ σ = 1 e λ σ a b = k = 1 ( λ T b ) k k ! e λ T b = 1 ( λ T b ) 0 0 ! e λ T b = 1 e λ T b
where σ is the duration of an idle slot and T b is the duration of a busy slot. Here, the durations of a successful slot and a collided slot are assumed to be the same for simplicity. In addition, the probability that the channel is idle for the vehicle concerned is calculated as
p i = ( 1 τ t r a ) n 1
where n is the number of vehicles and τ t r a is the transmission probability calculated by Equation (12). Because of the consideration of the capture effect, the probability of a collided transmission in a given slot can be calculated by
p c = k = 1 n 1 1 p c a p ( k + 1 , z 0 ) k + 1 C n 1 k ( τ t r a ) k ( 1 τ t r a ) n k 1
where C n 1 k = ( n 1 ) ! / k ! n k 1 ! and p c a p ( , ) is the occurrence probability of capture effect. According to [45,51], the capture effect occurs at the targeted vehicle if the received signal power from some vehicles is larger than the sum of the others’. For an inference-limited system, the capture condition is γ t / k = 1 , k t n γ k > z 0 , where γ t , γ k and z 0 are the signal power from one vehicle, the interference signal power from the other vehicles, and the capture threshold, respectively. Under the hypothesis of perfect power control, the capture probability conditioned on n 1 interferers ( n 2 ) can be calculated by [51]
p c a p ( n , z 0 ) = n 0 f γ t ( γ t ) Pr γ t / k = 1 , k t n γ k > z 0 d γ t   = n 0 f γ t ( γ t ) 0 γ t / z 0 f γ n 1 ( γ n 1 ) d γ n 1 d γ t
where f γ t ( γ t ) is the instantaneous received power and f γ n 1 ( γ n 1 ) is the ( n 1 )-fold convolution of f γ t ( γ t ) . That the Nakagami-m fading is more suitable to the IoV scenario leads to its wide adoption in the research of VANETs [52]. Therefore, the Nakagami-m fading channel is considered here. Then, f γ t ( γ t ) and f γ n 1 ( γ n 1 ) of (16) can be given by
f γ t ( γ t ) = m m γ t m 1 γ ¯ m Γ ( m ) e m γ t γ ¯ ,   γ 0
f γ n 1 ( γ n 1 ) = m m ( n 1 ) γ ¯ m ( n 1 ) Γ ( m n m ) γ n 1 m ( n 1 ) 1 e m γ n 1 γ ¯
where m [ 1 / 2 , ) is the shape parameter. γ ¯ = P t x C r i α is the average received power determined by transmission power ( P t x ), path-loss exponent ( α ) , and a constant related to the antenna gains ( C ) . Besides, for all vehicles in the network, the carrier frequency and the speed of light are both the same. According to our previous work in [52], the capture probability (i.e., Equation (16)) can be further expressed as
p c a p ( n , z 0 ) = n Γ ( m ) Γ ( m n m ) k = 0 ( 1 ) k Γ ( m n + k ) k ! ( m n m + k ) z 0 m n m + k
According to the numerical method in [17], we can obtain τ t r a and p c by figuring out the equation set (the non-linear system) composed of Equations (12) and (15) after submitting (13) into (12) and (19) into (15), respectively. Though the capture threshold ( z 0 ) and the shape parameter ( m ) of this equation set are given in advance, the probability that there is at least one packet in the vehicle buffer ( q ) is still unknown, which is related to the service intensity ρ determined by the arrival rate of packets and the service rate. Here, we treat each vehicle as an M/M/1/K queue with a first-in-first-out (FIFO) policy (as shown in Figure 3), where the packet arrival of each buffer from the upper layer is a Possion process with rate λ (in packets per second, pkts/s) and the interval of service time for each packet is exponentially distributed with mean value 1 / μ e f f . In addition, for each buffer queue, the maximum length is K (including the packet in service).
According to [53], the probability that the buffer queue of any vehicle is non-empty is given by
q = 1 1 λ p k t μ e f f 1 λ p k t μ e f f K + 1
where ρ = λ p k t μ e f f 1 and the effective packet service rate is given by
μ e f f = μ s u c + μ d i s
where μ s u c (i.e., the maximum service rate of packet successful transmission for a concerned vehicle) is given by
μ s u c = j = 0 n 1 1 j + 1 p c a p ( j + 1 , z t h ) C n 1 j ( τ t r a s a t ) j ( 1 τ t r a s a t ) n j 1 σ a v e s a t
where τ t r a s a t and σ a v e s a t are the average slot time and the transmission probability at saturation, respectively. Moreover, p c a p ( , ) is the capture probability expressed as (19) with additionally p c a p 1 , = 1 (i.e., that only one vehicle transmits leading to a successful transmission). In addition, the rate at which packets are being discarded due to reaching the retry limit can be calculated by
μ d i s = ( p c s a t ) M + f + 1 σ a v e s a t
Since τ t r a s a t , p c s a t , and σ a v e s a t are the values of transmission probability, collision probability and the average length of a virtual slot at saturation, we can substitute ρ = a i = a b = 1 into (12) and numerically solve a non-linear system for their values. The detailed steps for finding these two values can be found in our previous work in [43]. Therefore, after substituting (21), (22) and (23) into (20), the value of q can be obtained by a given value of λ . Finally, the equation set composed of (12) and (15) with unknown parameters τ t r a and p c can be numerically solved with a unique solution.

3.3. Calculation of Normalized Throughput

Let η be the normalized throughput. Since it is the ratio of the duration of successful transmission of the packet payload ( T L p ) to the average length of a virtual slot ( σ a v e ), it can be calculated as
η = p s u c p t r a T L p σ a v e
where T L p = L p R t , L p is the payload of the transmitted packet (which is usually assumed the same for all packets for simplicity) and R t is the data transmission rate. p t r a is the probability that one or more of the vehicles transmit in a certain slot, p s u c denotes the probability that one vehicle successfully transmits in a certain slot on the conditioned that one or more of the vehicles transmit. Then, the average length of a virtual slot can be calculated as
σ a v e = ( 1 p t r a ) σ + p s u c p t r a T s + p t r a ( 1 p s u c ) T c
where σ , T s , T c denote the average durations of an idle slot, successful transmission and collided transmission, respectively. Assume that there are n vehicles competing for transmission in the network; then p t r a can be computed by
p t r a = 1 ( 1 τ t r a ) n
Then, according to (26), p s u c can be calculated by
p s u c = p s p t r a = k = 1 n n ! / ( k ! ( n k ) ! ) ( τ t r a ) k ( 1 τ t r a ) n k p c a p ( i , z ) 1 ( 1 τ t r a ) n
For the basic mode, the average durations of successful transmission and failed transmission are, respectively, computed as
T s b a s = T H + T L p + T S I F S + T A C K + T D I F S + 2 T P D T c b a s = T H + T L p + T D I F S + T P D
where T H is the transmission duration of the packet header including PHY header ( P H Y h d r ) and MAC header ( M A C h d r ). T L p , T S I F S , T D I F S , T A C K and T P D are the durations of a successful transmission of the packet payload, SIFS, DIFS, a successful transmission of ACK and propagation delay, respectively.
For the RTS/CTS mode, the average durations of successful transmission and failed transmission can be computed as
T s r t s = T R T S + T C T S + T H + T L p + T A C K + T D I F S + 3 T S I F S + 4 T P D T c r t s = T R T S + T D I F S + T P D
where T R T S and T C T S are the durations of successful transmissions of RTS and CTS, respectively. Besides this, the other parameters are defined the same as those in Equation (28).

3.4. Calculation of Average Packet Delay

The average packet delay for successfully transmitting a packet is defined as the average time from the start when the packet enters the MAC buffer queue to the end when it is successfully received. Since the M/M/1/K queue system is considered, if a packet from the upper layer is not discarded, it will enter the MAC buffer queue and wait to be transmitted (or be discarded by reaching the retry limit). As a result, it includes two parts, i.e., queue delay ( D q u e ) and MAC delay ( D M A C ). The former is the duration from the moment that this packet enters the MAC queue to the moment it becomes the head of the queue, and the latter is the duration from the moment it becomes the head of the queue to the moment it is successfully received. Therefore, the average packet delay can be calculated as
D a v e = D q u e + D M A C
According to the state transition diagram for an M/M/1/K queue shown in Figure 3, we have
p k + 1 = ρ p k , 0 k < K
where service intensity ρ can be calculated by
ρ = λ p k t μ e f f = λ p k t μ s u c + μ d i s
Then, based on Equation (31), we can obtain
p k = ρ k p 0 , 0 k K
Subsequently, according to the normalization condition, i.e., j = 0 K p j = 1 , the probability that the queue of any vehicle is empty is given by
p 0 = 1 ρ 1 ρ K + 1 , ρ 1 1 K + 1 , ρ = 1
Therefore, combining Equations (33) and (34), the overflow probability of the MAC buffer queue can be expressed as
p o f = ρ K ( 1 ρ ) 1 ρ K + 1 , ρ 1 1 K + 1 , ρ = 1
In fact, for an M/M/1/K queue system, the average number of packets in the queue can be calculated as
L a v e = k = 0 K k p k = 1 ρ 1 ρ K + 1 k = 1 K k p k = ρ 1 ( K + 1 ) ρ K + K ρ K + 1 ( 1 ρ ) ( 1 ρ K + 1 ) , ρ 1
where ρ can be given by (32) and K the given maximum of queue length. It is worth pointing out that L a v e = k = 0 K k p k = 1 K + 1 k = 1 K k = K 2 when ρ = 1 . According to the Little’s formula [49], the average waiting time for a packet in the buffer queue (i.e., queue delay) can be calculated by
D q u e = L a v e λ p k t ( 1 p o f )
where p o f and L a v e can be obtained by Equations (35) and (36).
For the calculation of MAC delay, it can be expressed as
D M A C = j = 0 M + f E [ T ( j ) ] P ( j ) = j = 0 M + f T s + j T c + σ a v e i = 0 j W i 1 2 ( p c ) j ( 1 p c ) 1 ( p c ) M + f + 1
where E [ T ( j ) ] denotes the average delay of successfully transmitting a packet at backoff stage j and P ( j ) denotes the probability of the packet being successfully transmitted at backoff stage j under the premise of not being discarded. p c and σ a v e can be obtained by Equations (15) and (25), respectively. Moreover, W i can be obtained by Equation (1) and T s and T c can be calculated by Equation (28) or (29).
At last, after substituting Equations (37) and (38) into Equation (30), the average packet delay can be expressed as
D a v e = L a v e λ p k t ( 1 p o f ) + j = 0 M + f T s + j T c + σ a v e i = 0 j W i 1 2 ( p c ) j ( 1 p c ) 1 ( p c ) M + f + 1
where p c , σ a v e , T s , T c , p o f , and L a v e can be calculated by Equations (15), (25), (28) (or (29)), (35) and (36), respectively.

4. Model Valuation and Performance Evaluation

To validate the effectiveness of the proposed analytical model, the simulation results are given. For simplicity, the simulation scenario is that all vehicles, which are in the one-hop range of each other, communicate with an RSU, e.g., the V2I communication scenario as shown in Figure 4, like that in [54].
To verify the accuracy of the proposed model, it is compared with Zheng’s model [15] and Malone’s model [18] with one single AC queue for fairness. It is worth pointing out that Zheng’s model is still adopted in their latest work in [55]. Since the transmission rates within the range of 3 and 27 Mbps are supported by IEEE 802.11p [29,50], a 3 Mbps transmission rate is chosen in the simulation. Like in [43], the capture threshold is set to z 0 = 2 , because a smaller value of capture threshold means that the capture effect is much more likely to come up. Moreover, the packet arrival of each buffer, which is a Possion process, is set to λ = 10 pkts/s, because the performance analysis of the DCF is under the hypothesis of an unsaturated condition. The main parameters used are listed in Table 3.

4.1. Transmission Probability and Collision Probability

According to Equations (12) and (15), the transmission probability of the vehicle ( τ t r a ) is related to the minimum contention window ( W 0 ), maximum backoff stage ( M ), retransmission times in the maximum backoff stage ( f ), the number of vehicles ( n ), and the probability of a collided transmission under an unsaturated condition ( p c ). As shown in Figure 5 and Figure 6, with the increase of the number of vehicles, the transmission probability first increases, and then gradually decreases, while the probability of a collided transmission becomes larger and larger. Obviously, this is determined by the characteristics of the DCF protocol.
Under unsaturated conditions, when the number of vehicles is small, the possibility of a collided transmission is also small. Then, the probability of a successful transmission for packets in the buffer queue of vehicles is high, which also means that there are fewer packets waiting to be sent in the buffer queue, or even no packets waiting to be sent sometimes, resulting in a smaller transmission probability. With the increase in the number of vehicles in the network, the possibility of collided transmission increases. As a result, the vehicles need more time to successfully transmit packets, and the number of packets waiting to be transmitted in the buffer queue increases, resulting in the increase in the probability of vehicles transmitting. However, when the number of vehicles increases to a certain value, the transmission probability begins to decrease. The reason is that a high probability of collided transmissions leads to the increased possibility of delayed transmission of vehicles, which results in more time for vehicles to transmit packets, that is, the transmission probability begins to become smaller. As seen from Figure 5, compared with the theoretical results of transmission probabilities calculated by Zheng’s model and Malone’s model, the theoretical values calculated by the proposed model are much closer to the simulation results. The reason is that Malone’s model does not consider the backoff freezing mechanism, which leads to a decrease in the waiting time before transmitting packets and then an increase in the collision probability. Besides, Zheng’s model ignores the influence of capture effect, that is, the capture effect increases the transmission success rate and reduces the waiting time before transmitting packets, and then increases the transmission probability. Therefore, the transmission probabilities obtained by the proposed model, with consideration of the backoff freezing mechanism and the capture effect, are much closer to the actual transmission probabilities.
Similarly, as shown in Figure 6, since the proposed model takes the influence of the capture effect into account, one vehicle may successfully transmit among the collided vehicles. That is to say, the possibility of a collided transmission decreases. As a result, the theoretical probabilities of a collided transmission obtained by the proposed model are closer to the simulation results than that of the other two models. Therefore, when analyzing the performance of DCF (or EDCA), we should fully consider the characteristics of the protocol itself, and consider the influence of the capture effect on the protocol performance in the real IoV environment.

4.2. Normalized Throughput

As shown in Figure 7, the values of normalized unsaturated throughput for the basic access mode under different numbers of vehicles are given. The theoretical values of normalized throughput for all models are calculated by Equation (24). As seen from Figure 7, the normalized throughput first increases with the increase in the number of vehicles, and then decreases with the increase in the number of vehicles after reaching the maximum value of normalized throughput. This is because the number of vehicles competing for channel resources is small at the beginning, and the normalized throughput gradually increases. As more and more vehicles compete for channel resources, the collision intensifies and the channel resource waste becomes more and more serious, which ultimately leads to the decrease in normalized throughput. In fact, the theoretical values of Zheng’s model are much closer to the simulation results than that of Malone’s model, because the former considers the backoff freezing mechanism. However, the theoretical values obtained by the proposed analytical model are much closer to the simulation results, and significantly higher than the theoretical values of other models when the number of vehicles is large. The reason is that the proposed analytical model not only fully considers the characteristics of the DCF protocol itself, but also considers the influence of the capture effect, thus improving the accuracy of the theoretical analysis.
As shown in Figure 8, the values of normalized unsaturated throughput for the RTS/CTS mode first gradually increases and then slowly decreases. In addition, the normalized throughput for the RTS/CTS mode is larger than that for the basic access mode. The reason is that the RTS/CTS mechanism limits the collision to smaller control frames (i.e., RTS and CTS), effectively avoiding the collision of larger packets, thus avoiding the sharp decline in the normalized throughput as the number of vehicles increases. Moreover, when the number of vehicles is large, the theoretical values of normalized throughput obtained by the proposed model are also slightly higher than that of the other models, and much closer to the simulation results. The reason is the same as that of basic access mode. In addition, according to Figure 7 and Figure 8, it can be found that the normalized throughput for the RTS/CTS mode is less affected by the channel than for the basic mode, and with the increase in the number of vehicles, the normalized throughput of the former is significantly greater than that of the latter.

4.3. Average Packet Delay

Figure 9 and Figure 10 give the comparisons between the theoretical values of average packet delay calculated by different analytical models and simulation results for the basic access mode and RTS/CTS mode, respectively. Among them, the theoretical values of the proposed model are calculated by Equation (37), while the theoretical values of Zheng’s model and Malone’s model are calculated by the calculation methods in the corresponding literatures [15,18], respectively. Due to the full consideration of the characteristics of the DCF protocol and the influence of capture effect, the theoretical values of average packet delay calculated by the proposed model are much closer to the simulation results.
In Figure 9, when the number of vehicles increases in the network, more vehicles competing for the wireless channel leads to intensified collision. It makes the vehicles wait for longer to transmit packets successfully, which eventually results in an increase in the average packet delay. Since the backoff freezing mechanism is ignored in Malone’s model, the collision probability calculated by this model increases, which means that the possibility of collided transmissions is amplified. Therefore, one vehicle needs more time to successfully transmit a packet, resulting in a larger average packet delay. Since both Zheng’s model and the proposed model take the backoff freezing mechanism into account, the theoretical values of average packet delay calculated by these two models are smaller than that of Malone’s model. However, compared with Zheng’s model, the theoretical values obtained by the proposed model are much closer to the simulation results, because the proposed model not only considers the influence of capture effect, but also the queuing delay.
Similarly, as shown in Figure 10, in the RTS/CTS mode, the average packet delay gradually increases along with the increase in the number of vehicles. Moreover, the theoretical values of the proposed model are much closer to the simulation results than that of the other two models, which further shows the accuracy of the proposed model. In addition, combined with Figure 9 and Figure 10, it can be found that the average packet delay for the RTS/CTS mode is lower than that for the basic access mode under the same simulation parameters. This is because the RTS/CTS mechanism limits collisions to smaller control frames (i.e., RTS and CTS), effectively avoiding collisions between larger packets.

5. Conclusions

In this paper, a novel analytical model of IEEE 802.11p/bd DCF with consideration of the capture effect under a Nakagami-m fading channel is proposed, which is more accurate than the existing analytical models and better suited to the IoV scenario. All the important characteristics of the DCF protocol and the capture effect under the Nakagami-m fading channel are considered in the proposed model. The accuracy of the proposed model is verified by comparison between the simulations and the analytical results, which show that the proposed model is more accurate than the existing ones, and the normalized unsaturated throughput with consideration of the capture effect is higher than that without a consideration of the capture effect. In addition, the average packet delay decreases, benefiting from the capture effect. As a result, when analyzing the DCF protocol in different communication scenarios or designing improved MAC protocols based on the DCF (or EDCA), the capture effect must be considered to make the MAC protocols more effective in real IoV scenarios. Furthermore, since the EDCA is based on the DCF with different ACs, the proposed analytical model can be easily extended to the performance analysis of the EDCA in IoV, which will be discussed in our future work.

Author Contributions

Conceptualization, Y.W. and J.S.; methodology, Y.W. and L.C.; software, Y.W.; validation, J.S. and L.C.; formal analysis, Y.W. and Z.F.; investigation, J.S.; writing—original draft preparation, Y.W.; writing—review and editing, Y.W. and Z.F.; supervision, J.S.; project administration, J.S.; funding acquisition, L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Science and Technology Key Project of Fujian Province (Grant No. 2021HZ021004).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Author Zhiyuan Fang was employed by the company China Mobile Communications Group Shanxi Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Ning, H.; An, Y.; Wei, Y.; Wu, N.; Mu, C.; Cheng, H.; Zhu, C. Modeling and analysis of traffic warning message dissemination system in VANETs. Veh. Commun. 2023, 39, 100566. [Google Scholar] [CrossRef]
  2. Wu, Q.; Zheng, J. Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks. Wirel. Netw. 2016, 22, 799–812. [Google Scholar] [CrossRef]
  3. Wu, G.; Wang, H.; Zhang, H.; Zhao, Y.; Yu, S.; Shen, S. Computation offloading method using stochastic games for software-defined-network-based multiagent mobile edge computing. IEEE Internet Things J. 2023, 10, 17620–17634. [Google Scholar] [CrossRef]
  4. Wu, G.; Xu, Z.; Zhang, H.; Shen, S.; Yu, S. Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT. J. Parallel Distrib. Comput. 2023, 176, 80–94. [Google Scholar] [CrossRef]
  5. Zhang, P.; Chen, N.; Shen, S.; Yu, S.; Kumar, N.; Hsu, C.H. AI-enabled space-air-ground integrated networks: Management and optimization. IEEE Netw. 2023; early access. [Google Scholar] [CrossRef]
  6. Wang, C.; Jiang, C.; Wang, J.; Shen, S.; Guo, S.; Zhang, P. Blockchain-aided network resource orchestration in intelligent internet of things. IEEE Internet Things J. 2022, 10, 6151–6163. [Google Scholar] [CrossRef]
  7. Wu, G.; Chen, X.; Gao, Z.; Zhang, H.; Yu, S.; Shen, S. Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADR. J. Parallel Distrib. Comput. 2024, 183, 104775. [Google Scholar] [CrossRef]
  8. Guo, H.; Zhou, X.; Liu, J.; Zhang, Y. Vehicular intelligence in 6G: Networking, communications, and computing. Veh. Commun. 2022, 33, 100399. [Google Scholar] [CrossRef]
  9. Yang, Y.; Wei, L.; Wu, J.; Long, C.; Li, B. A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J. 2022, 9, 8078–8090. [Google Scholar] [CrossRef]
  10. Wu, Q.; Wang, X.; Fan, Q.; Fan, P.; Zhang, C.; Li, Z. High stable and accurate vehicle selection scheme based on federated edge learning in vehicular networks. China Commun. 2023, 20, 1–17. [Google Scholar] [CrossRef]
  11. Long, D.; Wu, Q.; Fan, Q.; Fan, P.; Li, Z.; Fan, J. A power allocation scheme for MIMO-NOMA and D2D vehicular edge computing based on decentralized DRL. Sensors 2023, 23, 3449. [Google Scholar] [CrossRef] [PubMed]
  12. Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the internet of vehicles: Network architectures and applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
  13. Wu, Q.; Wang, S.; Ge, H.; Fan, P.; Fan, Q.; Letaief, K.B. Delay-sensitive task offloading in vehicular fog computing-assisted platoons. IEEE Trans. Netw. Serv. Man. 2023; early access. [Google Scholar] [CrossRef]
  14. Wu, Q.; Zhao, Y.; Fan, Q.; Fan, P.; Wang, J.; Zhang, C. Mobility-aware cooperative caching in vehicular edge computing based on asynchronous federated and deep reinforcement learning. IEEE J. Sel. Top. Signal Process. 2023, 17, 66–81. [Google Scholar] [CrossRef]
  15. Zheng, J.; Wu, Q. Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Trans. Veh. Technol. 2016, 65, 2673–2688. [Google Scholar] [CrossRef]
  16. Wu, Z.; Bartoletti, S.; Martinez, V.; Todisco, V.; Bazzi, A. Analysis of co-channel coexistence mitigation methods applied to IEEE 802.11p and 5G NR-V2X sidelink. Sensors 2023, 23, 4337. [Google Scholar] [CrossRef] [PubMed]
  17. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  18. Malone, D.; Duffy, K.; Leith, D. Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw. 2007, 15, 159–172. [Google Scholar] [CrossRef]
  19. Madhavi, T.; Rao, G.S.B. Modelling collision alleviating DCF protocol with finite retry limits. Electron. Lett. 2015, 51, 185–187. [Google Scholar] [CrossRef]
  20. Weng, C.E.; Chen, H.C. The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. Comput. Stand. Inter. 2016, 44, 144–149. [Google Scholar] [CrossRef]
  21. Song, C.; Tan, G.; Yu, C. An efficient and QoS supported multichannel MAC protocol for vehicular ad hoc networks. Sensors 2017, 17, 2293. [Google Scholar] [CrossRef] [PubMed]
  22. Vardakas, J.S.; Sidiropoulos, M.K.; Logothetis, M.D. Performance behaviour of IEEE 802.11 distributed coordination function. IET Circ. Devices Syst. 2008, 2, 50–59. [Google Scholar] [CrossRef]
  23. Xie, Y.; Ho, I.W.H.; Magsino, E.R. The modeling and cross-layer optimization of 802.11p VANET unicast. IEEE Access 2017, 6, 171–186. [Google Scholar] [CrossRef]
  24. Han, C.; Dianati, M.; Tafazolli, R.; Kernchen, R.; Shen, X.S. Analytical study of the IEEE 802.11p MAC sublayer in vehicular networks. IEEE Trans. Intell. Transp. Syst. 2012, 13, 873–886. [Google Scholar] [CrossRef]
  25. Yao, Y.; Rao, L.; Liu, X. Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE Trans. Veh. Technol. 2013, 62, 4198–4212. [Google Scholar] [CrossRef]
  26. Cao, S.; Lee, V.C.S. An accurate and complete performance modeling of the IEEE 802.11p MAC sublayer for VANET. Comput. Commun. 2020, 149, 107–120. [Google Scholar] [CrossRef]
  27. Zhang, Y.; Li, S.; Shang, Z.; Zhang, Q. Performance analysis of IEEE 802.11 DCF under different channel conditions. In Proceedings of the IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 24–26 May 2019; pp. 1–4. [Google Scholar]
  28. Peng, H.; Li, D.; Abboud, K.; Zhou, H.; Zhao, H.; Zhuang, W.; Shen, X. Performance analysis of IEEE 802.11p DCF for multiplatooning communications with autonomous vehicles. IEEE Trans. Veh. Technol. 2017, 66, 2485–2498. [Google Scholar] [CrossRef]
  29. Almohammedi, A.A.; Shepelev, V. Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel. IEEE Access 2021, 9, 14459–14469. [Google Scholar] [CrossRef]
  30. Peng, J.; Li, S.; Dou, Z.; Yang, S. Optimization design and performance analysis of improved IEEE 802. 11p MAC mechanism based on high mobility of vehicle. Math. Probl. Eng. 2022, 2022, 8974673. [Google Scholar] [CrossRef]
  31. Alshanyour, A.; Agarwal, A. Three-Dimensional Markov chain model for performance analysis of the IEEE 802.11 distributed coordination function. In Proceedings of the 2009 IEEE Global Telecommunications Conference (GLOBECOM), Honolulu, HL, USA, 30 November–4 December 2009; pp. 1–7. [Google Scholar]
  32. Martorell, G.; Femenias, G.; Riera-Palou, F. Non-saturated IEEE 802.11 networks: A hierarchical 3D Markov model. Comput. Netw. 2015, 80, 27–50. [Google Scholar] [CrossRef]
  33. Wang, N.; Hu, J. Performance analysis of the IEEE 802.11p EDCA for vehicular networks in imperfect channels. In Proceedings of the IEEE 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS), London, UK, 20–22 December 2021; pp. 535–540. [Google Scholar]
  34. Harkat, Y.; Amrouche, A.; Lamini, E.S.; Kechadi, M.T. Modeling and performance analysis of the IEEE 802.11p EDCA mechanism for VANET under saturation traffic conditions and error-prone channel. AEU-Int. J. Electron. Commun. 2019, 101, 33–43. [Google Scholar] [CrossRef]
  35. Li, S.; Li, H.; Gaber, J.; Yang, S.; Yang, Q. Performance analysis of IEEE 802.11p protocol in IoV under error-prone channel conditions. Secur. Commun. Netw. 2023, 2023, 5476836. [Google Scholar] [CrossRef]
  36. Shah, A.F.M.S.; Ilhan, H.; Tureli, U. Modeling and performance analysis of the IEEE 802.11 MAC for VANETs under capture effect. In Proceedings of the IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Sofia, Bulgaria, 8–9 April 2019; pp. 1–5. [Google Scholar]
  37. Lei, L.; Zhang, T.; Zhou, L.; Song, X.; Cai, S. Saturation throughput analysis of IEEE 802.11 DCF with heterogeneous node transmit powers and capture effect. Int. J. Ad Hoc Ubiquitous Comput. 2017, 26, 1–11. [Google Scholar] [CrossRef]
  38. Daneshgaran, F.; Laddomada, M.; Mesiti, F.; Mondin, M.; Zanolo, M. Saturation throughput analysis of IEEE 802.11 in the presence of non ideal transmission channel and capture effects. IEEE Trans. Commun. 2008, 56, 1178–1188. [Google Scholar] [CrossRef]
  39. Daneshgaran, F.; Laddomada, M.; Mesiti, F.; Mondin, M. Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects. IEEE Trans. Wirel. Commun. 2008, 7, 1276–1286. [Google Scholar] [CrossRef]
  40. Han, H.; Pei, Z.; Zhu, W.; Li, N. Saturation throughput analysis of IEEE 802.11b DCF considering capture effects. In Proceedings of the 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  41. Sutton, G.J.; Liu, R.; Collings, I.B. Modelling IEEE 802.11 DCF heterogeneous networks with Rayleigh fading and capture. IEEE Trans. Commun. 2013, 61, 3336–3348. [Google Scholar] [CrossRef]
  42. Leonardo, E.J.; Yacoub, M.D. Exact formulations for the throughput of IEEE 802.11 DCF in Hoyt, Rice, and Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2013, 12, 2261–2271. [Google Scholar] [CrossRef]
  43. Wang, Y.; Shi, J.; Chen, L. Performance Analysis of IEEE 802.11p MAC with considering capture effect under Nakagami-m fading channel in VANETs. Entropy 2023, 25, 218. [Google Scholar] [CrossRef]
  44. Zhao, H.; Garcia-Palacios, E.; Wang, S.; Wei, J.; Ma, D. Evaluating the impact of network density, hidden nodes and capture effect for throughput guarantee in multi-hop wireless networks. Ad Hoc Netw. 2013, 11, 54–69. [Google Scholar] [CrossRef]
  45. Sun, X. Maximum throughput of CSMA networks with capture. IEEE Wirel. Commun. Lett. 2016, 6, 86–89. [Google Scholar] [CrossRef]
  46. Cheng, L.; Henty, B.E.; Stancil, D.D.; Bai, F.; Mudalige, P. Mobile vehicle-to-vehicle narrow-band channel measurement and characterization of the 5.9 GHz dedicated short range communication (DSRC) frequency band. IEEE J. Sel. Areas Commun. 2007, 25, 1501–1516. [Google Scholar] [CrossRef]
  47. Bharati, S.; Zhuang, W.; Thanayankizil, L.V.; Bai, F. Link-layer cooperation based on distributed TDMA MAC for vehicular networks. IEEE Trans. Veh. Technol. 2016, 66, 6415–6427. [Google Scholar] [CrossRef]
  48. Ravi, B.; Thangaraj, J.; Petale, S. Data traffic forwarding for inter-vehicular communication in VANETs using stochastic method. Wirel. Pers. Commun. 2019, 106, 1591–1607. [Google Scholar] [CrossRef]
  49. Ghosh, A.; Paranthaman, V.V.; Mapp, G.; Gemikonakli, O.; Loo, J. Enabling seamless V2I communications: Toward developing cooperative automotive applications in VANET systems. IEEE Commun. Mag. 2015, 53, 80–86. [Google Scholar] [CrossRef]
  50. Bazzi, A.; Masini, B.M.; Zanella, A.; Thibault, I. On the performance of IEEE 802.11p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Trans. Veh. Technol. 2017, 66, 10419–10432. [Google Scholar] [CrossRef]
  51. Sanchez-Garcia, J.; Smith, D.R. Capture probability in Rician fading channels with power control in the transmitters. IEEE Trans. Commun. 2002, 50, 1889–1891. [Google Scholar] [CrossRef]
  52. Wang, Y.; Shi, J.; Chen, L.; Lu, B.; Yang, Q. A novel capture-aware TDMA-based MAC protocol for safety messages broadcast in vehicular ad hoc networks. IEEE Access. 2019, 7, 116542–116554. [Google Scholar] [CrossRef]
  53. Kleinrock, L. Queueing Systems, Vol. 1: Theory; John Wiley & Sons: Hoboken, NJ, USA, 1975; ISBN 9780471555971. [Google Scholar]
  54. Wu, Q.; Shi, S.; Wan, Z.; Fan, Q.; Fan, P.; Zhang, C. Towards V2I age-aware fairness access: A DQN based intelligent vehicular node training and test method. Chinese J. Electron. 2023, 32, 1230–1244. [Google Scholar]
  55. Wang, B.; Zheng, J.; Ren, Q.; Li, C. Analysis of IEEE 802.11p-based intra-platoon message broadcast delay in a platoon of vehicles. IEEE Trans. Veh. Technol. 2023, 72, 13417–13429. [Google Scholar] [CrossRef]
Figure 1. Heterogeneous vehicular communications structure.
Figure 1. Heterogeneous vehicular communications structure.
Sensors 23 09589 g001
Figure 2. The proposed 2-D Markov chain model.
Figure 2. The proposed 2-D Markov chain model.
Sensors 23 09589 g002
Figure 3. State transition diagram for an M/M/1/K queue.
Figure 3. State transition diagram for an M/M/1/K queue.
Sensors 23 09589 g003
Figure 4. V2I communication scenario.
Figure 4. V2I communication scenario.
Sensors 23 09589 g004
Figure 5. Transmission probability.
Figure 5. Transmission probability.
Sensors 23 09589 g005
Figure 6. Collision probability.
Figure 6. Collision probability.
Sensors 23 09589 g006
Figure 7. Normalized unsaturated throughput for basic access mode.
Figure 7. Normalized unsaturated throughput for basic access mode.
Sensors 23 09589 g007
Figure 8. Normalized unsaturated throughput for RTS/CTS mode.
Figure 8. Normalized unsaturated throughput for RTS/CTS mode.
Sensors 23 09589 g008
Figure 9. Average packet delay for basic access mode.
Figure 9. Average packet delay for basic access mode.
Sensors 23 09589 g009
Figure 10. Average packet delay for RTS/CTS mode.
Figure 10. Average packet delay for RTS/CTS mode.
Sensors 23 09589 g010
Table 1. List of abbreviations.
Table 1. List of abbreviations.
AbbreviationDefinition
2-DTwo-dimensional
3-DThree-dimensional
ACAccess category
ACKAcknowledgement
BEBBinary exponential backoff
BERBit error ratio
BSBase station
CSMA/CACarrier sense multiple access with collision avoidance
DCFDistributed coordination function
DIFSDistributed inter frame space
EDCAEnhanced distributed channel access
EDCAFEnhanced distributed channel access function
FIFOFist-in-first-out
GWGateway
HSHot spot
IoVInternet of vehicles
MACMedium access control
NAVNetwork allocation vector
PHYPhysical
RSURoad-side unit
RTS/CTSRequest-to-send/clear-to-send
SIFSShort inter-frame space
TXOPTransmission opportunity
VANETVehicular ad hoc network
V2IVehicle-to-infrastructure
V2NVehicle-to-network
V2PVehicle-to-pedestrian
V2VVehicle-to-vehicle
Table 2. Notions used in the proposed analytical model.
Table 2. Notions used in the proposed analytical model.
NotionDefinition
W j Contention window of backoff stage j
C W m i n Minimum contention window
C W m a x Maximum contention window
M Maximum backoff stage
f Retransmission times in the maximum backoff stage
σ Duration of a backoff slot
λ p k t Packet arrival rate of upper layer
λ e f f Effective packet arrival rate
q The probability that the cache queue is not empty
a b The probability of packet arrival when the channel is busy
a i The probability of a packet arriving when the channel is idle
p i The probability that the channel is idle during one backoff slot
τ t r a Transmission probability under unsaturated condition
τ t r a s a t Transmission probability under saturated condition
p t r a The probability that at least one vehicle transmits
p s The probability of successful transmission under unsaturated condition
p c The probability of collided transmission under unsaturated condition
p c s a t The probability of collided transmission under saturated condition
p s The probability of successful transmission when at least one vehicle transmits
z t h Capture threshold
m The parameter of Nakagami fading
p c a p The probability of capture effect
σ a v e Duration of the virtual slot under unsaturated condition
T b Duration of busy channel
T s Average time for successful transmission
T c Average time for collided transmission
μ e f f Effective service rate of packets
μ s u c Service rate of successfully transmitted packets
μ d i s Overflow rate of packets
ρ Service intensity
p k Steady-state probability when the queue length is k
L p The length of payload
T s L p The time required to successfully transmit the payload
R t The data rate
R b Basic transmission rate
p o f Overflow probability of cache queue
D q u e Queue delay
D M A C Delay of MAC layer
L a v e Average number of packets in the cache queue
D a v e Average packet delay
n Number of vehicles
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParametersSetting
L p 1024 bytes
M A C h d r 224 bits
P H Y h d r 192 bits
ACK304 bits
RTS352 bits
CTS304 bits
T S I F S 32 μ s
T D I F S 58 μ s
σ 13 μ s
T P D 2 μ s
R t 3 Mbps
m 1.5
z t h 2
W 0 32
W M 1024
M 5
f 2
λ p k t 10 pkts/s
Simulation time200 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Shi, J.; Fang, Z.; Chen, L. A Novel Analytical Model for the IEEE 802.11p/bd Medium Access Control, with Consideration of the Capture Effect in the Internet of Vehicles. Sensors 2023, 23, 9589. https://0-doi-org.brum.beds.ac.uk/10.3390/s23239589

AMA Style

Wang Y, Shi J, Fang Z, Chen L. A Novel Analytical Model for the IEEE 802.11p/bd Medium Access Control, with Consideration of the Capture Effect in the Internet of Vehicles. Sensors. 2023; 23(23):9589. https://0-doi-org.brum.beds.ac.uk/10.3390/s23239589

Chicago/Turabian Style

Wang, Yang, Jianghong Shi, Zhiyuan Fang, and Lingyu Chen. 2023. "A Novel Analytical Model for the IEEE 802.11p/bd Medium Access Control, with Consideration of the Capture Effect in the Internet of Vehicles" Sensors 23, no. 23: 9589. https://0-doi-org.brum.beds.ac.uk/10.3390/s23239589

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop