Clustering-Based Multichannel Mac Protocols For Qos Provisionings Over Vehicular Ad Hoc Networks
Clustering-Based Multichannel Mac Protocols For Qos Provisionings Over Vehicular Ad Hoc Networks
Clustering-Based Multichannel Mac Protocols For Qos Provisionings Over Vehicular Ad Hoc Networks
Abstract—Making the best use of the Dedicated Short Range (V2V) communication capability will allow large-scale sens-
Communications multichannel architecture, we propose a cluster- ing, decision, and control actions in support of these objec-
based multichannel communications scheme that can support not tives. The allocation of 75 MHz in the 5.9-GHz band that is
only public-safety message delivery but also a wide range of future
multimedia (e.g., video/audio) and data (e.g., e-maps, road/vehicle licensed for Dedicated Short-Range Communications (DSRC)
traffic/weather information) applications. Our proposed scheme [1], which supports seven separate channels, may also enable
integrates clustering with contention-free and/or -based medium the future delivery of rich multimedia contents to vehicles at
access control (MAC) protocols. In our scheme, the elected cluster- short-to-medium range via either V2V or vehicle-to-roadside
head vehicle functions as the coordinator to collect/deliver real- (V2R) links in Vehicular Ad Hoc NETworks (VANETs).
time safety messages within its own cluster and forward the
consolidated safety messages to the neighboring cluster heads. In While there has been a large body in the literature studying
addition, the cluster-head vehicle controls channel assignments both V2V [2]–[6] and V2R [7], [8] networks, there are several
for cluster-member vehicles transmitting/receiving nonreal-time advantages of using V2V-based VANETs as compared with the
traffics, which makes the wireless channels more efficiently utilized V2R-based VANETs. First, the V2V-based VANET is more
for vehicle-to-vehicle (V2V) nonreal-time data transmissions. Our flexible and independent of the roadside conditions, which is
scheme uses the contention-free MAC within a cluster and the
contention-based IEEE 802.11 MAC among cluster-head vehicles particularly attractive for most developing countries or remote
such that the real-time delivery of safety messages can be guar- rural areas where roadside infrastructures are not necessarily
anteed. Under our proposed scheme, we develop an analytical available/furnished. Second, V2V-based VANET is less expen-
model to study the delay for the consolidated safety messages sive than the V2R-based one since it does not need expensive
transmitted by the cluster-head vehicles. Based on this analytical roadside infrastructures. Third, V2V-based VANET can avoid
model, we derive the desirable contention-window size, which can
best balance the tradeoff between the delay of safety messages and the fast fading, short connectivity time, high frequent handoffs,
the successful rate of delivering safety messages. The extensive etc., that are caused by the high relative-speed difference be-
simulation results show that, under various highway traffic scenar- tween the fast-moving vehicles and the stationary base stations.
ios, our proposed scheme can efficiently support the nonreal-time Finally, the V2V-based VANET much better fits vehicle-related
traffics while guaranteeing the real-time delivery of the safety applications, which only needs to exchange data/information
messages.
among neighboring vehicles within their nearby areas. Moti-
Index Terms—Clustering algorithms, Dedicated Short-Range vated by the aforementioned observations, in this paper, we will
Communications (DSRC), multichannel medium-access control focus on V2V-based VANETs.
(MMAC), protocol designs, time–division multiple access
(TDMA), vehicle-to-vehicle (V2V) communications, vehicular The data that are transmitted over the VANETs can be
ad hoc networks (VANETs). classified into real-time (such as safety messages and video/
audio signals) and nonreal-time traffics (such as e-maps and
road/vehicle–traffic/weather information), which impose the
I. I NTRODUCTION
diverse quality of service (QoS) requirements for VANET
Fig. 1. Our proposed cluster-based multichannel communications architecture. The vehicles in white color represent the elected cluster-head vehicles, and the
radio-wave symbol indicates that two vehicles are performing point-to-point communication.
arbitrate the communications between the cluster-head and head; 2) quasi-cluster head; 3) cluster member; and 4) quasi-
cluster-member vehicles within a given cluster. Each cluster- cluster member.
head vehicle collects/delivers safety messages and assigns ICD/ The functions of the four states are described as follows:
CRD channels to cluster members by using contention-free First, in the state of CH, the vehicle’s Transceiver I works on
MAC protocol over the CRC channel. Each cluster-member the ICC channel to forward consolidated safety messages to the
vehicle uses one transceiver to exchange the safety messages neighboring clusters, and the Transceiver II is tuned to the CRC
with its cluster-head vehicle. Meanwhile, the cluster-member channel to collect/broadcast safety messages from/to cluster
vehicle uses another transceiver to communicate with its peer members. Second, the quasi-cluster-head state represents that
vehicle within the same cluster over the CRD channel that is this vehicle is neither a cluster head nor a cluster member. In
assigned by its cluster-head vehicle. the quasi-cluster-head state, while Transceiver II is turned off,
the Transceiver I of the vehicle works on the ICC channel, so
that it can also receive and send the safety messages. In fact,
III. F UNCTIONS AND D ESIGNS OF P ROTOCOLS
the quasi-cluster-head vehicles function as real cluster heads,
A finite-state machine (FSM), as shown in Fig. 3, is em- except for the ability in forming clusters.
ployed to precisely describe the principle and operating process Third, when entering the cluster-member state, the vehi-
of our proposed scheme. Each vehicle operates under one and cles tune their Transceiver II’s to the CRC channel where
only one of the following four states at any given time: 1) cluster the cluster-member vehicles receive the consolidated safety
3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
employs a scheduling scheme over the CRC channel to cording to N number of vehicles in the cluster. This TDMA
collect/broadcast safety messages and coordinate the cluster- schedule is broadcast back to the cluster-member vehicles in
member vehicles to transfer nonreal-time data within/between the cluster. Second, the cluster members send safety mes-
cluster(s). In the CRC channel, time is partitioned into regular sages and data channel reservation requests to the cluster head
time intervals with equal lengths of T , which is called the during their own assigned time slots. Third, the cluster-head
“repetition period.” Fig. 4 shows the time division in the CRC vehicle consolidates the safety messages that were collected
channel. The repetition period consists of the TDMA upstream from both its cluster members and neighboring cluster heads,
period that is denoted by Tt and broadcast downstream period and makes a decision on the assignment of ICD and CRD
that is denoted by Tb . The length of the time slot that is assigned channels according to the data reservation requests. Then, the
to each member within a cluster, which is denoted by tslot , can cluster-head vehicle broadcasts consolidated safety messages
be determined by and data channel assignments back to the cluster members.
Finally, the cluster-member vehicles switch their Transceiver I
Tt to the assigned channel transmitting/receiving the nonreal-time
tslot = (1)
N traffics. Because only two cluster members are assigned to op-
erate over the same CRD channels, they can use point-to-point
where N is the number of cluster members within the cluster.
communication without any contention. Note that the nonreal-
The TDMA scheme can guarantee that each vehicle within a
time traffics and safety messages can be served concurrently in
cluster has a chance to transmit data every T time unit. Hence, if
our scheme due to two sets of transceivers that are used.
we denote the update interval of safety messages by Tupdate , the
required delivery delay of safety messages by Tsafety , the size
of the safety message by Hsafety , and the channel rate by R, C. Intercluster Communication Protocol
then the timely delivery of the safety messages can be achieved
when the following conditions hold: In the Intercluster Communication Protocol, two types of
traffics are served on two separate channels between clusters:
T < min T 1 1) the real-time safety messages over the ICC channel and
update , 2Tsafety
. (2) 2) the nonreal-time traffic over the ICD channel. On one hand,
R ≥ Hsafety cluster heads, quasi-cluster heads, and quasi-cluster members
tslot
use contention-based protocols (e.g., IEEE 802.11) to share the
Research states that the driver reaction time to traffic warning ICC channel. After the cluster-head vehicles collect the safety
signals, such as brake lights, can be on the order of 700 ms and messages from their own clusters, they use the data fusion
longer [13]. Consequently, the update interval of safety mes- technique to consolidate the safety information and then con-
sages should be less than 500 ms. Otherwise, the safety system tend for the ICC channel to forward the processed information
is useless in helping the driver deal with emergency situations. to the neighboring cluster heads. The transmission range for
Hence, a safety message of 200 bytes is typically updated the Intercluster Communication Protocol, which is denoted by
every 500 ms and should be delivered before the generation of LI (see Fig. 1), depends on the intracluster communication
the next new message. Therefore, we set Hsafety = 200 bytes, range. To let two nearby neighboring cluster-head vehicles to
Tupdate = 200 ms, Tsafety = 200 ms, and T = 80 ms in this communicate in one hop, LI ≥ 2LC should hold.
paper. On the other hand, applying the Intracluster Coordination
The operating procedure of the Intracluster Coordination and and Communication Protocol, one vehicle is assigned to the
Communication Protocol can be divided into the following ICD channel in each cluster. By employing the contention-
four phases: First, each cluster-head vehicle creates a TDMA based MAC, those vehicles from different clusters contend for
schedule specifying each vehicle when it can transmit ac- the common ICD channel to transmit/receive the nonreal-time
3314 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
traffic packets between clusters. They work as gateways to for the delivery of safety message. Without the help of the
forward the packets for the other cluster-member vehicles. GPS, our proposed scheme utilizes the cluster head as the
local centralized controller to achieve synchronization among
all cluster-member vehicles within the cluster.
D. Remarks on the Protocol Designs
1) Interference Between Multiple Clusters: The preceding
IV. D ELAY M ODELING FOR D ELIVERY
discussion describes how the individual clusters communicate
OF S AFETY M ESSAGES
among cluster-member vehicles in that cluster. However, the
transmitted signal in one cluster will affect communications in The most important performance metrics for our proposed
a neighboring cluster since the radio medium is inherently a scheme is the transmission delay of the safety messages. Under
broadcast medium. To reduce this type of interference, different our proposed scheme, the safety messages that are generated
clusters communicate with the different code-division multiple- by the cluster-member vehicles are mainly delivered via three
access (CDMA) codes. Thus, when a vehicle decides to become hops (corresponding to their longest path/delay), which consist
a cluster head, it chooses randomly from a list of CDMA of the transmission over the CRC channel from the cluster-
codes. It informs all the cluster-member vehicles within its member vehicle to its cluster-head vehicle, the transmission
cluster to transmit with this CDMA code during the exchange over the ICC channel from this cluster-head vehicle to its
of ITJ/RTJ packets. The cluster head then filters all received neighboring cluster-head vehicle, and the transmission over the
energy using the given CDMA code. Thus, the neighboring CRC channel from this neighboring cluster-head vehicle to its
cluster’s radio signals will be filtered out without corrupting the targeted cluster-member vehicle in the neighboring cluster. In
data transmissions between vehicles in the cluster. terms of delay bound guarantees, the delays of the first and
2) Why Does the Intracluster Communication Use the third transmissions are upper bounded by using the contention-
TDMA Scheme, Instead of the IEEE 802.11 MAC?: The stan- free TDMA-based MAC protocol, while the second-hop trans-
dard of the IEEE 802.11 protocol provides detailed MAC and mission is achieved through the contention-based IEEE 802.11
Physical layer (PHY) specifications. Being a contention-based MAC protocol and thus is not delay-bound guaranteed. Since
MAC protocol, the IEEE 802.11 degrades its performance due the delays that are caused by the first and third transmissions
to the limitations caused in V2V communications, such as are deterministically upper bounded and thus are much easier to
blocking problem, lack of stability because of high mobility, derive, we will only concentrate on delay modeling and analy-
and delay insensitivity. Among them, delay insensitivity is ses of the second-hop transmission by applying the stochastic
the major concern for V2V communications, where the safety analyses. To formally formulate the delay modeling problem,
messages must be delivered within a bounded delay. we define V (t) as the set of vehicles in the VANET at time t.
On the other hand, although the IEEE 802.11e is a QoS- We then further partition V (t) into two sets: 1) the set of
oriented MAC protocol, it is still not suitable for safety message cluster heads C(t) and 2) the set of noncluster-head nodes
delivery in V2V communications due to the following reasons: V (t) \ C(t).2 For a cluster head i ∈ C(t), we let CHi (t) be set
First, the randomness of the binary backoff mechanism in the of the cluster-member vehicles that belong to the cluster that is
enhanced distributed coordination function (EDCF) mode of associated with cluster-head vehicle i at time t. We define Bi
the IEEE 802.11e leads to random variation of delay [14], as the set of cluster-head vehicles that are operating on the ICC
which is not tolerable for the delay-sensitive applications of channel and within the broadcast area that is covered by cluster-
V2V communications. Second, in heavily loaded networks, head vehicle i, and Hi as the set of cluster-head vehicles that are
the IEEE 802.11e chooses larger initial backoff counter or the hidden terminals from cluster-head vehicle i.
interframe spacing intervals, resulting in the increase of av- Let l and k be two cluster-member vehicles, which belong
erage access delay. Finally, the collision probability shoots to two different clusters under cluster-head vehicle i and
up significantly as the number of packets with the same pri- cluster-head vehicle j, respectively, where cluster-head vehicles
ority contending for the wireless shared media increases. In i and j are located within each other’s radio transmission range.
V2V communications, this kind of scenario may often happen, This implies that l ∈ CHi (t) and k ∈ CHj (t) with j ∈ Bi and
because the safety messages of each vehicle have the same i ∈ Bj . Then, based on our proposed scheme, we can derive
priority. the average delay that is spent to send a safety message from
Considering that the contention-based MAC protocols cluster-member vehicle l to cluster-member vehicle k, which is
(l,k)
cannot guarantee the bounded delay, contention-free MAC denoted by T d , as follows:
protocols, such as TDMA, are more suitable for delay-sensitive
(l,k) (l,i) (i,j) (j,k)
V2V communications. A set of TDMA-based MAC proto- Td = T m2h + T h2h + T h2m (3)
cols have been proposed to avoid the inherent randomness
(l,i)
and delay unpredictability of the IEEE 802.11. The Universal where T m2h is the average delay for a safety message that
mobile telecommunications system Terrestrial Radio Access is sent from the cluster-member vehicle l to its cluster-head
(j,k)
with Time Division Duplexing (UTRA-TDD) was proposed vehicle i, T h2m is the average delay for a safety message
for the Fleenet project [6]. The UTRA-TDD is a distributed that is sent from cluster-head vehicle j to its cluster-member
TDMA technology where Global Positioning System (GPS)
helps achieve synchronization between vehicles. In this paper, 2 For convenience, we use vehicle, node, and terminal interchangeably in the
we also use the TDMA-based scheme as the MAC protocol rest of this paper.
SU AND ZHANG: CLUSTERING-BASED MMAC PROTOCOLS FOR QoS PROVISIONINGS OVER VANETs 3315
(i,j)
vehicle k, and T h2h is the average time that is spent by cluster-
head vehicle i to send the consolidated safety message from
cluster-head vehicle i to its neighboring cluster-head vehicle j.
Note that cluster-head vehicle i must use the ICC channel to
broadcast the consolidated safety messages to its neighboring
cluster-head vehicles. If we define si as the average time that
is spent by cluster-head vehicle i to broadcast the consolidated
safety messages to all neighboring cluster-head vehicles over
the ICC channel, then, provided that there are no collisions,
we have Fig. 5. Worst case of the cluster topology when LC = 250 m and Li =
100 m. The white, dark, and shaded dots represent vehicle i, the vehicles within
∆ (i,j1 ) (i,j2 ) broadcast area, and the hidden terminals, respectively.
si = T h2h = T h2h , ∀j1 , j2 ∈ Bi and i = j. (4)
(l,i) (k,j) the received safety messages, by η(n), where n is the number
From Fig. 4, we know that T m2h ≤ T and T h2m ≤ T .
of received safety messages plus the cluster-head vehicle’s
Hence, the maximum total delivery delay of safety messages,
(l,k) own safety message. We consider the worst case where the
which is denoted by tm , can be expressed as cluster-head vehicles do not compress the safety messages, i.e.,
η(n) = 1. Hence, the average size of the consolidated message
t(l,k)
m = si + 2T. (5)
that was generated by cluster-head vehicle i, which is denoted
To assure the timely delivery of the safety messages, the max- by H i , can be expressed as
imum total delay of safety messages should be less than the
(l,k) H i = (|CHi | + 1) Hsafety (7)
required delivery delay of safety message, i.e., tm ≤ Tsafety ,
which implies, by using (5), that where |CHi | is the average number of cluster-member vehicles
within that cluster under cluster-head vehicle i, and Hsafety is
si = t(l,k)
m − 2T ≤ Tsafety − 2T = tbd (6)
the packet size of the safety message.
∆ Let |Bi | be the number of cluster-head vehicles within the
where tbd = Tsafety − 2T is the delay upper bound for the broadcast area of cluster-head vehicle i and |Hi | be the number
safety message delivery between two neighboring cluster-head of hidden terminals of cluster-head vehicle i. Clearly, the larger
vehicles. the |Bi | and |Hi |, the more intensive the channel contention
Now, we analyze the transmission delay of the consolidated over the ICC channel. As shown in Fig. 5, max{|Bi |} =
safety message through the ICC channel. As discussed in 2LI /LC , and max{|Hi |} = 2LI /LC , which yield the
Section III-C, the main participants that are associated with most intensive channel contention over the ICC channel as the
the intercluster safety message delivery include cluster-head ve- worst case. Now, we develop an analytical model to derive
hicles, quasi-cluster-head vehicles, and quasi-cluster-member the average delay for delivering the safety messages in this
vehicles. There are three types of packets that are transmitted worst case.
over the ICC channel. The first type is the consolidated safety As described in Section III-C, the cluster-head vehicles em-
messages that were generated and transmitted by the cluster- ploy the IEEE 802.11 MAC protocol to broadcast consolidated
head vehicles. The second type is the safety messages of safety messages. See [15] for the detailed and general descrip-
the quasi-cluster-head vehicles and the quasi-cluster-member tions of the IEEE 802.11 MAC protocol. In particular, when
vehicles. The third type is the cluster management packets a cluster-head vehicle has a packet to transmit, it monitors the
that was sent by the quasi-cluster-head vehicles. Because the ICC channel. If the channel is busy, the cluster-head vehicle
arrival rate of safety messages is much larger than that of waits for a random number of time slots before it can transmit.
cluster management packets and the size (200 bytes) of the Since, the value of the backoff counter, which is denoted
safety message is also ten times larger than that (20 bytes) by BO, is chosen uniformly from the interval of [1, CW ],
of the cluster management packet, the safety message traf- the probability that the backoff counter is equal to n can be
fics always dominate the ICC channel usage, and thus, it is written as
reasonable to omit the cluster management packets (which is
also validated by our simulation results that were obtained in 1
Pr{BO = n} = , 1 ≤ n ≤ CW (8)
Section VI-C). Moreover, because the number of quasi-cluster- CW
head and quasi-cluster-member vehicles are much fewer than
where CW is the maximum contention-window size. Thus, the
that of the cluster-head vehicles, we can also neglect the
average backoff window size, which is denoted by W , can be
messages that were transmitted by quasi-cluster-head and
given by
quasi-cluster-member vehicles. That is, we mainly consider
the consolidated safety messages that were transmitted by 1 + CW
the cluster-head vehicles since they always dominate the ICC W = . (9)
2
channel usage.
We denote the safety message compression/consolidation In the saturation IEEE 802.11 based network, the proba-
rate function, with which the cluster-head vehicles consolidate bility that cluster-head vehicle i attempts to transmit a safety
3316 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
message, which is denoted by αi , is determined by [16] or failing (collided) transmission of other vehicles, which is
denoted by γi and can be determined by
1
αi = . (10) αi
W γi = (15)
1− j∈Bi (1 − αj ) + αi
For nonsaturated networks, following the work of [17], the
probability that cluster-head vehicle i attempts to transmit a where Bi is the set of cluster-head vehicles that are located
safety message, which is denoted by βi , is determined by within the broadcast area of cluster-head vehicle i over the ICC
channel. Letting Qi be the random number of busy time slots
λsi that are occupied by other neighboring vehicles between the
βi = λsi αi = (11) consecutively successful transmissions of vehicle i, we have
W
that Qi is following the geometric distribution, i.e.,
where λ = 1/Tupdate is the arrival rate of the safety messages,
and si is the average delay that is spent by cluster-head vehicles Pr{Qi = n} = γi (1 − γi )n−1 . (16)
i to transmit a consolidated safety message, as defined by (4).
The authors in [18] observed that the successful transmission Then, we can derive E[ei ] as follows:
process for a particular node can be considered as a regenerative
(1 − γi )m
process. On average, each node successfully transmits one E[ei ] = E[Qi ]m =
packet during the cycle time of this regenerative process, which γi
includes the following: 1) the backoff time; 2) the successful
transmission time; and 3) the channel busy time. The average m
= 1− (1 − αj ) (17)
delay, which is si defined by (4), that is spent by vehicle i to αi
j∈Bi
transmit a safety message is equivalent to the average cycle time
of regenerative process for vehicle i (i.e., the period between
where m is given in (13). Thus, combining and applying
two consecutively successful transmissions by vehicle i). Thus,
(10)–(14) and (17), we can obtain the numerical results for αi ,
we have
βi , and, most importantly, si .
si = E[mi + bi + ei ] = E[mi ] + E[bi ] + E[ei ] (12)
V. S UCCESSFUL D ELIVERY R ATE OF S AFETY M ESSAGES
where mi is the fixed time that is spent by cluster-head vehicle If we define pi as the probability that cluster-head vehicle
i to transmit a safety message, bi is the random backoff time i successfully broadcasts its buffered safety message to all its
interval that is observed by cluster-head vehicle i between its neighboring vehicles whose Transceiver I’s are listening on ICC
two consecutive successful transmissions, and ei is the random channel, then we have
time interval when cluster-head vehicle i observes that the
E[bj ]m
channel is busy due to other nodes’ successful or collided trans-
missions between its two consecutive successful transmissions. pi = (1 − P ERij ) (1 − βj ) (1 − βj ) sj
(18)
j∈Bi j∈Bi j∈Hi
First, let us derive E[mi ] and E[bi ]. Since the size of the
safety message is fixed, the time that is taken by cluster-head where Bi is the set of cluster-head vehicles that are operating on
vehicle i to transmit a safety message is a constant, which is the ICC channel and within the broadcast area that is covered
denoted by m. Thus, E[mi ] can be expressed as by vehicle i, Hi is the set of cluster-head vehicles that are the
hidden terminal from vehicle i, and P ERij is the packet error
∆ Hi rate that vehicle j cannot decode the packet from vehicle i
E[mi ] = m = TH + + DIF S (13)
R due to the wireless-channel quality dropping (e.g., fading and
noise).
where R is the channel rate, H i that is given by (7) is the Then, we further study the asymptotical properties of pi
packet length of the consolidated safety messages, TH is the when the contention-window size CW becomes very large. If
time that is spent to transmit the packet head of the consolidated we let CW go to infinity, then, from (17), we obtain
message, and DIF S is the distributed coordination function
(DCF) interframe space. It is also easy to obtain E[bi ] by using 1− j∈Bi (1 − αj ) m
lim E[ei ] = lim
CW →∞ CW →∞ αi
|Bi |
E[bi ] = W σ (14) 1
= lim W 1 − 1 −
CW →∞ W
where σ is the length of time slot over the ICC channel. |Bi | n
|Bi | 1
To obtain E[ei ], we introduce the probability that the next = lim W (−1)n−1
CW →∞ n W
transmission is a successful transmission by cluster-head ve- n=1
hicle i, given that the last time slot is busy due to successful = |Bi | (19)
SU AND ZHANG: CLUSTERING-BASED MMAC PROTOCOLS FOR QoS PROVISIONINGS OVER VANETs 3317
TABLE II TABLE IV
PARAMETERS USED IN THE ANALYSIS AND SIMULATIONS PARAMETERS USED IN OUR PROTOCOL EVALUATION METRICS
S |V (t)|
∆ i=1 CHLi (t)
eight cluster-member vehicles and + = 10−4 . By using the
CHL = |V (t)| . (25)
t=0 i=1 BCi (t)
parameters that are listed in Table II, we obtain the numerical
results for analyzing the tradeoff, as shown in Fig. 7. As pre- 2) Average relative speed compared to the cluster head
viously discussed, when CW increases, the slope of the solid within a cluster: It represents the topology stability of clusters.
line, denoting the successful delivery rate of safety messages, The less the average relative speed of the cluster member
becomes flatter, but the dash-dotted line, which represents the compared to that of the cluster head, the more stable the cluster.
delivery delay of safety messages, increases faster. By running If we denote the average relative speed compared to that of the
Algorithm 1, Fig. 7 shows that the desirable CW ∗ is equal to cluster head within a cluster by RSW C, then we get
880 for + = 10−4 . By adopting this desirable CW ∗ , we can
1
achieve the guaranteed reliability QoS (+ = 10−4 ) while reduc- RSW C =
∆
|C(t)| S
ing s as much as possible (see the delay QoS gain in Fig. 7). For
+ = 10−4 , we also obtain the desirable CW ∗ ’s corresponding to −→ −→
S j∈CHi (t) SP i (t) − SP j (t)
the different cluster sizes by executing Algorithm 1, which are · . (26)
|CHi (t)|
listed in Table III. t=0 i∈C(t)
SU AND ZHANG: CLUSTERING-BASED MMAC PROTOCOLS FOR QoS PROVISIONINGS OVER VANETs 3319
3) Average relative speed among cluster heads: It measures C. The Simulations on the Impact of Highway Traffics
the global topology of the vehicular networks. The average rel-
We simulate our proposed protocols by using the Matlab-
ative speed among cluster heads, which is denoted by RSCH,
based event-driven simulator in this section. Our simulation
can be calculated by
experiments take various highway traffic parameters into con-
sideration, which include highway density, vehicular speed, and
−→ −→
∆ 1
S
i,j∈C(t)∧i=j SP i (t) − SP j (t) data traffic parameters. We assume that each channel has the
RSCH = . (27) same data transmission rate of R = 6 Mb/s. Table II summa-
S t=0 |C(t)|2
rizes the parameters that were used in our simulations.
We start with studying the impact of the highway traffic
4) Average cluster size, which is denoted by CS: It mainly parameters on the performance of our proposed protocols.
depends on the traffic density and can be obtained by As indicated by the authors in [20]–[22], the mobility has a
large impact on the performance of mobile ad hoc networks
due to the variations of vehicular network topologies. We are
1
S
∆
CS = |CHi (t)| . (28) also interested in how the different highway traffic conditions
S t=0 affect the average relative speed compared to the cluster-head
i∈C(t)
vehicle, the average relative speed among the cluster-head
vehicles, the average cluster size, and the average cluster-
5) Cluster management overhead: Because the cluster man- head lifetime.
agement messages and the safety messages among cluster- We consider the results for three different cases in terms of
head vehicles are transmitted over the same ICC channel, to densities of vehicles, including low density, medium density,
better characterize the proposed protocols, we need to study the and high density. The vehicle density cases that were con-
cluster management overhead, which can be determined by the sidered include 12, 24, and 40 vehicle/km/lane, on average,
ratio of the total messages of RTJ and ITJ to the total messages corresponding to the low-density, medium-density, and high-
over the ICC channel. density cases, respectively. For each traffic density, the average
6) The delay of the safety message: The time that is used preferred speed of vehicles varies from 20 to 50 m/s, and the
for a safety message to be delivered to all the vehicles in the preferred speed variance is set to 6 m2 /s2 . In each scenario
circular area that is centered at the transmitter vehicle with the (with distinct preferred speed and traffic density), we run the
radius equal to LI (see Fig. 1). simulations ten times to obtain the mean value as the final
7) The probability of safety-message delivery failure: It is performance metric.
defined as the probability that a given safety message will not be Fig. 8 shows the impact of the vehicular preferred speed on
received by all the vehicles in the circular area that is centered the cluster-topology variation with different traffic densities.
at the transmitter vehicle with the radius equal to LI . From Fig. 8(a), we observe that the average relative speed
among cluster heads increases as the average preferred speed
gets larger for the cases of low- and medium-density traffics.
B. The Highway Traffic Model This is because the larger speed leads to more rapid topol-
The highway traffic model that is used in this paper is built ogy variations. On the other hand, the average relative speed
up based on the car-following model that was proposed in almost remains the same for the high-density traffic. This is
Simone 2000 [19], which is mainly composed of the desired expected because the vehicular speed is significantly limited by
gap function and longitudinal control function. In the highway the high-density traffic according to the car-following model
traffic model, every vehicle has its own preferred speed, which even when the preferred speed is high. Fig. 8(b) shows the
the vehicle tries to reach if the conditions are satisfied (e.g., relative speed compared to the cluster head within a cluster
having enough safe distance). The preferred speed is based on against the average preferred speed. The larger the average
the normal distribution with an average preferred speed and a preferred speed, the bigger the relative speed compared to the
variance of the preferred speed. cluster head within a cluster, resulting in the more unstable
In our highway traffic model, we assume that the vehicles run cluster topology, which is also reflected in Fig. 8(c). From
along a three-lane-per-direction circular loop with a perimeter Fig. 8(d), we observe that the average preferred speed has
of 2000 m. The period for each vehicle to stay on the highway little impact on the cluster size. In fact, the cluster size is
is based on the normal distribution with its mean equal to dominated by the traffic density. Then, we can determine the
2100. This implies that, on average, the vehicles will run on the desirable contention-window size CW ∗ for different highway
highway for 2100 s or 35 min, on average, before they “exit” traffic scenarios by using the relations between the average
the highway. A new vehicle is assumed to enter the highway cluster size that was obtained in simulations and CW ∗ , which
every 2100 s and run at a random position on the highway loop is listed in Table III.
initially. The lane width is set to be 5 m, and the width of the Fig. 9 shows the cluster management overhead against the
highway buffer zone between lanes of the opposite directions is average preferred speed. For the low and medium traffic den-
20 m. When the vehicles arrive at the end of the highway, they sities, the cluster management overhead becomes larger, as the
wrap around from the beginning position of the same lane of average preferred vehicular speed increases. This can also be
the highway. observed by carefully examining Fig. 8(a)–(c), which indicates
3320 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
Fig. 8. Impact of vehicular speed on the cluster-topology variations with different traffic densities. (a) Relative speed among cluster-head vehicles. (b) Relative
speed compared to cluster-head vehicles within a cluster. (c) Cluster-head lifetime. (d) Cluster size.
Fig. 10. Performance evaluations of our proposed scheme under different traffic densities. (a) Safety message delivery delay against the preferred speed.
(b) Safety message delivery failure rate against the preferred speed.
is still lower than the required safety message delivery time protocols [24], [25] are not suitable in the V2V communication
Tsafety . environments for the following reasons. The accurate synchro-
The probability of safety-message delivery failure increases nization that is required by MMAC is very difficult to achieve,
slightly with the growth of the average preferred speed and is no although GPS can be used to realize coarse synchronization.
more than 9 × 10−4 in the worst case, as shown in Fig. 10(b). Moreover, the synchronization is more difficult to realize in
From Fig. 10(a) and (b), we observe that our proposed scheme a chain topology, which is often the most typical situation in
can achieve the low and stable safety-message delivery failure highway vehicle traffic flows.
probability as well as the low average safety message delay un- In the original DCA, one transceiver always operates over
der different traffic scenarios. There are two reasons for our per- a dedicated control channel, and the other transceiver can be
formance superiority: First, the number of cluster-head vehicles switched to any data channels in an on-demand manner. The
contending for the ICC channel to transmit consolidated safety Request-To-Send (RTS) and Clear-To-Send (CTS) packets are
messages is greatly reduced due to the clustering techniques transmitted over the control channel to reserve the data channel
that were used in our scheme, which can significantly decrease for data transmission. Specifically, upon receiving the RTS, the
the packet collisions and increase the successful broadcast rate. receiver decides on a channel and adds this channel reservation
Second, the cluster-member vehicles within a cluster exchange information to the CTS. Then, data and ACK packets are
the safety messages without contention, leading to the timely transmitted over the agreed data channel.
safety-message delivery within the cluster. To support the safety message delivery, we make the neces-
sary modifications on the original DCA. The safety messages,
which need to be broadcast, have to be transmitted on the
D. The Simulations on the Impact of Nonreal-Time Traffics
dedicated control channel, because only the control channel is
We also conduct simulations to study the impact of nonreal- continually monitored by each vehicle terminal. Therefore, in
time traffic on the performance of our proposed scheme by the modified DCA, which is called V2V-oriented DCA (V2V-
using the same simulation parameters as used in the previous DCA), the control channel is used not only for data-channel
section. In the following simulations, we compare our proposed reservation but also for the delivery of safety messages. Ch178
scheme with the other existing schemes. The highway traffic serves as the control channel in V2V-DCA. We do not differ-
parameters are set as follows: The average preferred vehicular entiate the priorities between RTS/CTS and the safety message
speed is 35 m/s, the preferred vehicular speed variance is in the V2V-DCA. In other words, the contention of the control
6 m2 /s2 , and the traffic density is medium. channel is performed in the IEEE 802.11 DCF mode, instead of
Because the original IEEE 802.11 MAC only works on the the EDCF mode. The size of each nonreal-time traffic packet is
single channel, the comparison results will not be fair if we set to be 512 bytes.
only compare the IEEE 802.11 with our proposed scheme. Fig. 11 shows the performance comparison of the probability
Hence, we adopt another MMAC protocol, which is based on of safety-message delivery failure among the IEEE 802.11
Dynamic Channel Assignment (DCA) [23]. Like our proposed MAC (operating on Ch178), V2V-DCA, and our proposed
scheme, the DCA also utilizes two sets of transceivers, which scheme, with the nonreal-time traffic loads varying. From
make it fair to compare the DCA-based scheme with our pro- Fig. 11, we can observe that the probability of safety-message
posed scheme. Note that the single-transceiver-based MMAC delivery failure in our proposed scheme is much lower than
3322 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
[17] K. Medepalli and F. Tobagi, “Towards performance modeling of IEEE Xi Zhang (S’89–SM’98) received the B.S. and M.S.
802.11 based wireless networks: A unified framework and its applica- degrees in electrical engineering and computer sci-
tions,” in Proc. IEEE INFOCOM, 2006, pp. 1–12. ence from Xidian University, Xi’an, China, the M.S.
[18] K. Medepalli and F. Tobagi, “Throughput analysis of IEEE 802.11 wire- degree in electrical engineering and computer sci-
less LANs using an average cycle time approach,” in Proc. IEEE GLBE- ence from Lehigh University, Bethlehem, PA, and the
COM, 2005, pp. 3007–3011. Ph.D. degree in electrical engineering and computer
[19] M. M. Minderhoud, Simone 2000, Simulation Model of Motorways With science (electrical engineering systems) from the
Next Generation Vehicles, Mar. 2002. Technical specification. University of Michigan, Ann Arbor.
[20] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for He is currently an Assistant Professor and the
ad hoc networks research,” in Proc. ACM/IEEE MOBICOM, Aug. 2002, Founding Director of the Networking and Informa-
pp. 483–502. tion Systems Laboratory, Department of Electrical
[21] F. Bai, N. Sadagopan, B. Krishnamachari, and A. Helmy, “Modeling path and Computer Engineering, Texas A&M University, College Station. From
duration distributions in MANETs and their impact on reactive routing 1984 to 1989, he was an Assistant Professor and the Founding Director of
protocols,” IEEE J. Sel. Areas Commun., vol. 22, no. 7, pp. 1357–1373, the Division of Computer Systems Engineering, Department of Electrical
Sep. 2004. Engineering and Computer Science, Beijing Information Technology Engi-
[22] V. Naumov, R. Baumann, and T. Gross, “An evaluation of inter-vehicle ad neering Institute, Beijing, China. He was a Research Fellow with the School
hoc networks based on realistic vehicular traces,” in Proc. ACM MobiHoc, of Electrical Engineering, University of Technology, Sydney, Australia, and
May 2006, pp. 108–119. the Department of Electrical and Computer Engineering, James Cook Uni-
[23] S. Wu, C. Lin, Y. Tseng, and J. Sheu, “A new multi-channel MAC pro- versity, Queensland, Australia, under a Fellowship from the Chinese National
tocol with on-demand channel assignment for multi-hop mobile ad hoc Commission of Education. He was a Summer Intern with the Networks and
networks,” in Proc. ISPAN, 2000, pp. 232–237. Distributed Systems Research Department, AT&T Bell Laboratories, Murray
[24] J. So and N. Vaidya, “Multi-channel MAC for ad hoc networks: Han- Hills, NJ, and with AT&T Laboratories Research, Florham Park, NJ, in 1997.
dling multi-channel hidden terminals using a single transceiver,” in Proc. He has published more than 100 research papers. He is an Editor for Wiley’s
MobiHoc ’04, May 2004, pp. 222–233. Journal on Wireless Communications and Mobile Computing, an Editor for
[25] H. Su and X. Zhang, “An efficient single-transceiver CDMA-based MAC the Journal of Computer Systems, Networking, and Communications, and an
protocol for wireless networks,” in Proc. IEEE INFOCOM, May 2007, Associate Editor for John Wiley’s Journal on Security and Communications
pp. 1487–1495. Networks. His research interests include wireless networks and communica-
tions, mobile computing, cross-layer optimizations for QoS guarantees over
mobile wireless networks, effective capacity and effective bandwidth theories
for wireless networks, DS-CDMA, MIMO-OFDM and space-time coding,
adaptive modulations and coding, wireless diversity techniques and resource
allocations, wireless sensor and ad hoc networks, cognitive radio and cooper-
ative communications/relay networks, VANETs, multichannel MAC protocols,
wireless and wired network security, wireless and wired multicast networks,
channel coding for mobile wireless multimedia multicast, network protocols
design and modeling, statistical communications theory, information theory,
random signal processing, and control theory and systems.
Prof. Zhang is a Member of the Association for Computing Machinery
(ACM). He received the U.S. National Science Foundation CAREER Award in
2004 for his research on mobile wireless and multicast networking and systems
and the Texas Engineering Experiment Station Select Young Faculty Award for
Excellence in Research Performance from the Dwight Look College of Engi-
neering, Texas A&M University, College Station, in 2006. He is as an Editor for
the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, an Associate
Editor for the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, an Asso-
ciate Editor for the IEEE COMMUNICATIONS LETTERS, and a Guest Editor for
the IEEE WIRELESS COMMUNICATIONS MAGAZINE for the special issue on
the “next generation of CDMA versus OFDMA for 4G wireless applications”
He has frequently served as a Panelist on the U.S. National Science Foundation
Research Proposal Review Panels, a Panelist on the Cross-Layer Optimized
Wireless Networks and Multimedia Communications at the IEEE International
Conference on Computer Communications and Networks (ICCCN) 2007 and
WiFi-Hotspots/WLAN, and a QoS Panel at the IEEE International Conference
on Heterogeneous Networking for Quality, Reliability, Security, and Robust-
ness (QShine) 2004. He is serving or has served as the Cochair of IEEE
Global Communications Conference (Globecom) 2008—Wireless Communi-
cations Symposium and the Cochair for the IEEE International Conference on
Communications (ICC) 2008—Information and Network Security Symposium,
respectively, the Symposium Chair of the IEEE/ACM International Cross-
Layer Optimized Wireless Networks Symposium (IWCMC) 2006, 2007, and
2008, respectively, the Technical Program Committee (TPC) Chair of the
IEEE/ACM International Wireless Communication and Mobile Computing
Hang Su received B.S. and M.S. degrees in electrical Conference (IWCMC) 2006, 2007, and 2008, respectively, the Poster Chair
engineering from Zhejiang University, Hangzhou, of the IEEE Conference on Computer Communications (INFOCOM) 2008, the
China, in 2002 and 2005, respectively. He is cur- Student Travel Grants Cochair of the IEEE INFOCOM 2007, the Panel Cochair
rently working toward the Ph.D. degree at Texas of the IEEE ICCCN 2007, the Poster Chair of the IEEE/ACM International
A&M University, College Station. Symposium on Modeling, Analysis and Simulation of Wireless and Mobile
He is currently a Research Assistant with the Systems (MSWiM) 2007 and the IEEE QShine 2006, and the Publicity Chair
Networking and Information Systems Laboratory, of the IEEE/ACM QShine 2007 and the IEEE WirelessCom 2005. He has
Department of Electrical and Computer Engineering, served as a TPC Member for more than 50 IEEE/ACM Conferences, including
Texas A&M University. He was a Software Engineer the IEEE INFOCOM, IEEE Globecom, IEEE ICC, IEEE Wireless Commu-
with Nokia Research Center, Hangzhou, in 2005. His nications and Networking Conference (WCNC), IEEE Vehicular Technology
research interests include wireless sensor networks Conference (VTC), IEEE/ACM QShine, IEEE International Symposium on
and vehicular ad hoc networks with emphasis on design and analysis of MAC a World of Wireless, Mobile and Multimedia Networks (WoWMoM), IEEE
and routing protocols. ICCCN, etc.