VANET MAC Protocols: Kazi Saeedalam Lecturer, CSE, KUET

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

VANET MAC Protocols

KAZI SAEED ALAM


L e c t u re r, C S E , K U E T
Vehicular Ad hoc Networks (VANETs)
2

 Nodes in VANETs are vehicles that comply with street


traffic regulations while moving. VANETs support both
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
communications.

VANET MAC Protocols 03/13/2021


Vehicular Ad hoc Networks (VANETs)

 V2V communications
 vehicles exchange information with each other.
 V2I communications
 involve message exchanges between vehicles and traffic lights
or between vehicles and roadside monitors known as road side
units (RSUs).
 The vehicles can access the internet through RSUs.
 Each vehicle is equipped with a controller called on-board unit
(OBU) that supports the V2V and V2I communications.

3
VANET MAC Protocols 03/13/2021
Characteristics of VANETs
4
 Highly Dynamic Topology
Due to the fast movement of vehicles.

 Variable Node Density
 number of vehicles in a region varies over time and is
dependant on the situation.
 Predictable Network Topology
 Move on roads, follow traffic signals, and road signs.
 Available Battery Power
 There is no limitation of battery power.
 Enough computational resources
 Each vehicle is equipped with Global Positioning System
(GPS), a high speed CPU, and many sensors.

VANET MAC Protocols 03/13/2021


Applications of VANETs
5

VANETs

 VANET applications:
 Safety applications: Warning about accidents, violation of
traffic signals, wrong way driving, and much more.
 Non-safety applications: Information about near by
restaurant, hotels, and gas stations, play on-line game and
access the internet.
VANET MAC Protocols 03/13/2021
DSRC technology
6
 The Federal Communication Commission (FCC) of USA provides
75 MHz of frequency spectrum from 5.850 GHz to
5.925GHz for Dedicated Short Range Communications (DSRC)
technology in order to facilitate vehicular communications.
 DSRC is a technology for short to medium range communication
that is operable in the 5.9 GHz frequency band in order to
provide public safety and also used in private applications.
 The 75 MHz frequency spectrum is divided into seven
channels and the bandwidth of each channel is 10 MHz. One of
the seven channels (channel 178) is designated as the control
channel (CCH) and is reserved for control information and
safety applications. The other six channels are called service
channels (SCHs) and support non-safety applications.

VANET MAC Protocols 03/13/2021


DSRC technology
7

VANET MAC Protocols 03/13/2021


Wireless Access Vehicular Environment (WAVE)
8

 The IEEE 1609 family of standards, is an architecture for


Wireless Access Vehicular Environment (WAVE) that specifies
the protocols for the communication between vehicles and
between vehicles and Roadside Units (RSUs).
 The IEEE 1609.4 standard of this family mainly focuses on the
development of the MAC layer and the Physical layer.
 According to the specification of the IEEE 1609.4 standard, time
is divided into sync intervals. Each sync interval consists of a
50ms CCH interval (CCHI) and a 50 ms SCH interval (SCHI).
 During the CCHI all nodes listen to the CCH for emergency
messages and if a node wants a specific service then it tunes to
the SCH in which that service is provided during SCHI.

VANET MAC Protocols 03/13/2021


Protocol STACK of WAVE
9

VANET MAC Protocols 03/13/2021


IEEE 802.11
10
 The WAVE architecture uses the IEEE 802.11p protocol in the
physical and link layers.
 The IEEE 802.11p protocol is a part of the IEEE 802.11 standard.
 It relies on the DSRC frequency spectrum for communications.
 In the early versions of IEEE 802.11, all classes of traffic (such
as voice, video, and data) are treated with the same priority.
 The IEEE 802.11e protocol provides different priorities for
different traffic. It uses AIFS (Arbitration Inter Frame
Space) instead of DIFS.
 To support Quality of Service (QoS) it uses different AIFSs
and CWs for different types of traffic.
 IEEE 802.11p extends IEEE 802.11e in order to support QoS
for various classes of traffic that are available in VANETs.
VANET MAC Protocols 03/13/2021
Limitations of IEEE 802.11p in broadcast
communication
11

 One of the limitations of the IEEE 802.11p is that it is not suitable for
broadcast communications. The RTS/CTS mechanism is not applicable
when vehicles broadcast packets because if a vehicle broadcasts a RTS packet
then all the active one-hop neighbours will broadcast their CTS packets. As a
result the channel will be accessed by multiple nodes.
 Moreover, the hidden terminal problem cannot be alleviated without the
RTS/CTS mechanism in the IEEE 802.11p.
 Another problem is that broadcast communications do not use ACKs.
In unicast communications, the receiver replies with an ACK if it successfully
receives a packet from the sender.
 If the sender does not receive any ACK in a certain amount of time it
doubles the CW and retransmits the packet again.
 Since packets are not retransmitted in broadcast communications, the CW
remains fixed all the time. Having a fixed CW increases the probability
that two nodes pick the same random value and therefore collide
when there is more traffic in the network.

VANET MAC Protocols 03/13/2021


VeMAC
12

 VeMAC is a multichannel TDMA based MAC protocol which


reduces the probability of collisions by using different sets of time
slots for the vehicles moving in opposite directions and RSUs.
 Similar to the WAVE, it has one control channel (CCH) and
multiple service channels (SCHs). Each vehicle uses two
transceivers.
 Transceiver 1 is for CCH and transceiver 2 is tuned to one of the
SCHs. Each vehicle is considered to be equipped with a GPS to
find its current position and direction.
VANET MAC Protocols 03/13/2021
VeMAC
13

Time is partitioned into frames, and frames are divided into many slots.

Each frame has three sets of slots L,R, and F.
The sets L and R are assigned to the vehicles of opposite directions and the

set F is used for RSUs.
In this protocol, each vehicle must access a CCH slot in each frame. The

CCH slot is used to send its SCH slot number in which it provides
the non-safety services, its direction and position, and the CCH
time slots of all one-hop neighbours.
Thus each vehicle gets an equal chance of accessing the SCHs. Each vehicle

also knows about the slots used by its one-hop neighbours and two-hop
neighbours by analysing the packets received from its one-hop neighbours
and thus avoids collisions due to the hidden terminal problem.
VANET MAC Protocols 03/13/2021
VeSOMAC
14
Vehicular Self-Organizing MAC (VeSOMAC) is a novel MAC
protocol for vehicle-to-vehicle communications that uses the
DSRC standard.
It provides quick message delivery with deterministic delay
bounds. Each vehicle gets its slot based on its location.
Each packet has two parts: a header followed by a data part.
Each vehicle puts a bitmap vector in the header which is used to
exchange the relative transmission times of all one-hop neighbours.
In order to send up-to-date information each vehicle sends a
packet in each frame.
So a vehicle learns about its one-hop and two-hop neighbours’
transmission times by receiving bitmaps from its one-hop
neighbours.
This helps to avoid collisions and also alleviates the hidden
terminal problem.
VANET MAC Protocols 03/13/2021
Slot allocation using VeSOMAC
15

• Each vehicle gets its slot based on its location.


• Figure shows the slot assignments of 4 vehicles labelled as B, C, D,
and E.
• As vehicle B is ahead of all other vehicles, B accesses the channel
first.
• After that C gets access to the channel, followed by D and E, in that
order.
• If an accident occurs in front of B then this information can go to E
within one frame while a regular TDMA based technique would
take
VANET MAC three
Protocols frames. 03/13/2021
RR-ALOHA
16

 A virtual frame consists of previous N observed BCHs.


 A vehicle must reserve a BCH in order to access the wireless channel.
 At first, a vehicle monitors the channel for one virtual frame if it wants
to send data.
 Then it contends for an unassigned BCH by broadcasting a FI (Frame
Information) packet in that BCH.
 The FI packet contains the request for the reservation and the status of
the perceived BCHs of the previous frame.
 Thus a node would know which BCH is reserved by which neighbour
and which BCH is free.
 Each FI packet also includes some other information which will be
described later.
 The FI packet that is used for reservation is known as a REQ packet.

VANET MAC Protocols 03/13/2021


RR-ALOHA
17

 Now let us consider that a vehicle V wants to reserve a free BCH j.


 So it broadcasts its REQ packet in j after observing the channel for one virtual
frame.
 Then it waits for the FI packets from its active one-hop neighbours.
 The active one-hop neighbours broadcast their views of the previous virtual
frame through their FI packets in their reserved BCHs.
 The one-hop neighbours that hear the REQ packet of V properly, assigns j to V
in their FI packets.
 But they make j free in their FI packets if they hear collisions in j.
 If j is assigned to V by all the active one-hop neighbours in their FI packets then
V starts to access the channel in j from the upcoming next frame and continues
to broadcast its FI packets in j until a collision occurs.
 So Each vehicle knows about its two-hop neighbours by receiving the FI packets
from its active one hop neighbours and this helps to avoid the hidden
terminal problem.

VANET MAC Protocols 03/13/2021


RR-ALOHA
18

 STI (Source Temporary Identifier) : The STI is used to uniquely


identify the vehicle that has reserved this BCH. It is 8 bit long.
 PSF (Priority Status Field): The 2 bit long PSF sets the priority
of the transmitted data.
 BUSY : If this BCH is free then BUSY bit is 0 otherwise 1.
 PTP : This bit is used to set up point-to-point communication.

VANET MAC Protocols 03/13/2021


RR-ALOHA+
19
 In RR-ALOHA, the BUSY bit is used to identify whether a BCH is
busy or free.
 A BCH may be free due to a collision or because no vehicle has
reserved it. Using 1 bit it is not possible to identify all the three
states.
 So, RR-ALOHA+ uses an extra bit known as COL bit.
 Now all the states of a BCH can be represented correctly using BUSY
bit and COL bit

VANET MAC Protocols 03/13/2021


MS-ALOHA
20

 As mentioned, RR-ALOHA+ uses the BUSY and COL bits to


identify the states of a BCH.
 It can be seen that the last combination is unused. In
MSALOHA, a vehicle sets both the BUSY bit and COL bit of
a BCH to 1 if this BCH is used by one of its two-hop
neighbours.
 So after receiving a FI packet, if a vehicle A that wants to
reserve a free BCH, finds that the BUSY and COL bits are
set to 0 then it knows that this BCH is being used by a
vehicle B that is three hops away.

VANET MAC Protocols 03/13/2021


MARR-ALOHA
21

 In RR-ALOHA, a vehicle broadcasts a packet (FI or REQ) at the


beginning of its reserved BCH.
 So a collision occurs if more than one vehicle broadcast their
packets in the same BCH.
 MARR-ALOHA uses CSMA and a backoff algorithm within a
BCH to reduce the possibility of collision of REQ packets and FI
packets.
 The FI packet is not transmitted at the beginning of the BCH;
rather the transmission starts after FI Backoff Timer (FIBT) is
over.

VANET MAC Protocols 03/13/2021


MARR-ALOHA
22
 The FIBT is a backoff timer whose value depends on the following
two parameters:
 Backoff Unit: The time unit of the FIBT.
 Max Backoff: The maximum number of Backoff Units.
 So the value of the FIBT can be expressed as Backoff Unit x K where
K is a random positive number less than the Max Backoff.
 If a vehicle senses the transmission of a packet before the expiration
of its FIBT then it gives up its attempt and tries to reserve another
free BCH.
 The backoff timer value for the REQ packet is larger than the FIBT
and a REQ packet does not interfere with the transmission of the FI
packet.
 To avoid the collision between REQ packets, a shorter REQ packet is
used.
VANET MAC Protocols 03/13/2021
MARR-ALOHA
23

 A REQ packet includes the following:


 the STI (Source Temporary Identifier) of the vehicle.
 the priority of the data.

 BUSY bits for all BCHs of the previous virtual frame.


 If two REQ packets collide at a common neighbour, then
the common neighbour indicates this in its next FI packet.
 If a common neighbour gets more than one REQ packets
for a specific BCH, it selects one vehicle for that BCH using an
arbitration mechanism and indicates this choice in its FI
packet. So after receiving the FI packet from the common
neighbour other candidate vehicles quit their intention to send
their FI packets in that BCH.

VANET MAC Protocols 03/13/2021


CAH-MAC
24

 CAH-MAC improves the reliability of RR-ALOHA by introducing


cooperative communication.
 A packet may fail to reach its destination due to poor channel
conditions.
 In CAH-MAC, one-hop neighbours of a sender cooperate with the
sender by retransmitting the packet to the receiver.
 CAH-MAC uses the same packet fields like RR-ALOHA and in
addition, a cooperation header field is introduced.
 A node C can cooperate only if the direct transmission from
node A to node B fails, C receives the packet from A successfully,
B is reachable from C and there is an available time slot for C to
retransmit the packet to B.

VANET MAC Protocols 03/13/2021


CAH-MAC
25
 If the node C decides to cooperate then it sends the following
information to A in its reserved time slot.
 Its intention to cooperate.

 The time when transmission failure has occurred.

 The available time slot when it wants to retransmit the packet to


the receiver.
 The one-hop neighbours of C that also want to cooperate do not do
so after receiving the packet from C.
 If more than one node that are not in each other’s radio range want
to retransmit a packet in the same time slot, then the destination
node D selects the node E which sent its intention to cooperate first.
 D sends an A-ACK at the beginning of the time slot selected by the
nodes containing E’s ID. So nodes other than E do not transmit.
Thus collision due to hidden nodes is avoided.

VANET MAC Protocols 03/13/2021


References
26
web

VANET MAC Protocols 03/13/2021

You might also like