Vous êtes sur la page 1sur 10

Introducing SOFT MAC

Ghassan M. Abdalla*, Mosa Ali Abu-Rgheff** and Sidi-Mohammed Senouci***

*University of Khartoum, Sudan **University of Plymouth, UK ***University of Bourgogne, France

gmtaha@uofk.edu

ABSTRACT
The IEEE is working on a MAC standard (802.11p) for VANET based on 802.11e.
Although the access function of 802.11e supports QoS by using different counters
for different QoS requirements, it reduces to a best effort service and low
performance when the number of nodes increases. Some applications of VANET,
particularly safety related, have strict QoS requirements that cannot be guaranteed by
802.11p especially in heavy traffic conditions. To resolve these issues, we propose a
Space-Orthogonal Frequency-Time medium access control (SOFT MAC) protocol
that can support QoS requirements and is compatible with 802.11 standard. The
proposed MAC allocates guaranteed transmission slots via reservation and also has a
random access period for best effort service. Reservations are allocated in a
distributed manner without the need for a basestation or a cluster head. In this paper
we analyse and discuss in details the rules and algorithms that govern SOFT MAC
protocol. The analysis of SOFT MAC proves it achieves higher saturation
throughput than 802.11. The improvement in throughput depends on the maximum
number of reservation slots in SOFT MAC.

Keywords: 802.11, DCF, CSMA, FDMA, MAC, OFDMA, PCF, SDMA, TDMA.

1 INTRODUCTION requirements (e.g. safety messages from different


cars). We propose a MAC protocol which is a
Vehicular Networks (VANET) aim at reducing the
combination of Space, Orthogonal Frequency and
number of accidents in the road by exchanging safety
Time Division Multiple Access (SDMA, OFDMA and
and road condition information and, at the same time,
TDMA) called SOFT MAC protocol. In SOFT MAC
providing commercial applications. The IEEE is
the space (road) is divided into cells and a portion of
working on a Medium Access Control (MAC)
the available subcarriers is assigned to each cell.
standard known as IEEE 802.11p. The standard is
These subcarriers are then shared between nodes
based on the previous 802.11e which uses an
within the cell via a TDMA protocol.
Enhanced Distributed Co-ordination Function
(EDCF), an extension of the Distributed Co- The rest of the paper is organised as follows: some
ordination Function (DCF), to organise channel related work is reviewed in the next section. Section
access. Since DCF is a random access mechanism III describes the new protocol. Section IV explains the
based on Carrier Sense Multiple Access with implementation of the protocol using 802.11 standard.
Collision Avoidance (CSMA/CA), it has an unreliable In section V the saturation throughput is theoretically
broadcasting service, achieves low throughput when analysed and closed form expressions are obtained.
the number of devices increases and has little support The results of the analysis are presented and discussed
for Quality of Service (QoS) [1-4]. A request-to-send in section VI then the paper is concluded.
clear-to-send (RTS/CTS) handshake, supported in
DCF, can be used to improve the performance of
2 RELATED WORK
point-to-point transfers but is not applicable to
broadcast messages. Since a large number of Several MAC protocols for VANET considering
applications in VANET is broadcasting by nature (e.g. different approaches were proposed [5-11]. In [7, 8,
safety messages, location messages, traffic condition 10] a TDMA access mechanism was used, SDMA in
messages … etc), the RTS/CTS handshake cannot be [5, 6, 9] and a combination of FDMA and CDMA in
used with these applications. Moreover the number of [11]. In [8] cluster based MAC (CBMAC) was
nodes varies with time and location, and peaks in introduced where unsupervised nodes form clusters
congested areas leading to severe degradation in DCF and a cluster head is elected to organise access to the
performance [1-4]. EDCF provides some QoS by channel. Issues of cluster head election, clusters
using different queues and counters for each QoS merging and loss of connection to cluster head are
requirement, but still packets contend for the channel usually of concern in this and all cluster-based
and may collide with packets having the same QoS protocols in addition to the large signalling overhead.
In an attempt to avoid the cluster head issues, Point Coordination Function (PCF) of 802.11 uses a
ADHOC MAC was developed for VANET [7, 12]. combination of TDMA and CSMA. The basestation
Nodes using ADHOC MAC exchange information announces a contention free period (CFP) in which it
about the status of each slot (BUSY/IDLE) as each polls node for data (TDMA). After the polling finishes
node senses it. With this information, the nodes are or the maximum CP period has elapsed, the
aware of which slots are free and attempt to reserve basestation announces the end of CFP and a
only free slots. The main drawbacks of ADHOC contention period (CP) starts in which nodes use DCF
MAC are the large overhead and fixed number of [14-16].
slots. The state of each slot in the frame must be
transmitted along with the ID of the node transmitting The DSRC standard specifies seven communication
in the slot. Under high traffic this overhead is channels. Channel 178 has been declared as a safety
justifiable but under low traffic the protocol becomes and control channel while the rest of the channels
inefficient. Moreover since the number of slots is were left unspecified. The draft of the Wireless
fixed, the number of nodes that can access the channel Access in Vehicular Environment (WAVE) IEEE
is limited to the number of slots. standard solves the multi-channel access by dividing
time into frames of 100ms interval. All nodes must
The SDMA scheme was addressed in [5, 6, 9]. The switch to the control channel for 50ms every frame
basic principal is to divide the area into small cells, and may switch to any of the other channels for the
each cell is big enough to occupy only one node and other 50ms [17]. The MAC protocol we introduce in
assign a time slot, frequency band or code for each of the next section is to share a single channel between
these cells. The scheme is very reliable and simple but available nodes. When integrated with WAVE, each
it has poor efficiency since most of the time a large channel will be independent from the others and has
percentage of these cells will not be occupied by its own frame, subcarriers, and reservations. As nodes
nodes and therefore the slots are wasted. Another switch between channels every 50ms, they keep
limitation in these SDMA schemes is that location records of the status of the control channel and the
errors may cause collisions. channel(s) they switch to.

The authors in [11] proposed the use of two 3 SOFT MAC


transceivers. Nodes form clusters and exchange safety
Our MAC uses a combination of SDMA, OFDMA
and non-safety messages. A cluster head (CH)
and TDMA. Instead of defining the cells in SDMA to
organises the access to the channels and relays safety
occupy only one node as in [5, 6, 9], a cell in our
messages between clusters. One of the transceivers in
proposal usually contains several nodes. Cells can be
the CH is tuned to the safety and control within the
as big as 1 km in diameter depending on the node
cluster and is used to exchange safety and data
density, thus location errors are not an issue. Each cell
channel reservation requests from cluster members
is assigned a number of subcarriers and nodes within
and organise channel access using TDMA while the
the cell share these subcarriers in time. Time is
other transceiver is used to communicate with other
divided into frames and each frame is divided into
clusters and exchange safety messages using 802.11
slots. However unlike Reservation ALOHA (R-
MAC. For cluster members one of the transceivers is
ALOHA) [10, 18] and ADHOC MAC there are two
used to communicate with the CH while the other is
types of slots or periods, reserved transmission slots
used to transmit non-safety data in the channels
(TS slots) and reservation (RS) slots/period. TS slots
assigned by the CH. To reduce interference between
cannot be accessed without prior reservation while the
clusters each cluster uses a different CDMA code.
RS period is accessed via a random access scheme
This system has a high cost due to the use of two
(e.g. DCF or slotted ALOHA). The number of TS
transceivers. Moreover CDMA has the near-far
slots varies with the number of reservations as will be
problem and power control is hard to implement in ad
explained and the RS slots occupy the rest of the
hoc networks since different destinations experience
frame. Under low traffic most of the frame will be RS
different path losses.
period while at high traffic most of the nodes will
DCF and EDCF use CSMA for channel access. Under have a large amount of data and reserve TS slots
heavy load the performance of TDMA is superior to therefore most of the frame will be TS slots and hence
CSMA, however under light traffic CSMA shows the performance will approximate that of TDMA
better performance. An attempt to combine the two systems. Hence the protocol should provide the
protocols was introduced in [13]. The nodes use performance of random access methods under low
CSMA as long as the traffic is below a certain traffic and the performance of TDMA under heavy
threshold. Once the traffic exceeds the threshold, traffic.
nodes switch to TDMA and do not switch back to
CSMA unless the traffic drops below the threshold. 3.1 SDMA-OFDMA in SOFT MAC
However different nodes will have different traffic We assume the system uses N subcarriers, each node
conditions, therefore some will prefer TDMA while knows its location and the network is time and
for the others CSMA will be the best choice. The
frequency synchronised possibly via GPS. In the section. To avoid collisions due to the hidden terminal
SDMA scheme the roads are divided into cells of problem at least four sets of subcarriers are needed.
radius R and a portion Nc of the subcarriers is To show why at least four groups of subcarriers are
allocated to each cell as shown in Fig (1). Maps required, consider the four left cells of Fig (1) and
identifying which subcarriers are allocated to each assume there were only three subcarrier sets (i.e. S4 =
portion of the road are pre-installed at the nodes. The S1). The nodes in the intersections of cells S1 and S2
radius of the cells and the number of subcarriers per may use subcarriers S1. At the same time the nodes in
cell are design parameters. At the physical layer, the intersections of S3 and S4 can use subcarriers S3
using more subcarriers per cell means higher data and S1. These transmissions collide at the nodes in the
rates but shorter reuse distance since the number of intersection of S2 and S3. By using at least four
subcarriers is limited whereas using a large radius groups we ensure the same subcarriers are not used
means longer reuse distance since higher power is for a distance of two hops which is the necessary
required and hence the interference will be higher in condition to avoid collisions [19].
adjacent cells. The radius also has a major impact on
MAC layer performance. By increasing the radius we 3.2 TDMA in SOFT MAC
decrease the handoff process when nodes move
between cells; however a larger radius also means TDMA has been the most popular medium access
more nodes within the cell and, therefore more traffic method and is used in several link access protocols.
and contention. We expect a large radius will improve Its reliability and ease of implementation makes it a
efficiency in low traffic conditions but cause more very attractive option. TDMA provides efficient,
collisions in high traffic. There should be an optimum delay constraint access to the medium and therefore
radius for a given traffic density. We can, therefore, has been adopted for voice traffic standards, such as
optimise the cell radii to provide the best performance GSM as well as for data traffic in the Point Co-
for the expected traffic density at a given time. A set ordination Function (PCF) of the IEEE 802.11
of allocation maps can then be used with each map standard. Under heavy traffic TDMA shows superior
optimised for the expected traffic density. For performance in terms of throughput, delay, fairness
instance the city centre at peak hours will use small and efficiency compared to the Carrier Sense Multiple
radius cells, while the highway at night will have a Access (CSMA), used in the DCF of IEEE 802.11.
large radius cell. Using this scheme we can improve However in light load situations TDMA has longer
the efficiency of SDMA in a distributed manner with delays and larger overhead compared to CSMA since
small hardware complexity. a node can only transmit at its designated slots thus
incorporating unnecessary delay. Another limitation
of TDMA is the need for a central node, typically a
basestation, to assign slots to the nodes and provide
S1 S2 S3 S4 S1 time synchronisation. To overcome these problems we
propose a flexible, distributed TDMA method that
combines the benefits of TDMA and random access
techniques.
Figure 1: Illustration of Cells in SOFT MAC The proposed TDMA frame consists of two periods, a
reservation (RS) period of duration dR and a
An important advantage of using OFDMA over transmission period of NTS transmission slots (TS) as
frequency division multiplexing (FDMA) is that shown in Fig (2). For simplicity, we assume constant
nodes belonging to two cells can transmit/receive at TS slot duration and total frame duration. We also
both cells with a single transceiver whereas in FDMA assume the reservation period has a minimum
this is not possible since the node must tune to one of duration (dR,min). The RS period is used by the nodes
the frequencies used in the cells. Fig (1) shows an to reserve one or more of the TS slots and to transmit
example of how the subcarriers are assigned to cells
short messages.
assuming four unique sets of subcarriers (S1 to S4).
Nodes in the intersection of two cells may transmit Access to the RS period is accomplished via a random
using the subcarriers of either or both cells. access technique such as DCF, CSMA or slotted
ALOHA (S-ALOHA) while access to the TS period is
A node wishing to transmit needs to identify which granted only via reservation. Each node should
subcarriers it may use. First the node determines its independently decide whether a TS slot is required or
position using GPS and then uses this position to find not based on some or all of the following parameters:
the subcarriers allocated for its position using the pre-
 The amount of data to be transmitted.
installed maps. However since more than one node
 QoS requirements (e.g maximum delay, data
may exist within the same cell, the nodes must co-
rate, etc)
operate to share the available subcarriers. This is done
through the TDMA protocol discussed in the next  A request for a connection from higher layers
Figure 2: SOFT MAC Frame Structure

Once a node has determined it should reserve a TS  The node receives a packet in TS or RS
slot it listens for transmission on the channel to find containing the number of TS slots. It then
the current number of TS slots. All transmissions in modifies its TS to the new value and may
the frame carry the number of TS slots (NTS) available reserve or transmit in the RS period as required.
in the frame. Transmissions in TS slots, additionally,  A timeout occurred without receiving any
contain information about the status of each TS slot, messages. In this case the node assumes the
BUSY or IDLE, and IDs of the nodes transmitting in maximum number of TS slots and transmits in
BUSY slots. This is known as frame information (FI). the RS period a Hello-New message. Then it sets
A node sets the status of a slot to BUSY in its FI if it another counter for repeating this process r times
can correctly decode the message transmitted in that before it gives up.
slot and sets it to IDLE otherwise. The following set  The node receives a Hello-New message. In this
of rules organise the reservation and transmission case the node assumes NTS is zero. If it has data,
processes. it may either transmit in the RS period or send a
Res-Req. If it does not have data, it sends a Re-
Rule 1: A node wishing to transmit has two options, Hello-New packet which contains the FI, node
either to transmit in the RS period using random ID, position, speed, etc. Other nodes use the FI
access techniques, suitable for small amounts of data, in these packets to update their FIs.
or to reserve a transmission slot and transmit in the
reserved TS, ideal for long transmissions and quality Rule 2: To reserve a TS slot the node broadcasts in the
of service (QoS). Initially the RS period occupies the RS a reservation request (Res-Req) packet to reserve
whole frame with no TS slots. As reservation requests the slot that has the sequence number:
are sent, the number of TS slots increases till the
maximum number of TS slots is reached. The number
 N TS  winning Res_Req received , 
of TS slots is announced in all transmissions in TS as Seq  Max   1...1
well as RS. A node wishing to reserve a TS slot  Seq requested in Res_Req received 
checks the number of TS slots in the current frame
and initiates a reservation request (Res-Req). Each TS
slot has a unique sequence number (Seq). If the The two numbers within the Max function should be
maximum number of TS slots is reached and all TS equal if all nodes are aware of all reservation requests,
slots are BUSY, all nodes cease from sending the first is greater if this node can detect reservation(s)
reservation requests for new TS slots. Reservations missed by other nodes and the second is greater if the
for existing TS slots (e.g. IDLE slots) can still be sent. node misses some reservation requests. The term
Nodes with no reserved slots access the channel in the “winning Res-Req” will be explained in rule 3, for
RS period. When a node powers up it sets its TS to now assume all Res-Req are winning Res-Req. After
zero, starts a listening timer and listens for the transmission of the Res-Req, the node waits for
transmissions. There are three possible scenarios: one frame after the frame it initiated the reservation
in. The reservation is assumed successful if the slot is
assigned as reserved for the node in succeeding
received FIs, the reservation is also assumed which have requested the slot and set the MH flag but
successful if Seq = 1 and no FI was received during failed the first come first serve process are not
the waiting period. The reservation is assumed to have allocated a slot. These are ‘failing’ Res-Req and all
failed otherwise. A node may also request a slot the others are ‘winning’ TS-Req. The MH status
which has been marked as IDLE in all received FIs remains set as long as the node has reserved slots in
for k consecutive frames. All Res-Req packets contain the frames of two, or more, cells otherwise it is unset.
FI of current and new successfully reserved TS slots A node may have several slots in the same frame but
within the same frame. If a node has a TS slot and only one of them can have the MH flag set. This rule
wishes to reserve another, this can be done either via provides seamless handoff between cells. The
the RS period or by signalling in the TS period. conditions for reserving a slot in a new cell ensure the
node does not miss any broadcast messages in the
To illustrate rule 2 assume there are 4 TS slots and 2 original cell since typically a node cannot transmit
new nodes (1 and 2) wishing to reserve. Let the first and receive at the same time.
node (1) accesses the RS slots without collision, it
then announces the number of TS slots as 4 and Rule 4: If a node correctly decodes a packet in a TS
requests slot number 5. The second node accessing the slot, it announces this slot as reserved for the
RS slots will announce the number of TS slots as 5, transmitting node. Otherwise it announces the slot as
the frame information (FI) will indicate TS with Seq = IDLE.
5 is reserved for node (1), and request TS number 6.
In the next frame the nodes at TS 1 to 4 will also Rule 5: A broadcast transmission is assumed
announce the slot allocation and increase the number successful if all the frame information (FI) received
of TS slots, however the new nodes will delay their by the source indicate the slot is reserved for it. If this
transmission for this frame to avoid any hidden is not true a collision is assumed, the slot is released
terminals as will be explained in rule 8. Note that if a and a new reservation is started.
collision occurred the reservation either fails and the
process is restarted or one of the reservations is Rule 6: A node modifies its FI information to include
successfully detected by some node(s) and is any new TS slots if it receives an FI with the new
announced in subsequent transmissions or the two slot(s) allocated to certain destination(s). This is a
reservations were detected, each by a different group case when a node cannot sense the reservation but
of nodes. In this case these groups announce two another node within the cluster can (hidden terminal
different reservations for the same slot. This is problem).
resolved using rule 8.
Rule 7a: In the FI each TS slot has a delete (D) flag.
Rule 3: A node belonging to two cells and having a An active node broadcasts a delete request by setting
TS slot in cell 1 may reserve a TS slot in cell 2 and in its FI the D flag of a slot to delete the assignment of
keep the reserved slot in cell 1 if the new slot satisfies that unused TS slot to an inactive node if for q
one or more of the following conditions: consecutive frames (q > k) the slot was sensed idle
 It has the same sequence number as its reserved and declared IDLE in all received frame information
TS in cell 1 (FI). Each node checks its own FI to determine the
 The equivalent TS slot in the frame of cell 1 is slots it can occupy in the frame and broadcasts this in
marked as point-to-point (PTP) and this node is its own transmission. A node declares it can occupy a
not the destination slot if it is IDLE in all received FI and on its own FI.
 It is in the RS period of cell 1 Rule 7b: The active node that broadcasted the delete
request rearranges the allocation of slots to nodes so
If more than one slot satisfies different conditions, the
that last TS slot becomes IDLE and broadcasts the
slot satisfying the first conditions is preferred. If two
new slot assignment to the active nodes in the next
or more slots satisfy identical conditions one is chosen
frame. The number of TS slots is reduced for each
randomly. If no slot satisfies the conditions, it is not
unassigned TS slot while the RS period increases i.e.
possible to reserve a new slot in cell 2, the node needs
the last TS slot(s) becomes part of the RS period. If a
to release the slot in cell 1 before reserving in cell 2.
node declares it cannot occupy a slot (e.g. because a
If a TS slot is free, even if a reservation request has neighbour indicates slot is BUSY) then the slot cannot
been sent for it by another node, or BUSY but a must- be re-assigned to it but can be re-assigned to another
have (MH) flag is not set, a node may send a node that can occupy it. If a slot cannot be re-
reservation request for this slot with the MH flag set. assigned, the delete counter is reset to q.
This is used only by nodes belonging to two cells. The
Rule 8: An active node with no reserved TS sets a
slot is then allocated to one of the nodes that have set
timer if it detects two successful reserve requests for
the MH flag on a first come first serve basis and the
the same TS slot (at least the second request has the
MH status of the slot in the FI is set. The node that
MH flag unset, which may be generated by a hidden
occupied, or first requested, the slot with the MH flag
node). Let’s call this case double reservation. The
unset is allocated another slot if possible. Nodes
node reduces the timer (Gateway counter) to half its hidden node from the FI of node 6 and reduce their
current value for each additional successfully detected counters by half. Now nodes 5 and 7 both have the
reserve request for the same slot. Note that a reserve information of all the reserving nodes and any one of
request refers to reservations via Res-Req messages in them upon announcing the reservation will reset the
the RS as well as new TS assignments in the FI of other. If node 4 has a TS reserved then it simply waits
other nodes. If the Gateway counter expires, the node for its reserved TS to announce the slot allocation
sends a message (Gateway-Hello). In the Gateway- without the need to set a counter.
Hello message the number of TS slots is set to be:

N T  Max  N TS in Res _ Req, N T in node  


No of received double Reservation s.....( 2) 3
7

The FI field in the Gateway-Hello message arranges 1


the assignment of the slots to nodes based on a first 4 5
6
come first served basis. If the Gateway already has a
reserved slot it can defer the transmission and transmit
in its TS slot. The node resets its Gateway counter and
does not transmit a Gateway-Hello message if there 2
are no more free TS slots or if all the following
conditions became true: Figure 3: Illustration of double reservations
1. A Gateway-Hello message or FI sent from
another node is received 3.3 Point-to-Point Transmission in SOFT MAC
2. The received Gateway-Hello or FI has equal or
greater NTS For point-to-point (PTP) communications we adapt
3. The received Gateway-Hello or FI assigned slots the approach proposed in [7] to work with our
to all the nodes requesting new reservations proposal. A Point-to-Point (PTP) flag is used to
differentiate between a broadcast transmission and a
To illustrate rule 8 consider the clusters shown in Fig PTP transmission.
(3). The nodes in Fig (3) are represented by circles
while the ovals are clusters. Assume each node within Rule 9: A node sets the PTP flag for a TS slot in its
a cluster can correctly receive packets from all the own FI to 1 if:
nodes within the same cluster but not from nodes in 1. The message received in that slot is a broadcast
other clusters. For instance node 2 can receive from 4, message or
5 and 6 but not from the other nodes while 4 can sense 2. It is the destination of this packet in PTP
the transmission from all the nodes. Let the number of communications
TS slots = 0 and assume nodes 1, 2 and 3 each want to
reserve a slot and each of them successfully accessed The PTP flag is set to 0 otherwise. If the destination
the RS period without collision. Since none of them does not have a reserved slot it must reply with an
can sense the reservation request of the others they acknowledgement packet (explicit ACK) in the same
will all request the same slot i.e. TS 1. Let node 1 be TS slot. The transmitter can determine whether to
the first to transmit a reservation, this will be sensed expect an ACK or not by checking its FI, if the
by nodes 4, 6 and 7. Then node 2 broadcasts a destination has a reserved BUSY slot the ACK packet
reservation for the same slot. Nodes 4 and 6 both now is not expected but the PTP flag of the transmitter’s
detect a double reservation and each of them sets its slot in the FI of the destination is checked and the
own Gateway counter to resolve this double transmission is successful if PTP equals 1 (implicit
reservation while 5 and 7 have only detected a single ACK). If the destination has no TS slot an ACK is
reservation. Now node 3 announces its reservation expected and the transmitter must adjust its packet
thus nodes 5 and 7 start their Gateway counters since length so that the duration of the packet + ACK + any
they detected double reservation, however 4 now has waiting time does not exceed the TS slot duration.
detected 3 reservations for the same slot, so it reduces
its counter by half to access the channel before nodes Rule 10: A TS slot can be accessed for PTP
5, 6 and 7 and announces an NTS of 3, assigned to communication if the following conditions are
nodes 1, 2 and 3 respectively. Nodes 5, 6 and 7 satisfied:
receiving the FI of node 4 and realising the NTS 1. The PTP flag in set to 0 in all received FIs
announced is 3, which is greater than their NTS (= 2), 2. The FI received from the intended destination
and all reservation requests have been resolved, cease declares the slot as IDLE
from transmitting the Gateway Hello packet and 3. An ACK cannot be sensed in the specified slot.
update their FIs. Note that even if node 4 does not
exist and, for instance, node 6 accessed the channel, The first and third conditions ensure that the ongoing
nodes 5 and 7 will become aware of the additional communication in the slot is PTP and the destination
of this transmission is not within the range of the SIFS is the smallest of the Inter Frame Spaces and is
transmitter. The second condition ensures the new used between a transmission and its acknowledgement
destination is not within the range of the transmitter or as well as in-between request to send/clear to send
the receiver of the original transmission. handshakes (RTS-CTS-data-ACK). PIFS (=SIFS+)
is used only by the AP while the DIFS (=SIFS+2) is
Rule 11: The transmission is considered successful if used by all nodes [14].
the slot is set to BUSY with the correct node ID and
PTP set in the FI of the destination terminal or if an In PCF the AP waits for the channel to be idle for a
ACK was received; otherwise it is assumed that the PIFS before broadcasting a beacon packet. This
transmission has failed. beacon announces the start of the CFP period and
indicates the channel will be busy for the maximum
3.4 Priority in SOFT MAC CFP period. All nodes then set their Network
Allocation Vector (NAV) to the channel busy duration
We adapt the 2-bits priority field of the IEEE 802.11e specified in the beacon. During this period no node
standard to identify the type of traffic in a given TS will attempt to access the channel unless the AP polls
slot [15, 16]. Nodes then use this field, along with the it for data. After the AP finishes polling (even if the
MH flag, to request TS slots occupied by lower maximum CFP is not reached), it broadcasts another
priority traffic. Table (1) shows the proposed priority beacon that terminates the CFP (starts the CP). The
scheme in descending order. nodes then reset their NAV and contend for the
channel using the DCF [16].
The priority of the traffic transmitted in the TS is
announced in the header. If a node wishes to overtake SOFT MAC can be easily implemented using the PCF
a TS slot, it checks its priority against that announced features. When the TS period starts, the node that
in the TS. If its traffic has higher priority it may send reserved TS 1 waits for a PIFS before transmission.
a reservation request and the TS will be reassigned to This will ensure the node gains access to the channel
it. If the priority is lower, the reservation will be before any other node. Subsequent nodes follow the
declined. The MH flag has the highest priority since it same strategy to access their TS slots. All nodes
is indicates the node is moving from one cell to transmitting in the TS will broadcast the time left in
another, thus it is necessary to perform the handoff the TS period, number of TS slots and sequence
between cells. Other than the handoff case, number of current slot. This will be used by nodes
reservation requests for BUSY TS slots are not sent unaware of the number of slots to update their NAV
unless the maximum number of TS slots is reached. as well as number of TS slots and hence do not
attempt to access the channel during the TS period.
Table (1): Priority in SOFT MAC After the TS period, all nodes must wait for a DIFS
before attempting to access the channel. Although the
MH flag Priority Type of Traffic PCF mode is optional, the 802.11 standard specifies
1 X Handoff that all nodes must be able to co-operate with the PCF
0 3 Safety function even if they do not support the polling
0 2 Road Traffic data service of the AP [16]. This ensures that SOFT MAC
0 1 Multimedia can coexist with 802.11. Fig (4) shows this access
0 0 Best Effort scheme. In the next section we analyse the saturation
throughput of this implementation.
4 IMPLEMENTATION OF SOFT MAC USING
802.11
TS 1 PIFS TS 2 PIFS TS 3 DIFS RS Period
The 802.11 standard has two modes of operation, the
Distributed Co-ordination Function (DCF) and the
Point Co-ordination Function (PCF). PCF is
Figure 4: SOFT MAC implementation using 802.11
implemented using an Access Point (AP). In PCF
standard
there are two intervals, Contention Period (CP) and
Contention Free Period (CFP). During the CP, nodes
5 THROUGHPUT ANALYSIS OF SOFT MAC
access the channel using DCF in a distributed manner
without the intervention of the AP. In the CFP, the AP In this section we theoretically analyse the
polls the nodes for data. A node must register itself performance of the TDMA protocol of SOFT MAC
with the AP to enter the polling list [14-16]. for one cell and compare it to the basic access mode
of 802.11 standard. The following assumptions will be
There are four basic time units in 802.11, the slot time used for our analysis:
(), Short Inter Frame Space (SIFS), Priority Inter  Both SOFT MAC and 802.11 have the same
Frame Space (PIFS) and Distributed Inter Frame bandwidth (20MHz) and number of subcarriers
Space (DIFS). The slot time, the smallest of all of (64) per cell.
them, is the time unit used for the back-off counters.  The data rate is 6Mbps
 Nodes share a single channel Table (2): Fields of TS header
 SOFT MAC is implemented using 802.11 as
described in the previous section Field Use Number Size
 The frame duration (Tframe) is fixed and equal to per TS slot (bits)
100ms status TS slot status NTS 1
 All transmissions start and finish within the (BUSY/IDLE)
frame (i.e. no transmission extends between two PTP Point-To-Point NTS 1
frames) flag
 We adopt the specifications for 802.11a MH_P MH/Priority of NTS 1+2
(5.8GHz), since 802.11p specifications are based each slot
on 802.11a D Delete flag NTS 1
 All TS slots have been reserved NodeID MAC Address NTS 48
 Implicit ACK is used of node
 The nodes always have data to transmit transmitting in a
(saturation throughput) TS slot
 No hidden terminals NoTS Announces 1 8
current number
4.1 Throughput of the TS period of TS slots
Seq Sequence No. of 1 8
Since the TS period is contention free, the throughput current TS slot
(STS) is given by: FrCON Frame Control 1 16
FrDU Frame Duration 1 16
Data
rate (Time left in TS
STS 
Header  Data   Wait _time
.............(3)
period)
rate DestID MAC address of 1 48
the destination
Where Data is the total transmitted data, rate is the of the slot
data rate, Header is the total header (control bits) and
Wait_time is the total channel idle time (PIFS). The Nodes access the RS period via the DCF. Eq. (4) to
header in each TS slot is calculated as: Eq. (7) are the key to the design of the frame as they
specify the possible number of TS slots for a specific
H TS  N TS status  PTP  MH _ P  NodeID  D  frame duration, TS duration and packet size. As the
 NoTS  Seq  FrCON  FrDU  DestID..(4) packet size increases, the possible number of TS slots
decreases while improving the throughput since less
header and wait time is needed. On the other hand a
NTS is the number of TS slots. The other parameters
smaller number of TS slots means less nodes can
(based on 802.11 standard [14]) are listed in Table (2).
reserve TS slots.
Since there are NTS slots per frame, the parameters of
Eq. (3) are given by: 4.2 Throughput of the RS period
Header  N TS  H TS The theoretical saturation throughput (SRS) of the RS
Data  N TS  PTS ..............................................(5) period is the throughput of the DCF. This has been
analysed in [1] and closed form expressions were
Wait _ time  N TS  PIFS
obtained as:

Where PTS is the average payload size per TS slot. 21 2 p 


 .............8
1 2 p W 1  pW 1 2 p m 
The TS period duration (TTS) should satisfy:

T frame  TTS 
Header  Data   Wait _ time.......( 6) p  1  1  n 1 ............................................9 
rate Ptr  1  1  n ............................................10 
n 1   n 1
.........................................11
After the TS period all nodes wait for a DIFS before
Ps 
attempting to access the channel. Therefore the RS 1  1   n
Ps .Ptr .E P
period duration (TRS) is given by:
S RS  ....(12)
TRS  T frame  TTS  DIFS ..................................(7) 1  Ptr   Ptr .Ps .Ts  Ptr 1  Ps Tc
Ts  H  E P  SIFS    ACK  DIFS   ...13
Tc  H  E P *  DIFS   .......... .......... .......14 
(pure DCF) to the maximum possible slots in Tframe
Where  is the probability that a node transmits in a duration (pure TDMA). The payload size is 2312
randomly chosen slot time, p is the probability of bytes which is the maximum payload in 802.11 [14].
collision. These are found by solving Eq. (8) and Eq. The performance improves as the TS duration
(9). W is the window size, m defines the maximum increases reaching approximately 90% for pure
window size, n is the number of nodes, Ptr is the TDMA but then only 29 nodes can access the channel.
probability of at least one transmission in the Reducing the payload to 1000 bytes increases the
considered slot time, Ps is the probability of maximum number of slots to 53 but the maximum
successful transmission,  is the duration of a slot, Ts achievable throughput is less than 75% as shown in
is the average channel busy time due to successful Fig (7).
transmission, Tc is the average channel busy time due
to collision, H is the packet header, E[P] and E[P*]
are the average packet durations for successful
transmission and collision respectively and  is the
propagation delay [1]. Combining the throughput of
the TS with the throughput of the RS, the total
throughput of the frame is then:

STS  TTS  S RS  TRS


S .........................(15)
T frame

Note that if the RS period is smaller than the time


required to transmit a packet and its ACK, we set the
throughput of the RS period to zero.

6 RESULTS Figure 6: Throughput vs. No of Nodes


(Payload size = 2312B)
In this section we analyse the protocol and compare
its performance to the basic access method of DCF.
Fig (5) shows the efficiency (= data  packet size) and
number of TS slots versus the payload size assuming
TS duration = Tframe. As the payload size increases the
number of possible TS slots drops thus reducing the
overhead and wait time and improving efficiency but
the number of nodes that can access the channel
becomes smaller. Therefore there is a trade-off
between efficiency and number of TS slots.

Figure 7: Throughput vs. No of Nodes


(Payload size = 1000B)

Finally Fig (8) shows the performance of SOFT MAC


versus the payload size for a network of 50 nodes. For
a small payload size, the number of slots is high, thus,
the header becomes a considerable percentage of the
packet and the throughput drops. As the payload
Figure 5: Slot Efficiency and No. of TS slots vs. increases, the throughput increases but the possible
Payload Size number of TS slots decreases. A payload size of
approximately 500 bytes is the threshold for SOFT
Fig (6) shows the performance of SOFT MAC versus MAC to perform better than 802.11.
the number of nodes for TS durations starting from 0
Communications," IEEE Transactions on Intelligent
Transportation Systems, vol. 8, pp. 4-13, March 2007.
[7] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, "ADHOC
MAC: New MAC Architecture for Ad Hoc Networks
Providing Efficient and Reliable Point-to-Point and Broadcast
Services," Wireless Networks, vol. 10, pp. 359-366, 2004.
[8] Y. Gunter, B. Wiegel, and H. P. Grossmann, "Cluster-based
Medium Access Scheme for VANETs," in IEEE Intelligent
Transportation Systems Conference, Seattle, USA, Oct 2007,
pp. 343-348.
[9] S. Katragadda, C. N. S. Ganesh Murthy, M. S. Ranga Rao, S.
Mohan Kumar, and R. Sachin, "A decentralized location-based
channel access protocol for inter-vehicle communication," in
The 57th IEEE Semiannual Vehicular Technology Conference,
2003. VTC 2003-Spring, 22-25 April 2003, pp. 1831-1835.
[10]T.-K. Liu, J. A. Silvester, and A. Polydoros, "Performance
Evaluation of R-ALOHA in Distributed Packet Radio
Networks with Hard Real-time Communications", IEEE 45th
Vehicular Technology Conference,1995.
[11]X. Zhang, H. Su, and H.-H. Chen, "Cluster-Based Multi-
Channel Communications protocol in Vehicle Ad Hoc
Figure 8: Throughput vs. Payload Size (50 Nodes) Networks," in IEEE Wireless Communications, Oct 2006, pp.
44-51.
[12]F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, "ADHOC
7 CONCLUSION MAC: a new, flexible and reliable MAC architecture for ad-hoc
networks," in IEEE Wireless Communications and Networking,
In this paper we introduced and analysed a new MAC 2003, pp. 965-970 vol.2.
protocol for VANET known as SOFT MAC. The [13]C. Chih-Min, S. Jang-Ping, and I. C. Chou, "A load awareness
protocol divides the roads into cells and allocates each medium access control protocol for wireless ad hoc network,"
cell a group of subcarriers. Within the cell, the nodes in IEEE International Conference on Communications, 2003,
pp. 438-442.
share the available subcarriers using a combined [14]B. O'Hara and A. Petrick, IEEE 802.11 Handbook A Designer's
TDMA-CSMA protocol. Time is split into frames and Companion. New York: Institute of Electrical and Electronics
each frame has two periods. The first period consists Engineers Inc., 1999.
of transmission slots (TS period) and is accessed after [15]N. Reid and R. Seide, 802.11 (Wi-Fi) Networking Handbook.
USA: McGraw-Hill, 2003.
reservation. The second period is the reservation (RS) [16]J. Larocca and R. Larocca, 802.11 Demystified. USA:
period and is accessed using a random access McGraw-Hill, 2002.
technique (DCF). The RS period is used to send [17]Y. Zang, L. Stibor, B. Walke, H. J. Reumerman, and A.
reservation requests as well as data. A mathematical Barroso, "A Novel MAC Protocol for Throughput Sensitive
Applications in Vehicular Environments," in IEEE Vehicular
analysis of the saturation throughput was derived and Technology Conference, 22-25 April 2007, pp. 2580-2584.
used to analyse the protocol. Compared to 802.11 [18]X. Ma, P. Hrubik, H. Refai, and S. Yang, "Capture Effect on R-
basic access, SOFT MAC shows improvement in ALOHA Protocol for Inter-Vehicle Communications", IEEE
throughput as long as the payload size exceeds 500 62nd Vehicular Technology Conference,25-28 Sept 2005.
[19]F. Borgonovo, L. Campelli, M. Cesana, and L. Fratta, "Impact
bytes. As the TS period increases the performance of User Mobility on the Broadcast Service Efficiency of the
improves but the number of nodes that can access the ADHOC MAC protocol," in IEEE 61st Vehicular Technology
channel is reduced. Conference, 30 May -1 June 2005, pp. 2310-2314.

8 REFERENCES
[1] G. Bianchi, "Performance Analysis of the IEEE 802.11
Distributed Coordination Function," IEEE Journal on Areas in
Communications, vol. 18, pp. 535-547, March 2000.
[2] H. Fattah, "Analysis of the Channel Access Mechanism in
IEEE 802.11 Wireless Local Area Networks," in IEEE Pacific
Rim Conference on Communication, Computing and Signal
Processing, Aug 2007, pp. 74-77.
[3] L. Kleinrock and F. A. Tobagi, "Packet Switching in Radio
Channels: Part I-Carrier Sense Multiple-Access Modes and
Their Throughput-Delay Characteristics," IEEE Transactions
on Communications, vol. COM-23, pp. 1400-1416, Dec 1975.
[4] L. Kleinrock and F. A. Tobagi, "Packet Switching in Radio
Channels: Part II-Carrier Sense Multiple-Access Modes and
Their Throughput-Delay Characteristics," IEEE Transactions
on Communications, vol. COM-23, pp. 1417-1433, Dec 1975.
[5] S. V. Bana and P. Varaiya, "Space Division Multiple Access
(SDMA) for Robust Ad hoc Vehicle Communication
Networks," in IEEE Intelligent Transportation Systems
Conference, Oakland (CA) USA, 25-29 Aug 2001, pp. 962-
967.
[6] J. J. Blum and A. Eskandarian, "A Reliable Link-Layer
Protocol for Robust and Scalable Intervehicle

Vous aimerez peut-être aussi