Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks. Farzad Hassanzadeh

Size: px
Start display at page:

Download "Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks. Farzad Hassanzadeh"

Transcription

1 Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks by Farzad Hassanzadeh A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto Copyright c 2008 by Farzad Hassanzadeh

2 Abstract Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks Farzad Hassanzadeh Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2008 Broadcast communications is critically important in vehicular networks. Many safety applications need safety warning messages to be broadcast to all vehicles present in an area. In this thesis, we propose a novel repetition-based broadcast protocol based on optical orthogonal codes. Optical orthogonal codes are used because of their ability to reduce the possibility of collision. We present a detailed mathematical analysis for obtaining the probability of success and the average delay. Furthermore, we propose to use coding to increase network throughput, and adaptive elimination of potentially colliding transmissions to further increase reliability. We show, by analysis and simulations, that the proposed protocol outperforms existing repetition-based ones and provides reliable broadcast communications and can reliably deliver safety messages under load conditions deemed to be common in vehicular environments. We also show that the proposed protocol is able to provide different levels of quality of service. ii

3 Dedication To my beloved sister, Farnaz iii

4 Acknowledgements I wish to express my sincerest thanks to my supervisor, Prof. Shahrokh Valaee, whose support made this work possible. His knowledge, guidance, and encouragement has been of invaluable help to me in producing this work. I would also like to thank my colleagues at Wireless and Internet Research Laboratory (WIRLab) for their constructive comments. This work was supported by AUTO21 Network of Centres of Excellence and in-kind contributions of Mark IV Industries. iv

5 Contents 1 Introduction Motivation and Purpose Infrastructure Networks and Ad Hoc Networks Collision Avoidance Operation: A Map of the Neighbourhood Delay Requirement of Vehicular Communication Overview of Vehicular Communications Standards Scope and Objectives Contributions Background CSMA/CA-based Broadcast Protocols IEEE Wireless LAN Broadcast Support Multiple Access (BSMA) Broadcast Medium Window (BMW) Batch Mode Multicast MAC (BMMM) Location Aware Multicast MAC (LAMM) TRAcking DEtection (TRADE) Distance Defer Transfer (DDT) Urban Multihop Broadcast (UMB) Reliable Reservation ALOHA (RR-ALOHA) v

6 2.3 Repetition-based Broadcast Protocols Synchronous p-persistent Repetition (SPR) Synchronous Fixed Repetition (SFR) Other Protocols and Chapter Summary OOC-based Broadcast Protocol Broadcast using Optical Orthogonal Codes CDMA, Positive Optical Systems, and OOC Distributed Code Assignment Code Information Response Window Frame-Synchronous and Frame-Asynchronous OOC Code Generation Analytical Performance Study Probability of Success Probability of Success for SPR Probability of Success for SFR and OOC Probability of Success and Interference Probabilities Average Delay SPR SFR and OOC Numerical Results Adaptive Elimination, Coding, and QoS Provisioning Adaptive Elimination Coding Probability of Success with Coding Quality of Service Appendix: Proof of Proposition vi

7 6 Simulation Results Channel Model Protocol Performance Simulation Setup Probability of Success Performance versus Distance Setup Results Discussion Conclusions and Future Work Future Work Bibliography 97 vii

8 List of Tables 4.1 Possible codewords and their probabilities for one interfering user Sample values of p 1 obtained by generating OOC codes for various L and w 56 viii

9 List of Figures 1.1 Fatalities per 100 million vehicle-miles US Department of Transportation ITS architecture Obstacle causes abnormal road situation Chain collision avoidance Intersection collision avoidance Broadcast ad hoc medium access control protocols BMW protocol under ideal conditions for transmitting one data packet BMMM protocol under ideal conditions for transmitting one data packet Blocking: N7 becomes blocked because N6 is not able to transmit CTS Far nodes are in yield state, only node B receives the broadcast message Division of time into frames and timeslots for repetition-based broadcast A transmission pattern and its binary representation CDMA, OOC-based optical CDMA, and, OOC-based broadcast Network association phase CIQ and CIR transmissions Timeline of CIQ and CIR transmissions of Fig Circular and linear representation of a transmission pattern Frame-synchronous and frame-asynchronous transmissions Distribution of 1 s in a sample OOC ix

10 4.1 Approximate and sample values of p 1 for OOC Probability of failure of SPR Optimum average number of transmissions, w, for SPR Probability of failure of SFR Probability of failure of OOC Optimum number of transmissions, w, for SPR and OOC Optimum probability of failure for OOC, SFR, and, SPR Delay of successful transmissions for OOC, SFR, and, SPR Both u 1 and u 2 are scheduled to transmit in the third timeslot u 2 disables its transmission in the third timeslot Probability of success of SPR for different r s, L = 64, N = 31, w = Probability of success of SFR for different r s, L = 64, N = 31, w = Probability of success of OOC for different r s, L = 64, N = 31, w = High and low priority messages with different number of transmissions Map of roadway and cars Probability of failure versus w, for µ p = Probability of failure for r = 2 versus w, for µ p = Probability of failure for r = 3 versus w, for µ p = Average delay versus w, for µ p = Probability failure versus average delay Probability of success versus average load, for w = Throughput versus average load, for w = Providing different QoS levels with OOC Effect of Adaptive Elimination Comparison of analytical and simulation results: P s Comparison of analytical and simulation results: P s with coding x

11 6.13 Comparison of analytical and simulation results: Delay Probability of success vs. distance from the receiver for L = Probability of success vs. distance from the receiver for L = Probability of success vs. distance from the receiver for different QoS levels Simulation with and without capture xi

12 Chapter 1 Introduction 1.1 Motivation and Purpose According to the World Health Organization (WHO), road accidents annually cause approximately 1.2 million deaths and 50 million injuries worldwide [1]. If preventive measures are not taken, traffic accident death is likely to become the third cause of the loss of disability-adjusted life years (DALY) 1 in 2020 from ninth place in 1990 [2]. However, fatalities caused by car crashes are, in principle, avoidable. 21,000 of the annual 43,000 road accident deaths in the US are caused by roadway departures and intersection related incidents [3]. This number can be significantly lowered by deploying local warning systems enabled by vehicular communications. Departing vehicles can inform other vehicles of their intention to exit the highway and arriving cars at intersections can send warning messages to other cars traversing that intersection. Studies show that in western Europe a mere 5km/hr decrease in average vehicle speeds could result in 25% decrease in deaths [1]. Policing speed limits will be notably easier and more efficient using wireless communication technologies. Governments and manufacturers have been increasingly investing to find new ways 1 DALYs are the sum of the years of life lost due to premature mortality and the years lost due to disability. 1

13 Chapter 1. Introduction 2 to improve the safety of drivers, occupants, and pedestrians. Until recently, these efforts have generally been following a passive and non-cooperative approach. A passive safety system tries to minimize the casualties and cost of a collision by using devices such as air bags and shock absorbers but it is not able to prevent collisions. Many manufacturers have been deploying non-cooperative digital technologies into their vehicles wherein each vehicle tries to reach maximum possible safety by making decisions based on information that it has obtained individually. These systems include advanced braking systems and cruise control systems. In the United States, from 1960 to 2005, the rate of fatalities per vehicle-miles decreased from 5.1 fatalities per 100 million vehicle-miles (MVM) 2 to 1.5 [4]. As observed from Fig. 1.1, in spite of a sharp decline form 1965 to 1995, this rate has been roughly constant from 2000 to This may indicate that, although passive/non-cooperative safety systems have been effective in decreasing fatalities, these approaches alone are no longer capable of significantly reducing fatalities beyond the current state. Therefore, we are urged to move from passive/non-cooperative safety systems to active/cooperative safety systems, which can prevent accidents. Active/cooperative safety systems are part of a broad range of emerging communications, electronics, and informatics technologies, unified under Intelligent Transportation Systems (ITS), being developed to fundamentally enhance safety and productivity in surface transportation. ITS technologies are designed to significantly improve road travel by preventing accidents, decreasing congestion and gridlock, and enhancing traffic management and enforcement. ITS development relies, at its core, on a communication platform enabling fast and reliable communication in vehicular environments. Dedicated Short Range Communication (DSRC) standard, adopted by IEEE and ASTM International 3 (ASTM E [5]), provides the communication platform required by ITS [6]. The 2 Vehicle-miles: Miles of travel by all types of motor vehicles as determined by the states on the basis of actual traffic counts and established estimating procedures. 3 Originally known as the American Society for Testing and Materials

14 Chapter 1. Introduction Fatalities per 100 million vehicle miles Year Fig. 1.1: Fatalities per 100 million vehicle-miles importance of DSRC can be observed in ITS architecture illustrated in Fig. 1.2: DSRC is the enabling technology for supporting both vehicle to vehicle (V2V) and vehicle to roadside infrastructure (V2R) communication. To accommodate the need of ITS for communication infrastructure, in 1999, the U.S. Federal Communication Commission (FCC) allocated 75MHz bandwidth at 5.9GHz [8] to public and private vehicular communication applications based on DSRC. The 75MHz bandwidth is divided into seven 10MHz channels. Among the seven designated channels, one is assigned to V2V public safety communication (ch 172), one is assigned to intersection public safety (ch 184), four channels are assigned to public safety and/or private applications (ch 174, ch 176, ch 180, ch 182), and one channel is the control channel (ch 178) used mainly for broadcast traffic. Our goal in this work is to provide a Medium Access Control (MAC) protocol in ad hoc mode for broadcast communication. Such a MAC protocol must be able to reliably deliver safety-critical messages. Due to stringent delay requirements of safety traffic, transmission delay of a protocol designed for vehicular communication must be very low. Furthermore, a vehicular MAC must be capable of supporting mobility and effectively coordinating tens of sources of broadcast traffic.

15 Chapter 1. Introduction 4 Travelers Centers Remote Traveler Support Maintenance and Construction Management Traffic Management Emergency Management Toll Administration Commercial Vehicle Administration Personal Information Access Information Service Provider Emissions Management Transit Management Fleet and Freight Management Archived Data management Fixed-Point to Fixed-Point Communication Wide Area Wireless (Mobile) Communication Vehicles Maintenance and Construction Vehicle Transit Vehicle Commercial Vehicle Emergency Vehicle Vehicle to Vehicle Communication Vehicle Dedicated Short Range Communication Roadway Security Monitoring Toll Collection Parking Management Field Commercial Vehicle Check Fig. 1.2: US Department of Transportation ITS architecture [7] The rest of this chapter is organized as follows. In Section 1.2 we consider the choice between infrastructure and ad hoc communication for safety systems. Characteristics of the communication traffic of cooperative safety systems are presented in Section 1.3, noting that knowledge of a relative map of neighbouring vehicles is effective in collision prevention. Delay requirements of safety messages are described in Section 1.4. An overview of vehicular communication standards is given in Section 1.5. The scope and objectives of this work are presented in Section 1.6 and the main contributions of this thesis are listed in Section 1.7.

16 Chapter 1. Introduction Infrastructure Networks and Ad Hoc Networks One of the main questions that must be explored for designing a MAC protocol is the need for and the possibility of using infrastructure in the network. In this section, we identify situations in which a vehicular network requires infrastructure and situations that can be handled in ad hoc mode by considering some of the envisioned safety applications. Line-of-Sight Collision Prevention In this situation, all the vehicles, bikes, and pedestrians involved in a dangerous situation are within line-of-sight of others. This has two consequences. First, drivers usually identify the danger but in cases that result in accidents, recognition of dangerous situation is so late that preventive actions taken by drivers are not effective in preventing a collision. Therefore, safety systems must be capable of warning drivers noticeably faster than their own ability to identify a dangerous situation. Second, the possibility of line-of-sight communication alleviates the need for infrastructure. We provide two examples of lineof-sight crash prevention in the following. Obstacle Information Dissemination Fig. 1.3 shows a sample scenario in which part of a road is closed due to an obstacle. Although in some cases, such as constructions, (visual or radio) warning signals, set up in advance, inform the drivers to decelerate, in many situations, such as a piece of fallen freight being in the road, warning signals are absent. In the latter case, vehicular communication can be used to disseminate information about abnormal road conditions. In Fig. 1.3 car 2 transmits a warning message to all cars traveling behind it and within its communication range. It can be observed that an ad hoc communication system is capable of delivering the warning message and roadside units are not necessary.

17 Chapter 1. Introduction Obstacle Fig. 1.3: Obstacle causes abnormal road situation Preventing Chain Collisions A similar but more dangerous situation occurs when a car is forced to stop due to a sudden event such as abnormal behavior of another vehicle or an accident as illustrated in Fig Sudden deceleration in a highway may result in a collision or even a chain of collisions. To avoid rear-end collisions, drivers rely on brake lights of the car ahead of them to be able to stop in time. Needless to say, close distance, high speed, slow driver reaction, poor visibility, and/or poor road condition may, and occasionally do, prevent appropriate stopping and lead to accidents. Warning messages can be useful in informing drivers faster than they would recognize the danger without receiving warning messages. Warning messages can be particularly effective in avoiding chain collisions because drivers reaction usually depends on the physical reaction of the car immediately in front of them, i.e., a driver does not recognize the danger until the car immediately ahead brakes. Radio warning messages, on the other hand, are free from this limitation and, hence, can prevent chain collisions. Non-Line-of-Sight Collision Prevention An example of non-line-of-sight collision prevention is an intersection collision warning system. Intersection collisions constitute a major category of traffic collisions that are largely preventible. As illustrated in Fig. 1.5, however, line-of-sight communication is

18 Chapter 1. Introduction Fig. 1.4: Chain collision avoidance not usually possible especially in more dangerous cases in which visual recognition is difficult. In this situation, the warning message should be relayed from one vehicle to another one by an intermediate node. In cases with high traffic density, relaying can be done by another vehicle in the line-of-sight of the vehicles entering the intersection. However, in most cases, a relaying vehicle is not present and a roadside unit is needed to relay the warning message. Fig. 1.5: Intersection collision avoidance In situations that a roadside unit is not necessary, vehicular ad hoc network can provide effective and inexpensive networks to support ITS safety applications. Furthermore, vehicular ad hoc networks can provide communication with lower delay by delivering mes-

19 Chapter 1. Introduction 8 sages from vehicle to vehicle, eliminating the delay caused by transmitting messages to infrastructure and back to vehicles. Because vehicles moving in the same direction have lower speed relative to each other than to roadside units, problems caused by mobility are also alleviated in ad hoc networks. Nevertheless, in cases in which line-of-sight communication is not possible and one cannot rely on the presence of other vehicles to relay critical messages the presence of roadside units is necessary. From the above discussion, we conclude that a hybrid solution in which vehicular ad hoc networks provide the communication platforms in highways and rural areas, and roadside units are utilized in intersections and urban areas, is best suited to enable ITS safety message delivery. 1.3 Collision Avoidance Operation: A Map of the Neighbourhood In this section, we study the characteristics of the communication traffic in a vehicular network in a channel dedicated to safety communication. We assume that safety systems installed on each vehicle require a map of relative position of neighbouring vehicles. If positions of neighbouring vehicles are known to the safety systems, many collisions can be avoided. The distances to neighbouring vehicles being known, a safety system can appropriately warn the driver of potentially dangerous situations. The map can be used by the safety system to assist the driver in changing lane, entering and exiting highways and main roads, avoiding unsafe close distance to the vehicle immediately in front, and many other operations a driver needs to perform. If the velocity of the neighbours is also known, each vehicle can predict future positions and avoid possible collision-prone situations. Building a local map in each vehicle requires that: 1) each vehicle be able to discover its own absolute or relative position, and 2) vehicles be able to communicate position

20 Chapter 1. Introduction 9 information. Discovering the position of a vehicle can be done via GPS [9], radio ranging techniques [10], and/or, radar. Our focus in this thesis is on providing the second requirement, i.e., the design of a medium access protocol that is capable of delivering position information messages, as well as other data. At 100km/hr, a vehicle moves 6m (approximately the accuracy of GPS) in 216ms. Therefore, update frequency of approximately 5 messages/second guarantees accurate and up-to-date maps. However, if vehicles can accurately estimate their velocity, position prediction can be used to alleviate the need for update and lessen the number of update messages required. A well-designed medium access control layer must be capable of successfully delivering messages with said frequencies. Since vehicular update messages need to deliver limited information such as vehicle ID, message ID, position, velocity, road condition, warning, etc, the size of these messages is under a few hundred bytes. Location information, on the Earth s surface, in a spherical system with fixed r coordinate and 1 cm resolution can be delivered with log 2 (2π m/10 2 m) + log 2 (π m/10 2 m) = bits where m is the Earth s radius. Relative location information within 100m (in a 200m 200m square centered at the reference point) in a Cartesian system with 1 cm resolution can be delivered with 2 log 2 (200 m/10 2 m) = bits. Assuming each vehicle transmits its position in absolute form and its velocity and the positions and the velocities of vehicles immediately in front, behind, left, and right in relative to the absolute position, ( ) = 324 bits or 41 bytes need to be transmitted. Adding 2 bytes for the ID of each vehicle, in total 51 bytes is needed. If about 49 bytes are allocated for other uses, such as obstacle and its position, emergency car and its position, emergency braking, etc, the length of the safety message is about 100 bytes. Therefore, in vehicular communications, safety messages are short compared to data or multimedia messages. Assuming 30m separation between adjacent cars traveling in the same lane, in 300m of

21 Chapter 1. Introduction 10 one lane of a road, there are approximately 10 cars. If the radius of the neighbourhood for which vehicles construct a local map is considered to be 300m, depending on the number of lanes, tens of vehicles are within the communication range of a vehicle. Any protocol designed for vehicular communication must be able to support tens of nodes in the network. Whether or not a map is used for collision avoidance, any medium access control protocol must be scalable and flexible. A vehicular communication system in a crowded highway spans hundreds of kilometers and thousands of cars. Although communication is local and vehicles far from each other need not communicate for safety reasons, vehicles that are physically close to each other must always be able to communicate regardless of the logical structure of a protocol. 1.4 Delay Requirement of Vehicular Communication An automatic safety system is successful if it can recognize a dangerous situation before the driver of a vehicle does. For example, if the car immediately ahead suddenly stops, the driver needs to detect the brake lights, decide that the brakes should be applied, and move the appropriate muscles to apply the brakes. The mental processing time, i.e., the time from the moment an event occurs until the moment a decision is made, is between 500ms to 1.2s, depending on how unexpected the event is [11]. Noting that the warning message alerting a driver, itself needs to be processed, we conclude that communication delay must not exceed ms. This value is, henceforth, called the lifetime of a safety message. Note that the lifetime value assumed here is in agreement with 5 messages per second update frequency explained in the previous section.

22 Chapter 1. Introduction Overview of Vehicular Communications Standards IEEE a is adopted as the base MAC/PHY layer standard for DSRC [12]. The modification to a, to make it suitable for vehicular communications and capable of supporting ITS applications, is called IEEE p standard for Wireless Access in Vehicular Environments (WAVE) [13]. WAVE is based on testing and analyses of wireless communications in a mobile environment published in [5]. Draft 3.05 of p WAVE is the most recent version [14]. According to IEEE p, a compliant vehicular communication network supports both vehicular on-board units (OBU) and roadside units (RSU). An RSU is similar to a wireless LAN access point and can provide communications with infrastructure [13]. Also, if required, an RSU must be able to allocate channels to OBUs. There is a third type of communicating nodes called Public Safety OBU (PSOBU) which is a vehicle with capabilities of providing services normally offered by RSUs. These units are mainly utilized in police cars, fire trucks, and ambulances in emergency situations. DSRC provides several channels (seven 10 MHz channels in North America) for communications which are divided into two categories: a control channel and service channels. The control channel is reserved for broadcasting and coordinating communications which generally takes place in other channels. Although DSRC devices are allowed to switch to a service channel, they must continuously monitor the control channel. There is no scanning and association as in the conventional All such operations are done via a beacon sent by RSUs in the control channel. While OBUs and RSUs are allowed to broadcast messages in the control channels, only RSUs can send beacon messages. The complement of WAVE in higher layers is IEEE 1609 which is a family of standards dealing with issues such as management and security of the networks [15]: Resource Manager: This standard provides a resource manager for WAVE, allowing communication between remote applications and vehicles.

23 Chapter 1. Introduction Security Services for Applications and Management Messages Networking Services: This standard addresses network layer issues Multi-channel Operation: This standard deals with communications through multiple channels. 1.6 Scope and Objectives In this thesis, we propose and analyze a reliable medium access control protocol with low delay for supporting safety message broadcasting in a vehicular network. We aim at developing a protocol that is capable of satisfying low delay requirements of safety messages while being able to deliver messages with high reliability. A major difference between an ad hoc network in vehicular environment and a conventional ad hoc network is that in vehicular networks, as discussed earlier, traffic is of broadcast type; routine safety messages are issued from all vehicles several times per second and are intended for all their neighbours. Transmission of safety messages must be reliable and with very low delay. Conventional MAC protocols for ad hoc networks are not designed to handle broadcast traffic from many nodes in the network. For example, as explained in more detail in Chapter 2, in IEEE no mechanism exists to reduce the probability of collision for broadcast traffic. In IEEE , Request To Send (RTS) and Clear To Send (CTS) packets are transmitted before unicast communications to avoid collisions. It may seem straight forward to add RTS/CTS handshake to broadcast communications as well. However, in vehicular communication, the length of broadcast messages is short and comparable to that of RTS. Therefore, the probability of collision is not significantly lower for RTS packets. The short length of messages also contributes to inefficiency since the payload (safety message) is not significantly larger than the overhead (RTS+CTS). Furthermore, RTS/CTS handshake needs to be performed with more than one receiver to obtain the same reliability as that of unicast communication.

24 Chapter 1. Introduction 13 A solution to reliable delivery of safety broadcast messages is repetition-based broadcast. In repetition-based broadcast, the safety message is transmitted several times according to a transmission pattern. While repetition increases the probability of successful delivery compared to the ALOHA approach of IEEE , previously proposed transmission patterns are random and have no mechanism for avoiding collision among users. In this work, after reviewing the literature in Chapter 2, we propose a new protocol based on Optical Orthogonal Codes (OOC) to decrease collisions in Chapter 3. Optical orthogonal codes, originating from optical code division multiple access, have good properties which, as we show with analysis and simulations, decrease the probability of collision when used as transmission patterns in a repetition-based broadcast protocol. We present a code assignment mechanism that assigns a transmission pattern to each user which is unique within its two-hop neighbourhood. The generation of optical orthogonal codes is also discussed. A detailed analytical performance study is provided in Chapter 4, resulting in expressions for the probability of success and the average delay. The analysis is valid for previously proposed repetition-based broadcast protocols, OOC-based repetition broadcast, and other repetition-based broadcast protocols with fixed number of transmissions. Numerical results, obtained from the analysis, provide performance evaluation for different protocols and indicate that repetition broadcast based on OOC exhibits higher probability of success and similar delay compared to other repetition-based protocols. Following the analytical performance study, in Chapter 5, improvements to the protocol are presented. Adaptive elimination is introduced to further increase the reliability of the protocol by eliminating potential collisions. Furthermore, the use of coding in the proposed protocol is explained. Coding helps increase the throughput of the network. Since QoS provisioning is a desirable feature of vehicular networks, a method for providing different QoS levels is also introduced.

25 Chapter 1. Introduction 14 In Chapter 6, simulation results are presented to show the performance of the proposed protocol, in an environment with a traffic load similar to that required by the ITS safety applications, and compared to the performance of other repetition-based protocols. Simulation results demonstrate the superior performance of OOC-based broadcast and show that its performance is improved by adaptive elimination and coding. Finally, in Chapter 7, we end this work with our concluding remarks and provide directions for future work. 1.7 Contributions The main contribution of this work is the design of a novel medium access control protocol for broadcast communication in vehicular communication networks. The proposed protocol is suitable for transmission of short routine safety messages issued by vehicles to inform others of their position and other useful information. The protocol makes use of good correlation properties of optical orthogonal codes to avoid collisions. The following lists the contributions of this work, the chapter in which they were presented, and any publication reporting them. MAC Design based on OOC: Introduced and studied OOC-based repetition protocols for broadcast communications (Chapter 3 and [16], [17]) Performance Study: Developed a generalized analytical framework not only capable of analyzing OOC-based broadcast but also previously proposed repetitionbased broadcast protocols and any repetition-based broadcast protocol with a fixed number of repetitions (Chapter 4 and [16]) and presented simulation results (Chapter 6 and [16], [17]) Coding, QoS, and Adaptive Elimination: Introduced and studied methods to improve reliability, throughput, and quality of service provisioning in repetition-

26 Chapter 1. Introduction 15 based broadcast (Chapter 5 and [16], [17])

27 Chapter 2 Background In this chapter, we look at previous works focusing on the reliability of broadcast communication in ad hoc networks (vehicular or otherwise). Protocols applicable to vehicular communications can be divided into five categories as shown in Fig Among these categories we discuss protocols from the first three categories: Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)-based protocols, reservation-based protocols, and repetition-based protocols. CSMA/CA-based protocols are modifications of IEEE that extend the use of Collision Avoidance (CA) mechanism, which in IEEE is used only for unicast communications, to broadcast and are discussed, along with IEEE , in Section 2.1. These modifications incorporate RTS/CTS/ACK handshake into IEEE broadcast to force hidden terminals into yield state in order to avoid collisions. They may require the handshake to be performed with all receivers, a subset of receivers, or only one receiver. Reliable Reservation ALOHA (RR-ALOHA), a slot reservation protocol suggested for vehicular networks [18], is discussed in Section 2.2. In RR-ALOHA users reserve a timeslot in a frame for transmission. Synchronous p-persistent Retransmission (SPR) and Synchronous Fixed Retransmis- 16

28 Chapter 2. Background 17 Broadcast Ad hoc MAC protocols CSMA/CA-based protocols Reservationbased protocols Repetition-based protocols Cluster-based protocols BTMA-based protocols RR-ALOHA SPR SFR OOC IEEE BSMA BMW BMMM LAMM TRADE DDT UMB Fig. 2.1: Broadcast ad hoc medium access control protocols sion (SFR) [19], repetition-based protocols proposed to solve broadcast problems, are discussed in Section 2.3. The proposed protocol in this thesis is also a repetition-based protocol. Analytical and simulation results are presented for SPR and SFR along with the proposed protocol in later chapters. The main challenge in cluster-based protocols is not the medium access control protocol but the formation of stable clusters. Therefore, these protocols are not considered here. Also, Busy Tone Multiple Access (BTMA) protocols, such as [20], cannot be used in the single control channel of DSRC and, therefore, not discussed in this chapter. For each protocol described in this chapter, we discuss its suitability for broadcast in vehicular environments.

29 Chapter 2. Background CSMA/CA-based Broadcast Protocols IEEE Wireless LAN In IEEE , Request To Send (RTS)/ Clear To Send (CTS) handshake is the main means of combating the hidden terminal problem. However, broadcasting nodes do not generally use RTS/CTS packets [21]. The lack of RTS/CTS handshake for broadcast communication results in unreliable and inefficient communication. The situation is worse in vehicular environments when there are tens of nodes within single-hop communication range. For unicast communications, acknowledgement (ACK) packets are transmitted by receiving nodes to ensure recovery if transmission has not been successful. For broadcast communication, however, acknowledgement is not required in IEEE [22]. This increases the unreliability of transmission of safety broadcast messages. Lack of acknowledgements also increases the risk of network instability. Since the transmitting node cannot detect an unsuccessful transmission, it fails to change the size of its Contention Window (CW) [23]. Therefore, under heavy load, the size of contention window is not increased to reduce the probability of collisions and the possibility of instability is increased. Although WAVE is built upon wireless LAN, the requirements for reliable and low delay communication, especially broadcast, are not achieved by using the current standard without appropriate modification and enhancements as commonly observed in the literature [6], [8], [20], [24] [32]. Furthermore, unicasting such short messages as in vehicular safety communications (see Section 1.3), with approach is very inefficient. According to a model devised by Bianchi [33], the maximum bandwidth utilization of a with RTS/CTS handshake, at 54 Mb/s, with payload size of 100 bytes is less than 7% [8]. Multiple RTS/CTS handshakes, as proposed by some of the protocols discussed in this chapter, will further

30 Chapter 2. Background 19 decrease the efficiency Broadcast Support Multiple Access (BSMA) A simple extension to IEEE which adds RTS/CTS signaling to broadcast packets is presented in [34]. The protocol works as follows. After going through carrier sensing and a contention phase, the source node broadcasts an RTS packet and waits a certain time for a CTS, which, if received, triggers DATA transmission. With this approach, however, the collision of CTS packets is very likely. To solve the problem of collision of CTS packets, the authors suggest: Using a radio with capture capability so that one CTS packet is successfully received. In this case, it is assumed that one of the CTS packets is sufficiently stronger than others and can be received with a capture-enabled radio. This assumption, however, is unrealistic since CTS packets are likely to have similar received power. The source node s radio detects the busy period resulting from a collision as a CTS and starts transmitting if it detects a busy period in the channel after transmitting RTS. In this case the main purpose of CTS packets, which is to force hidden terminals to yield, is overlooked. Hidden terminals cannot distinguish a busy period resulted from colliding CTS packets from any other collision. In Broadcast Support Multiple Access (BSMA) [35], NAK signaling is added to the above protocol. The collision of control packets, however, remains unresolved Broadcast Medium Window (BMW) The fundamental idea behind Broadcast Medium Window (BMW) [27] is to increase the reliability of broadcast transmission by transmitting the broadcast packet to every neighbour using RTS/CTS/ACK transmissions in a round robin fashion. If a neighbour

31 Chapter 2. Background 20 has already received the packet, the data packet is not transmitted. All transmissions in BMW also follow CSMA/CA rules. In BMW, each node maintains a list of its neighbours. Consider a node wishing to broadcast a queue of packets to its neighbours. The broadcasting node chooses one of its neighbours as the current receiver and transmits an RTS to that node. The receiving node transmits a CTS in which it includes the sequence number of the packet up to which all packets are received successfully. Then, the broadcasting node transmits packets starting from the sequence number indicated in the CTS packet using DATA/ACK transmissions. Meanwhile, all other nodes, other than the current receiver, are also receiving the packets and store all successfully received packets. The packet transmission to the current receiver continues until a new packet, which has not previously been transmitted to any other node, is transmitted to the receiver. At this point the broadcasting node chooses another neighbour and continues this process until all packets are transmitted. BMW is only efficient when the transmission queue contains several packets. Therefore, it is only suitable for burst traffic, or delay insensitive traffic which can be shaped into bursts of packets. When traffic arrives in the form of single packets in the presence of n neighbours, in ideal channel with no collision, as illustrated in Fig. 2.2, there are n contention periods, n RTS transmissions, n CTS transmissions, n ACK transmissions, and one DATA transmission. High number of control packets and contention periods induce unacceptably high delays, which is increased, even more, in realistic channel conditions with collisions, with back-offs, and retransmissions. Since traffic arrival in vehicular environments is in form of single packets with low delay requirements (in the range of 100ms) and there are tens of nodes in the network, BMW is not suitable for vehicular communications.

32 Chapter 2. Background 21 Contention Phase RTS1 CTS1 CTS1 RTS1 DATA ACK1 Contention Phase RTS2 CTS2 CTS2 RTS2 ACK2... Contentio n Phase RTSn CTSn CTS2 RTSn ACKn Fig. 2.2: BMW protocol under ideal conditions for transmitting one data packet Contention Phase RTS1 CTS1 RTS2 CTS2 CTS2 RTS2... RTS1 CTS1 RTS2 CTS2... RTSn CTSn DATA RAK1... ACK1 RAK2 ACK2... RAKn ACKn Fig. 2.3: BMMM protocol under ideal conditions for transmitting one data packet Batch Mode Multicast MAC (BMMM) Contention Phase RTS1 CTS1 RTS2 CTS2... RTS2 CTS2 RTS1 CTS1 RTS2 CTS2... RTSn CTSn DATA RAK1... ACK1 Batch Mode Multicast MAC (BMMM) [31] is a protocol that decreases the number of contention periods of BMW. This is done by sequentially transmitting a RTS to all neighbours and receive a CTS. DATA is transmitted after receiving the last CTS packet. After transmitting the DATA packet, the broadcasting node sequentially requests acknowledgements from the receivers via Request for Acknowledgement (RAK) packets. The ideal operation of the protocol, where channel is perfect and none of the receiving nodes are in yield state, is illustrated in Fig By decreasing the number of contention periods from n to 1, BMMM decreases the delay. However, BMMM does not decrease the significant overhead produced by control RAK2 ACK2... RAKn ACKn packets. Furthermore, note that the yield duration indicated in CTS packets is significantly increased. For example, receiving node 1 in Fig. 2.3 forces all its neighbours to yield state for the whole duration of transmissions to all nodes while its neighbours need to be in yield state only for the duration of DATA and RAK1. This unnecessary increase in yield state duration results in increased inefficiency. Probability of blocking and blocking propagation [36], also, increases because of long yield states. Blocking is illustrated in Fig N7 becomes blocked due to the following events:

33 Chapter 2. Background 22 At t 1, N1 transmits an RTS to N2. N3, N4, and N5 yield upon reception. At t 2, N2 transmits a CTS to N1. N6 yields upon reception. At t 3, N7 transmits an RTS to N6. N8, N9, and N10 yield upon reception. At t 4, N7 does not receive a CTS and goes into exponential back-off. While transmission from N7 would not interfere with any ongoing transmissions, N7 is prohibited from transmission. Other nodes in yield state may also result in blocking of other nodes. Longer durations indicated in RTS and CTS packets cause longer yield states and, therefore, the probability that a node in yield state becomes the recipient of an RTS is increased and so is the probability of blocking of the node transmitting the RTS. N3 N9 t2:cts t2:cts t3:rts N4 N1 N2 N6 N7 N8 t1:rts N5 N10 Fig. 2.4: Blocking: N7 becomes blocked because N6 is not able to transmit CTS Another problem with long yield durations indicated in CTS/RTS arises from high mobility in vehicular environments. A node outside the range of a RTS/CTS packet may move into the transmission range, not having heard the RTS/CTS. This node may potentially start transmission that collides with ongoing transmissions. When the duration indicated in RTS/CTS is larger, the probability of topology change during that time is higher and, therefore, the probability of collision due to topology change is also higher.

34 Chapter 2. Background Location Aware Multicast MAC (LAMM) Location Aware Multicast MAC (LAMM) [31] improves the performance of BMMM by introducing cover sets. A cover set of the receivers of a broadcast message, transmitted by a certain transmitter, is a subset of receivers whose radio coverage, is the same as the radio coverage of all receivers. Therefore, if only nodes in the cover set send CTS packets, the effect is the same as when all receiving nodes send CTS. Furthermore, only nodes in the cover set receive RAK and transmit ACK. Determining the cover set requires position estimation which can be obtained via GPS. While LAMM decreases the number of control transmissions, the amount of decrease is not discussed in [31]. The duration indicated in CTS/RTS control packets is also still larger than that of BMW. It might be possible to modify LAMM to adapt it to vehicular environment and decrease its overhead and CTS durations significantly. Exploring this possibility requires further research. The next three protocols introduce methods of finding one receiver and perform handshake with only that node instead of all the recipients to decrease the overhead caused by control packets TRAcking DEtection (TRADE) TRAcking DEtection (TRADE) protocol introduced in [37], is a protocol which uses location information to find the farthest node in each direction to eliminate the broadcast storm problem [22] caused by flooding in multi-hop broadcast. However, this protocol can be modified to increase the reliability of single-hop broadcast compared to IEEE By modifying a simplified version of TRADE we obtain a protocol that works as follows. The broadcasting node chooses the farthest node within its communication range, and unicasts the broadcast packet to that node in each direction on a straight road using RTS/CTS/ACK handshakes. Approximating the positions of vehicles as being on a straight line, if the farthest vehicle receives the message without collision, so do all vehicles

35 Chapter 2. Background 24 between the source and the farthest vehicle. This approach, however, has drawbacks. TRADE assumes the positions of vehicles are known by transmitting GPS messages. This can be problematic since GPS messages also need to be broadcast routinely. Since collisions are not the sole reason of packet loss, an intermediate node may still lose the packet due to noise, fading, or a large vehicle blocking line-of-sight while the farthest node receives it successfully. A broadcast message is of much more importance to the nearest vehicle than it is to the farthest. Therefore, if the farthest node is in yield state, the message is not transmitted and its lifetime may expire, while the closet node, which is its more important target, would be able to receive it without interference Distance Defer Transfer (DDT) Distance Defer Transfer (DDT) [37] is proposed to eliminate the need for a priori position information in TRADE, which is one of its drawbacks. DDT, similar to TRADE, is designed to combat the broadcast storm problem. However, it can be modified to increase the reliability of broadcast communication. In this modification of a simplified DDT protocol, the source node broadcasts the RTS packet in which the position of the sender is included. Each of the receiving nodes start a timer whose value is a decreasing function of their distance from the source. When a node s timer expires, if no other node has transmitted a CTS, that node transmits a CTS. This approach solves the first problem mentioned above, but the second and third problems remain unresolved. Furthermore, the likely collision of CTS s (or re-broadcasts in the original protocol) when the distance of two nodes is roughly the same from the source is ignored.

36 Chapter 2. Background Urban Multihop Broadcast (UMB) The design of Urban Multihop Broadcast (UMB) protocol [38] is aimed at finding the farthest node without a priori neighbourhood information. This protocol, basically, works as follows. The broadcasting node sends a Request-To-Broadcast (RTB) packet in which a desired direction of transmission is indicated. Each receiving node in the correct direction, transmits a jamming signal (black-burst), duration of which is proportional to its distance from the source and is an integral number of Short InterFrame Spaces (SIFS). After transmitting black-burst, each node listens to the channel. If it is the last node transmitting black-burst, it is chosen as the farthest node and continues to transmit a Clear-To-Broadcast (CTB) packet. The broadcasting node, then, transmits the DATA packet and receives an ACK packet from the farthest node. It is possible for two or more nodes to transmit black-bursts with the same length. In this case, they all transmit CTB packets leading to collision. If the broadcasting node senses the channel to be busy but is unable to decode the transmission, it assumes that two or more CTB packets have collided. In this case, it issues another RTB packet. In responding to the second RTB, only nodes that have transmitted after receiving the previous RTB compete for the channel by transmitting black-bursts. This procedure is iterated until a node successfully transmits CTB or a certain number of iterations is reached in which case the nodes that have transmitted the last CTB packets enter a random resolution phase which, if necessary, is repeated a certain number of times. If random resolution is also unsuccessful, the broadcasting node restarts the transmission from the beginning. Starting the node selection from the beginning may happen RET max times, after which the broadcasting node enters the back-off mode. While UMB manages to decrease the overhead, it puts too much emphasize on finding the farthest node while, as mentioned before, in vehicular communications, the closest node is the most important receiver. By the time the contention between far nodes is resolved, the life time of the message may have expired.

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding. Behnam Hassanabadi

Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding. Behnam Hassanabadi Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding by Behnam Hassanabadi A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate

More information

VEHICULAR ad hoc networks (VANETs) are becoming

VEHICULAR ad hoc networks (VANETs) are becoming Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast

More information

Communication Networks. Braunschweiger Verkehrskolloquium

Communication Networks. Braunschweiger Verkehrskolloquium Simulation of Car-to-X Communication Networks Braunschweiger Verkehrskolloquium DLR, 03.02.2011 02 2011 Henrik Schumacher, IKT Introduction VANET = Vehicular Ad hoc NETwork Originally used to emphasize

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networks

Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networks Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networs Farzad Farnoud (Hassanzadeh) and Shahroh Valaee Abstract Broadcast communications is critically important in vehicular networs. Many safety

More information

Safety Communication for Vehicular Networks: Context-Aware Congestion Control and Cooperative Multi-Hop Forwarding. Le Zhang

Safety Communication for Vehicular Networks: Context-Aware Congestion Control and Cooperative Multi-Hop Forwarding. Le Zhang Safety Communication for Vehicular Networks: Context-Aware Congestion Control and Cooperative Multi-Hop Forwarding by Le Zhang A thesis submitted in conformity with the requirements for the degree of Doctor

More information

Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networks

Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networks Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Netors Farzad Farnoud and Shahroh Valaee Abstract Broadcast communications is critically important in vehicular netors. Many safety applications

More information

Wireless technologies Test systems

Wireless technologies Test systems Wireless technologies Test systems 8 Test systems for V2X communications Future automated vehicles will be wirelessly networked with their environment and will therefore be able to preventively respond

More information

For Review Only. Wireless Access Technologies for Vehicular Network Safety Applications

For Review Only. Wireless Access Technologies for Vehicular Network Safety Applications Page of 0 0 0 Wireless Access Technologies for Vehicular Network Safety Applications Hassan Aboubakr Omar, Ning Lu, and Weihua Zhuang Department of Electrical and Computer Engineering, University of Waterloo,

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Inter- and Intra-Vehicle Communications

Inter- and Intra-Vehicle Communications Inter- and Intra-Vehicle Communications Gilbert Held A Auerbach Publications Taylor 5* Francis Group Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Croup, an informa business

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

WHITE PAPER BENEFITS OF OPTICOM GPS. Upgrading from Infrared to GPS Emergency Vehicle Preemption GLOB A L TRAFFIC TE CHNOLOGIE S

WHITE PAPER BENEFITS OF OPTICOM GPS. Upgrading from Infrared to GPS Emergency Vehicle Preemption GLOB A L TRAFFIC TE CHNOLOGIE S WHITE PAPER BENEFITS OF OPTICOM GPS Upgrading from Infrared to GPS Emergency Vehicle Preemption GLOB A L TRAFFIC TE CHNOLOGIE S 2 CONTENTS Overview 3 Operation 4 Advantages of Opticom GPS 5 Opticom GPS

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety Vehicular Technology Volume 211, Article ID 71848, 1 pages doi:1.1155/211/71848 Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety Bin Hu and Hamid

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

From Communication to Traffic Self-Organization in VANETs

From Communication to Traffic Self-Organization in VANETs From Communication to Traffic Self-Organization in VANETs Gianluigi Ferrari, 1 Stefano Busanelli, 1 Nicola Iotti 2 1 WASN Lab, Dept. of Information Eng., UniParma, Italy 2 Guglielmo Srl, Pilastro (Parma),

More information

Chapter- 5. Performance Evaluation of Conventional Handoff

Chapter- 5. Performance Evaluation of Conventional Handoff Chapter- 5 Performance Evaluation of Conventional Handoff Chapter Overview This chapter immensely compares the different mobile phone technologies (GSM, UMTS and CDMA). It also presents the related results

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

RECOMMENDATION ITU-R M.1310* TRANSPORT INFORMATION AND CONTROL SYSTEMS (TICS) OBJECTIVES AND REQUIREMENTS (Question ITU-R 205/8)

RECOMMENDATION ITU-R M.1310* TRANSPORT INFORMATION AND CONTROL SYSTEMS (TICS) OBJECTIVES AND REQUIREMENTS (Question ITU-R 205/8) Rec. ITU-R M.1310 1 RECOMMENDATION ITU-R M.1310* TRANSPORT INFORMATION AND CONTROL SYSTEMS (TICS) OBJECTIVES AND REQUIREMENTS (Question ITU-R 205/8) Rec. ITU-R M.1310 (1997) Summary This Recommendation

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

GPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems

GPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems GPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems Chaminda Basnayake, Ph.D. Senior Research Engineer General Motors Research & Development and Planning

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Evaluation of Connected Vehicle Technology for Concept Proposal Using V2X Testbed

Evaluation of Connected Vehicle Technology for Concept Proposal Using V2X Testbed AUTOMOTIVE Evaluation of Connected Vehicle Technology for Concept Proposal Using V2X Testbed Yoshiaki HAYASHI*, Izumi MEMEZAWA, Takuji KANTOU, Shingo OHASHI, and Koichi TAKAYAMA ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

V2X-Locate Positioning System Whitepaper

V2X-Locate Positioning System Whitepaper V2X-Locate Positioning System Whitepaper November 8, 2017 www.cohdawireless.com 1 Introduction The most important piece of information any autonomous system must know is its position in the world. This

More information

Adaptive Transmission Scheme for Vehicle Communication System

Adaptive Transmission Scheme for Vehicle Communication System Sangmi Moon, Sara Bae, Myeonghun Chu, Jihye Lee, Soonho Kwon and Intae Hwang Dept. of Electronics and Computer Engineering, Chonnam National University, 300 Yongbongdong Bukgu Gwangju, 500-757, Republic

More information

Local Density Estimation for Contention Window Adaptation in Vehicular Networks

Local Density Estimation for Contention Window Adaptation in Vehicular Networks Local Density Estimation for Contention Window Adaptation in Vehicular Networks Razvan Stanica, Emmanuel Chaput, André-Luc Beylot University of Toulouse Institut de Recherche en Informatique de Toulouse

More information

Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes

Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes System Release 13.1.3 1 INTRODUCTION This document provides information for the

More information

Wireless Transmission & Media Access

Wireless Transmission & Media Access Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,

More information

Physical Carrier Sense in Vehicular Ad-hoc Networks

Physical Carrier Sense in Vehicular Ad-hoc Networks Physical Carrier Sense in Vehicular Ad-hoc Networks Razvan Stanica, Emmanuel Chaput, André-Luc Beylot University of Toulouse Institut de Recherche en Informatique de Toulouse IEEE 8 th International Conference

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Comparison of Collision Avoidance Systems and Applicability to Rail Transport

Comparison of Collision Avoidance Systems and Applicability to Rail Transport Comparison of Collision Avoidance Systems and Applicability to Rail Transport Cristina Rico García, Andreas Lehner, Thomas Strang and Matthias Röckl Institute of Communication and Navigation Page 1 Cristina

More information

AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS)

AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS) AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS) 1.3 NA-14-0267-0019-1.3 Document Information Document Title: Document Version: 1.3 Current Date: 2016-05-18 Print Date: 2016-05-18 Document

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment IEEE 802.11 Wireless Access Method and Physical Layer Specification Title: Author: Proposal For the Use of Packet Detection in Clear Channel Assessment Jim McDonald Motorola, Inc. 50 E. Commerce Drive

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Raising Awareness of Emergency Vehicles in Traffic Using Connected Vehicle Technologies

Raising Awareness of Emergency Vehicles in Traffic Using Connected Vehicle Technologies Raising Awareness of Emergency Vehicles in Traffic Using Connected Vehicle Technologies Larry Head University of Arizona September 23, 2017 1 Connected Vehicles DSRC 5.9 GHz Wireless Basic Safety Message

More information

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA CS 294-7: Wireless Local Area Networks Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996 1 Desirable Features Ability to operate worldwide Minimize power

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

CONNECTED VEHICLE-TO-INFRASTRUCTURE INITATIVES

CONNECTED VEHICLE-TO-INFRASTRUCTURE INITATIVES CONNECTED VEHICLE-TO-INFRASTRUCTURE INITATIVES Arizona ITE March 3, 2016 Faisal Saleem ITS Branch Manager & MCDOT SMARTDrive Program Manager Maricopa County Department of Transportation ONE SYSTEM MULTIPLE

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning 1 Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning Xue Yang, Jie Liu, Feng Zhao and Nitin H. Vaidya bstract This paper proposes a vehicle-to-vehicle communication protocol for

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN

More information

Design of 5.9GHz DSRC-based Vehicular Safety Communication

Design of 5.9GHz DSRC-based Vehicular Safety Communication Design of 5.9GHz DSRC-based Vehicular Safety Communication Daniel Jiang 1, Vikas Taliwal 1, Andreas Meier 1, Wieland Holfelder 1, Ralf Herrtwich 2 1 DaimlerChrysler Research and Technology North America,

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Projekt Sichere Intelligente Mobilität Testfeld Deutschland. Project Safe Intelligent Mobilty Test Field Germany

Projekt Sichere Intelligente Mobilität Testfeld Deutschland. Project Safe Intelligent Mobilty Test Field Germany Projekt Sichere Intelligente Mobilität Testfeld Deutschland Project Safe Intelligent Mobilty Test Field Germany ETSI TC ITS Workshop 4-6 February 2009 ETSI, Sophia Antipolis, France Dr. Christian Weiß,

More information

Radio interface standards of vehicle-tovehicle and vehicle-to-infrastructure communications for Intelligent Transport System applications

Radio interface standards of vehicle-tovehicle and vehicle-to-infrastructure communications for Intelligent Transport System applications Recommendation ITU-R M.2084-0 (09/2015) Radio interface standards of vehicle-tovehicle and vehicle-to-infrastructure communications for Intelligent Transport System applications M Series Mobile, radiodetermination,

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks Cross-layer Approach to Low Energy Wireless Ad Hoc Networks By Geethapriya Thamilarasu Dept. of Computer Science & Engineering, University at Buffalo, Buffalo NY Dr. Sumita Mishra CompSys Technologies,

More information

Medium Access Schemes

Medium Access Schemes Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Vehicle to Vehicle Wireless Communication Protocol

Vehicle to Vehicle Wireless Communication Protocol Vehicle to Vehicle Wireless Communication Protocol Adithya B 1 1 M.Tech student, Department of Communication Engineering, Mount Zion College of Engineering, Kadammanitta, Pathanamthitta, Kerala, India

More information

A novel, broadcasting-based algorithm for vehicle speed estimation in Intelligent Transportation Systems using ad-hoc networks

A novel, broadcasting-based algorithm for vehicle speed estimation in Intelligent Transportation Systems using ad-hoc networks A novel, broadcasting-based algorithm for vehicle speed estimation in Intelligent Transportation Systems using ad-hoc networks Boyan Petrov 1, Dr Evtim Peytchev 2 1 Faculty of Computer Systems and Control,

More information

Israel Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings. Amos Gellert, Nataly Kats

Israel Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings. Amos Gellert, Nataly Kats Mr. Amos Gellert Technological aspects of level crossing facilities Israel Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings Deputy General Manager

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

SafeMobile Radio Configuration

SafeMobile Radio Configuration SafeMobile Radio Configuration SafeMobile offers a world of wireless applications that help organizations better manage their mobile assets, fleet and personnel. For more information, see www.safemobile.com.

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Car-to-Car Communication by Martin Wunderlich Meysam Haddadi

Car-to-Car Communication by Martin Wunderlich Meysam Haddadi Car-to-Car Communication by Martin Wunderlich Meysam Haddadi Technology and Application 26.01.2006 Chair for Communication Technology (ComTec), Faculty of Electrical Engineering / Computer Science Overview

More information

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,

More information

Qosmotec. Software Solutions GmbH. Technical Overview. QPER C2X - Car-to-X Signal Strength Emulator and HiL Test Bench. Page 1

Qosmotec. Software Solutions GmbH. Technical Overview. QPER C2X - Car-to-X Signal Strength Emulator and HiL Test Bench. Page 1 Qosmotec Software Solutions GmbH Technical Overview QPER C2X - Page 1 TABLE OF CONTENTS 0 DOCUMENT CONTROL...3 0.1 Imprint...3 0.2 Document Description...3 1 SYSTEM DESCRIPTION...4 1.1 General Concept...4

More information

Link Activation with Parallel Interference Cancellation in Multi-hop VANET

Link Activation with Parallel Interference Cancellation in Multi-hop VANET Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de

More information

ANT Channel Search ABSTRACT

ANT Channel Search ABSTRACT ANT Channel Search ABSTRACT ANT channel search allows a device configured as a slave to find, and synchronize with, a specific master. This application note provides an overview of ANT channel establishment,

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay

More information

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert

More information

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum Wireless replacement for cables in CAN Network Pros and Cons by Derek Sum TABLE OF CONTENT - Introduction - Concept of wireless cable replacement - Wireless CAN cable hardware - Real time performance and

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1350-1 1 RECOMMENDATION ITU-R BS.1350-1 SYSTEMS REQUIREMENTS FOR MULTIPLEXING (FM) SOUND BROADCASTING WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY FOR STATIONARY

More information

Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication

Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication Kyle Charbonneau, Michael Bauer and Steven Beauchemin Department of Computer Science University of Western Ontario

More information

Vehicle speed and volume measurement using V2I communication

Vehicle speed and volume measurement using V2I communication Vehicle speed and volume measurement using VI communication Quoc Chuyen DOAN IRSEEM-ESIGELEC ITS division Saint Etienne du Rouvray 76801 - FRANCE doan@esigelec.fr Tahar BERRADIA IRSEEM-ESIGELEC ITS division

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

June 21, 2016 comments from AT&T's president of Technology Operations, Bill Smith, at the Wells Fargo 2016 Convergence and Connectivity Symposium

June 21, 2016 comments from AT&T's president of Technology Operations, Bill Smith, at the Wells Fargo 2016 Convergence and Connectivity Symposium Dynamic Spectrum Alliance Limited 21 St Thomas Street 3855 SW 153 rd Drive Bristol BS1 6JS Beaverton, OR 97006 United Kingdom United States http://www.dynamicspectrumalliance.org July 7, 2016 Ms. Marlene

More information

Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks

Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks Old Dominion University ODU Digital Commons Computer Science Theses & Dissertations Computer Science Spring 2011 Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks Khaled Ibrahim Old Dominion

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL SPECIFICATION ISO/TS 19091 First edition 2017-03 Intelligent transport systems Cooperative ITS Using V2I and I2V communications for applications related to signalized intersections Systèmes intelligents

More information

Connected Car Networking

Connected Car Networking Connected Car Networking Teng Yang, Francis Wolff and Christos Papachristou Electrical Engineering and Computer Science Case Western Reserve University Cleveland, Ohio Outline Motivation Connected Car

More information

Model Deployment Overview. Debby Bezzina Senior Program Manager University of Michigan Transportation Research Institute

Model Deployment Overview. Debby Bezzina Senior Program Manager University of Michigan Transportation Research Institute Model Deployment Overview Debby Bezzina Senior Program Manager University of Michigan Transportation Research Institute Test Conductor Team 2 3 Connected Vehicle Technology 4 Safety Pilot Model Deployment

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Design and evaluation of multi-channel operation implementation of ETSI GeoNetworking Protocol for ITS-G5

Design and evaluation of multi-channel operation implementation of ETSI GeoNetworking Protocol for ITS-G5 Eindhoven University of Technology MASTER Design and evaluation of multi-channel operation implementation of ETSI GeoNetworking Rangga Priandono,. Award date: 2015 Disclaimer This document contains a student

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information