Recent Advances in Physical Layer Technologies for 5G-Enabled Internet of ThingsView this Special Issue
Research Article | Open Access
Hong Li, Qiong Wu, Jing Fan, Qiang Fan, Bo Chang, Guilu Wu, "Real-Time Performance Evaluation of IEEE 802.11p EDCA Mechanism for IoV in a Highway Environment", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8848477, 10 pages, 2020. https://doi.org/10.1155/2020/8848477
Real-Time Performance Evaluation of IEEE 802.11p EDCA Mechanism for IoV in a Highway Environment
With the development of 5G, the Internet of Vehicles (IoV) evolves to be one important component of the Internet of Things (IoT), where vehicles and public infrastructure communicate with each other through a IEEE 802.11p EDCA mechanism to support four access categories (ACs) to access a channel. Due to the mobility of the vehicles, the network topology is time varying and thus incurs a dynamic network performance. There are many works on the stationary performance of 802.11p EDCA and some on real-time performance, but existing work does not consider real-time performance under extreme highway scenario. In this paper, we consider four ACs defined in the 802.11p EDCA mechanism to evaluate the limit of the real-time network performance in an extreme highway scenario, i.e., all vehicles keep the minimum safety distance between each other. The performance of the model has been demonstrated through simulations. It is found that some ACs can meet real-time requirements while others cannot in the extreme scenario.
Nowadays, IoT networks are deployed to collect various information from surrounding systems through the real-time interaction with environment . As one kind of IoT, Internet of Vehicles (IoV) enables vehicles and infrastructures to exchange data through the vehicle-to-vehicle (V2V) communications and vehicle-to-infrastructure (V2I) communications . With the aid of the emerging 5G technologies, IOV will develop rapidly [3, 4]. There are many researches on 5G in the industry and academia ; 5G can be utilized to facilitate low latency, high reliability, and higher quality communication of IoV [6, 7]. It is promising to overcome some bottlenecks and thus significantly improve the network performance of IoV .
With the development of IoV, effectiveness and safety have become the key factors considered by an intelligent transportation system (ITS) . In the network, each mobile vehicle is considered a node with a variety of secure/nonsecure applications. IEEE 802.11p is a physical layer and medium access control (MAC) layer standard and has been widely used in wireless access in vehicular environments (WAVE) . It adopts an enhanced distributed channel access (EDCA) mechanism to access a channel. The IEEE 802.11p EDCA mechanism defines four ACs to provision services of different priorities through setting different parameters .
One of the characteristics of the IoV is dynamic topology changes. For example, when vehicles are moving on the highway, the movement of the vehicles and the drivers’ decision will cause the network topology to change (not always in a stationary state). Some analytical models have been put forward in existing performance modeling studies of the 802.11p EDCA mechanism in IoV [12–14], In , Han et al. constructed models to analyze the stationary performance of the 802.11p EDCA mechanism. In , Zheng and Wu considered the factors including saturated condition (vehicles always have data to transmit) and nonsaturated condition (vehicle do not always have data to transmit), standard parameters, backoff counter, internal collision, and computational complexity to analyze the performance of the IEEE 802.11p EDCA mechanism in the stationary state. In , Yao et al. used the probability generating function (PGF) approach to capture the nonstationary performance of IoV.
As far as we know, most existing works only studied the stationary performance of the 802.11p EDCA mechanism, but the vehicular network is in a high-speed environment, and thus the number of vehicles in the carrier sensing range of each vehicle is changing all the time, which cause the performance of the 802.11p EDCA mechanism to be changed in real time. Therefore, the traditional analysis methods were not suitable for the real situations. In , Xu et al. constructed models to study the time-varying behaviour of the 802.11p EDCA mechanism in a two-way highway scenario, but this work only considers two ACs, which does not consist of the definition of the 802.11p EDCA mechanism. According to the regulations in , the vehicles driving on the highway should follow the 4-second rule, i.e., the time interval between two contiguous vehicles on a common lane passing through a fixed reference object beside the highway should be larger in four seconds. Thus, there is a minimum safety distance between contiguous vehicles. To the best of our knowledge, there is no work analyzing the limit of the real-time performance of the 802.11p EDCA mechanism in the extreme highway scenario, i.e., all vehicles keep the minimum safety distance between each other, which motivates us to conduct this work. In this paper, we consider four ACs and conduct models to analyze the limit of the real-time performance of the 802.11p EDCA mechanism in IoV. Note that it is challenging to build a model in complex road conditions and to calculate the performance of the 802.11p EDCA mechanism considering four ACs.
The rest of this paper is organized as follows. In Section 2, a review of related work is presented. In Section 3, we describe the scenario and model IEEE 802.11p EDCA mechanism. The analytical model is provided in Section 4. In Section 5, numerical results are provided for performance evaluation and comparison. Finally, Section 6 concludes the paper.
2. Related Work
In this section, we first review the existing works for the performance analysis of the 802.11 distributed coordination function (DCF) mechanism, which is the basis of the 802.11p EDCA mechanism; next, we review the related works on the performance analysis of the 802.11p EDCA mechanism; and finally, the works about the real-time performance analysis of the 802.11p EDCA mechanism is reviewed.
There are lots of existing modeling approaches to analyze the performance of the 802.11 DCF mechanism. In , Bianchi proposed a simple two-dimensional Markov chain model under the assumption of an ideal channel and finite number terminals to describe the binary exponential backoff algorithm and computed the saturated throughput performance based on the proposed model. In , Ni et al. proposed an analytical model to calculate the throughput under saturated conditions in both congested and error-prone channels. In , Malone et al. took the 802.11 DCF mechanism-based network and bursty data traffic into account to derive a carrier sense multiple access/collision avoidance (CSMA/CA) model in a nonsaturated environment and validated the accuracy of the derived model through simulation. Some works analyzed the broadcast performance of the DCF mechanism in IoV. In , Vinel et al. proposed an analytical D/M/1 queue model to calculate the message reception probability and mean packet delay in the 802.11 DCF mechanism-based vehicular networks. In , Ma et al. proposed a 1-D Markov chain model to analyze the broadcast performance of the 802.11a DCF mechanism and evaluate the packet reception rate (PRR) and packet delay (PD) of V2V safety-related broadcast services.
In addition to those works, there are some studies about the analysis of the 802.11p EDCA mechanism. In , Han et al. proposed a three-dimensional Markov chain analytical model to analyze the 802.11p EDCA mechanism under a saturated network condition. The proposed model is validated through simulations and is justified to be suitable for both basic access and the request to send/clear to send (RTS/CST) access mode, but it does not consider backoff freezing. In , Gallardo et al. proposed a Markovian model to analyze the performance of the 802.11p EDCA mechanism over the control channel (CCH) under both saturated and nonsaturated conditions. The model is composed by three Markov chains, and each chain describes the backoff procedure of an AC. It can be used to compute the throughput, frame error rate, and delay of the AC. In , Kaabi et al. only considered one AC and proposed an analytical model to investigate the performance of the IEEE 802.11p EDCA mechanism for safety messages in IoV, but they did not analyze the delay. In , Zheng and Wu considered the factors including saturated and nonsaturated condition, standard parameters, backoff counter, internal collision, and computational complexity and developed two Markov chains to analyze the performance of the IEEE 802.11p EDCA mechanism; the simulation experiments are conducted to verify the effectiveness of the derived performance models. However, these works focus on the stationary performance analysis of the 802.11p EDCA mechanism, which is not realistic in the dynamic IoV.
As described above, researches on stationary performance are mature. There are few works study on the real-time performance analysis of the IEEE 802.11p EDCA mechanism. In , Bilstrup et al. analyzed the channel delay of the 802.11p EDCA mechanism through simulations and compared with a self-organizing time division multiple address (TDMA). It is proven that TDMA is more suitable for the time-sensitive application in IoV. In , Xu et al. proposed a fluid-flow performance model to analyze the real-time performance of the 802.11p EDCA mechanism. The proposed model is computationally efficient, generalized and accurate to calculate the real-time performance of PD and packet delivery ratio (PDR). However, none of them considered four ACs to analyze the limit of the real-time performance of 802.11p EDCA in the extreme highway scenario, which is the motivation of this work.
3. System Model
In this section, we first describe the extreme highway scenario; then, the 802.11p EDCA mechanism is reviewed briefly.
3.1. Extreme Highway Scenario
In order to find the performance limit of the network, we consider an extreme highway scenario as shown in Figure 1. Specifically, vehicles are driving on a one-way four-lane highway, where vehicles driving on the common lane with the same velocity and the velocities of the vehicles on the different lane are different. The distance between any of the contiguous vehicles on the common lane, i.e., intervehicle distance, is set to the minimum safety distance according to the 4-second rule. Since the minimum safety distance is determined by the velocity of vehicles, the intervehicle distances are different on different lanes. Each vehicle adopts the IEEE 802.11p protocol to exchange data packet through wireless communication. The channel access mechanism of the 802.11p protocol is the EDCA mechanism. Packets arrive at of a vehicle according to the Poisson process with arrival rate. In order to investigate the real-time performance of the 802.11p EDCA mechanism for each vehicle in the network, we denote the investigated vehicle as the target vehicle. As shown in Figure 1, the red vehicle is the tagged vehicle, and the blue vehicles are the vehicles within the carrier sensing range of the target vehicle which can successfully send or receive the packet from the tagged vehicle. Meanwhile, the black vehicles are not within the carrier sensing range of the target vehicle and they cannot communicate with the tagged vehicle. Next, we review the 802.11 EDCA mechanism briefly.
3.2. IEEE 802.11p EDCA Mechanism
The IEEE 802.11p EDCA mechanism defines four AC queues to support different priorities of services to access a channel , i.e., voice (VO), video (VI), best effort (BE), and background (BK) , where each AC queue has a specific parameter configuration, including the minimum backoff window CWmin, maximum backoff window CWmax, arbitration interframe space number AIFSN, and the retransmission limit. When a packet arrives at the ACm queue of a vehicle, it will be transmitted when the channel status is idle. If the channel is busy, the vehicle will continue to detect the channel until the channel keeps idle for , then start a backoff process, where is calculated as where SIFS is the short interframe space and is a slot time.
The backoff process is described as follows. The contention window size is first set to and a value is randomly selected from as the value of a backoff counter; then, it would be decreased by one after each idle slot . If the channel is busy during the backoff process, the value of the backoff counter will be frozen until the channel becomes idle again . When the backoff counter is decreased to 0, the packet will be transmitted. At this time, the transmission is successful if no AC of other vehicles and no higher priority AC of the vehicle are transmitting. Otherwise, a collision occurs. Specifically, an external collision occurs if at least one AC of other vehicles is transmitting, and an internal collision occurs if at least one other AC of this vehicle is transmitting. In the condition of a collision, the contention window size is doubled, and a new backoff process is initiated to retransmit the packet. The contention window would not be doubled after the number of retransmission reaches . If the number of retransmission reaches the retransmission limit , the packet would be dropped. The contention window of the queue under the number of retransmission is given by
The access process of 802.11p is shown in Figure 2. Note that if an internal collision occurs, the packet with the highest priority will be transmitted, the contention window of the lower priority will be doubled, and then a backoff process is initiated.
4. Analytical Model
In this section, we elaborate our model to analyze the real-time performance of the 802.11p EDCA mechanism. We first construct a connectivity metric to denote the connection of vehicles in the network, and then, we develop models to derive the real-time performance of the IEEE 802.11p EDCA mechanism including the mean service time and variance for the target vehicle. The notations used in this paper are summarized in Table 1.
4.1. Connectivity Metric
There are vehicles in this scenario, the vehicles are numbered sequentially from lane 4 to lane 1, and on each lane vehicles are numbered from left to right, e.g., the number of the leftmost vehicle on lane 4 is 1 and the number of the rightmost vehicle on lane 1 is . The coordinate of vehicle is denoted as (); here, we set that the coordinate of vehicle 1 as (0,0). Each vehicle can acquire the coordination of other vehicles through communications; thus, each vehicle can acquire the matrix of the coordination of vehicles at time , i.e.,
If the Euclidean distance of the two vehicles is less than the carrier sensing range, they are considered to be connected with each other, i.e., communicate with each other. Each vehicle can calculate a connectivity metric according to to denote the connectivity of the vehicles in the network at time t, i.e., where denotes whether vehicle can connect with vehicle .
In our scenario, vehicles drive on the same lane with the same velocity and drive on different lanes with different velocities. Since the intervehicle distance is related with the velocity of vehicles, the intervehicle distances of vehicles are the same on the same lane and are different on different lanes. Therefore, the connection of the vehicles in the network is changed in real time due to the different velocities and intervehicle distances on different lanes, thus causing the matrix to be time varying. Let vehicle be the target vehicle in the network, the number of vehicles in the carrier sensing range of the tagged vehicle can be calculated according to , i.e.,
4.2. Real-Time Mean Service Time and Variance
In this section, we regard access process of the 802.11p EDCA mechanism as the service process and derive the real-time performance of the IEEE 802.11p EDCA mechanism including the mean service time and variance for the target vehicle . The mean service time and variance can be calculated according to the first and second moments of the probability generating function (PGF) of service time of for vehicle , i.e., where is the PGF of service time and is calculated according the Markov chain in , which is shown as follows: where is the PGF of transmission time, is the PGF of stationary probability of at stage for vehicle , is the PGF of the average duration that the backoff counter of for vehicle is decremented by one, is the internal collision probability of for vehicle at time . According to Equation (8), depends on , , , and , which need to be further derived.
We first derive . Since the duration of a transmission is composed of the propagation delay and the duration occupied by the physical header, MAC header, and packet, the transmission time can be calculated as where is the propagation delay, PHYH and MACH are the size of the physical and MAC header, respectively. Assuming each packet for all ACs has the same size, let be the packet size. According to Equation (9), the transmission time is a constant; thus, the PGF of transmission time is expressed as Next, we derive . According to the Markov chain model for backoff instance in , can be calculated as
Since the channel may be idle or busy when the backoff counter is decremented by one, (z) can be calculated as
The probability is channel busy probability of ACm for vehicle at time , i.e., the probability that at least one AC is transmitting in a time slot, including the probability that the other ACs of the vehicle is transmitting and the probability that the ACs of another vehicle is transmitting. Considering the priority of different ACs, the channel busy probability of ACm can be derived according to the following equation:
The packet will be transmitted when the backoff counter becomes 0; the internal transmission probability for ACm can be expressed by , where the probability of the highest priority AC is the probability of the backoff state 0; the internal transmission probability for other ACs is equal to the sum of all backoff states.
According to the transition probability of the Markov chain, the probability can be calculated as
Denote as the packet arrival probability of at time . Due to the packet arrival process of ACm is a Poisson process with arrival rate , thus is calculated as
As mentioned in the system model, an internal collision occurs when there are more than two ACs in a vehicle transmitting at the same time. In this case, the AC with the highest priority is transmitted successfully. Let be the transmission probability and be the internal collision probability of for vehicle at time, we have
Since the packet transmission is considered to be successful only when there is no internal collision, and the transmission probability of a vehicle is the sum of four ACs, the transmission probability of a vehicle is calculated as
By now, we have found all the relationships between , , , , , , and in Equations (13), (14), (15), (16), (17) and (18). Since the number of variables is more than that of the equations, iterative method is used to solve the system, and thus we can further calculate the mean and variance of the service time. (1)Assign initial values to four (2)Bring into Equations (13), (14), (15), (16), (17) and (18) and solve the other 21 variables(3)Combining relations Equations (6), (7), (8), (9),(10), (11) and (12), we obtain the average service time and then calculate (4)Setting an error bound , compare the error of the actual with ε, if it is less than the error, the iteration is completed, otherwise, go to step (2)(5)Calculating the mean and variance of service time according to Equations (6) and (7).
5. Results and Discussion
In this section, we evaluate the network performance in the extreme highway scenario with four lanes. The simulation is conducted on MATLAB R2018a. The distance between contiguous vehicles is set to be the minimum distance according to the 4-second rule. As the speed range of the American highway is from 20 m/s to 30 m/s, we set the speeds of the four lanes to be 20 m/s, 23 m/s, 20 m/s, and 30 m/s, respectively. The total length of the highway is 3000 m and the transmission range is 300 m, the values of 802.11p parameters and scenario description are shown in Table 2.
In order to ensure that the target vehicle is always within the scope of the scenario, we take the fifth vehicle in the second lane as the target vehicle. Each vehicle has four ACs to broadcast packets. Since the vehicle speed of each lane is different, the relative position of the vehicle is time varying, thus causing other vehicles to move in/out of the transmission range of the target vehicle. In this case, the number of vehicles in the carrier sensing range of the target vehicle may change in real time.
As shown in Figure 3, at first, the number of vehicles in the transmission range of the target vehicle is 18. About three seconds later, vehicles in the fast lane which were previously out of the range move into the transmission range of the target vehicle, which causes the total number of vehicles increasing immediately. The total number of vehicles keeps for about four seconds; then, vehicles in the slow lane that were previously in the transmission range of the target vehicle move out the transmission range and the number of vehicles decreases immediately. As described above, the number of vehicles is changed due to different vehicle speeds in different lanes and is fluctuated repeatedly according to Equations (3), (4) and (5).
Figures 4 and 5 show the real-time mean and standard deviation of service time, which is the value calculated by Equations (6) and (7). The trend of the mean and standard deviation of service time keeps consistent with the change of the number of vehicles. The number of vehicles will impact the probability of backoff block , which will further affect the state probability , resulting in the change of the mean and standard deviation of service time. Therefore, the mean and standard deviation increase with the number of vehicles increasing. From Figure 4, we can find that the higher priority AC has less average service time delay than low priority AC. Moreover, we can see that as the average delay of AC0, AC1, and AC2 is less than 0.01 s, which is the minimum delay to ensure safety in IoV . Therefore, AC0, AC1, and AC2 can meet the real-time requirements, while AC3 cannot meet the requirements.
In this paper, we considered four ACs and proposed models to investigate the limit of the real-time performance of the 802.11p EDCA mechanism in the extreme highway scenario. Specifically, we model the real-time network between vehicles, study the connection between vehicles, calculate the real-time number of vehicles within the carrier sensing range, and then calculate the real-time performance metrics of the 802.11p EDCA mechanism including mean and variance of service time. The simulation result is employed to demonstrate that AC0, AC1, and AC2 are able to meet the real-time requirement in the extreme highway scenario but AC3 cannot. In the future work, we will study the real-time performance modeling of the 802.11p EDCA mechanism in other scenarios.
The data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare no conflicts of interest.
This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61701197 and 61540063, in part by the Yunnan Natural Science Foundation of China under Grant Nos. 2016FD058 and 2018FD055, in part by the 111 Project under Grant No. B12018, and in part by the Jiangsu Laboratory of Lake Environment Remote Sensing Technologies Open Fund under Grant No. JSLERS-2020-001.
- B. Mohammed and D. Naouel, “An efficient greedy traffic aware routing scheme for internet of vehicles,” Computers, Materials & Continua, vol. 60, no. 3, pp. 959–972, 2019.
- D. Zhang, Y. Liu, L. Dai, A. K. Bashir, A. Nallanathan, and B. Shim, “Performance analysis of FD-NOMA-based decentralized V2X systems,” IEEE Transactions on Communications, vol. 67, no. 7, pp. 5024–5036, 2019.
- Y. Fan, L. Yang, D. Zhang, G. Han, and D. Zhang, “An angle rotate-QAM aided differential spatial modulation for 5G ubiquitous mobile networks,” Mobile Networks and Applications, vol. 1, pp. 1–13, 2019.
- H. Zhang, Y. Dong, J. Cheng, M. J. Hossain, and V. C. M. Leung, “Fronthauling for 5G LTE-U ultra dense cloud small cell networks,” IEEE Wireless Communications, vol. 23, no. 6, pp. 48–53, 2016.
- Y. Dong, A. El Shafie, M. J. Hossain, J. Cheng, N. Al-Dhahir, and V. C. M. Leung, “Secure beamforming in full-duplex MISO-SWIPT systems with multiple eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 17, no. 10, pp. 6559–6574, 2018.
- N. Lu, N. Cheng, N. Zhang, X. Shen, and J. W. Mark, “Connected vehicles: solutions and challenges,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 289–299, 2014.
- S. Chen, J. Hu, Y. Shi, and L. Zhao, “LTE-V: a TD-LTE-based V2X solution for future vehicular network,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 997–1005, 2016.
- M. R. Palattella, M. Dohler, A. Grieco et al., “Internet of things in the 5G era: enablers, architecture, and business models,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, pp. 510–527, 2016.
- W. Xu, H. Zhou, N. Cheng et al., “Internet of vehicles in big data era,” IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 19–35, 2018.
- J. B. Kenney, “Dedicated short-range communications (DSRC) standards in the United States,” Proceedings of the IEEE, vol. 99, no. 7, pp. 1162–1182, 2011.
- C. Shao, S. Leng, Y. Zhang, and H. Fu, “A multi-priority supported p-persistent MAC protocol for vehicular ad hoc networks,” in 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2532–2537, Paris, France, 2012.
- C. Han, M. Dianati, R. Tafazolli, R. Kernchen, and X. Shen, “Analytical study of the IEEE 802.11p MAC sublayer in vehicular networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 2, pp. 873–886, 2012.
- J. Zheng and Q. Wu, “Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET,” IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 2673–2687, 2016.
- Y. Yao, L. Rao, X. Liu, and X. Zhou, “Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment,” in 2013 Proceedings IEEE INFOCOM, pp. 1591–1599, Turin, Italy, 2013.
- K. Xu, D. Tipper, Y. Qian, and P. Krishnamurthy, “Time-dependent performance analysis of IEEE 802.11p vehicular networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5637–5651, 2016.
- Q. Wu, S. Xia, P. Fan, Q. Fan, and Z. Li, “Velocity-adaptive V2I fair-access scheme based on IEEE 802.11 DCF for platooning vehicles,” Sensors, vol. 18, no. 12, p. 4198, 2018.
- G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535–547, 2000.
- Q. Ni, T. Li, T. Turletti, and Y. Xiao, “Saturation throughput analysis of error-prone 802.11 wireless networks,” Wireless Communications and Mobile Computing, vol. 5, no. 8, pp. 945–956, 2005.
- D. Malone, K. Duffy, and D. Leith, “Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions,” IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 159–172, 2007.
- A. Vinel, V. Vishnevsky, and Y. Koucheryavy, “A simple analytical model for the periodic broadcasting in vehicular ad-hoc networks,” in 2008 IEEE Globecom Workshops, pp. 1–5, New Orleans, LA, USA, 2008.
- X. Ma, X. Chen, and H. H. Refai, “Performance and reliability of DSRC vehicular safety communication: a formal analysis,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, 2009.
- J. R. Gallardo, D. Makrakis, and H. T. Mouftah, “Performance analysis of the EDCA medium access mechanism over the control channel of an IEEE 802.11p WAVE vehicular network,” in 2009 IEEE International Conference on Communications, pp. 1–6, Dresden, Germany, 2009.
- F. Kaabi, P. Cataldi, F. Filali, and C. Bonnet, “Performance analysis of IEEE 802.11p control channel,” in 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks, pp. 211–214, Hangzhou, China, 2010.
- K. Bilstrup, E. Uhlemann, E. G. Ström, and U. Bilstrup, “Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication,” in 2008 IEEE 68th Vehicular Technology Conference, pp. 1–5, Calgary, BC, Canada, 2008.
- Q. Wu, S. Xia, Q. Fan, and Z. Li, “Performance analysis of IEEE 802.11p for continuous backoff freezing in IoV,” Electronics, vol. 8, no. 12, p. 1404, 2019.
- Q. Wu and J. Zheng, “Performance modeling of the IEEE 802.11p EDCA mechanism for VANET,” in 2014 IEEE Global Communications Conference, pp. 57–63, Austin, TX, USA, December 2014.
- Q. Wu and J. Zheng, “Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks,” Wireless Networks, vol. 22, no. 3, pp. 799–812, 2016.
- Q. Wu, H. Zhang, Z. Li, Y. Liu, and C. Zhang, “Performance evaluation of the V2I fair access with a finite retry limit,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, 2018.
- Y. Yao, L. Rao, and X. Liu, “Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment,” IEEE Transactions on Vehicular Technology, vol. 62, no. 9, pp. 4198–4212, 2013.
Copyright © 2020 Hong Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.