User Model-Based Method for IEEE 802.11p Performance Evaluation in Vehicular Safety Applications

被引:0
作者
Salem, Fatma [1 ]
Elhillali, Yassin [1 ]
Niar, Smail [1 ]
机构
[1] Univ Valenciennes, Dept Comp Sci, UVHC Campus Mt Houy Valenciennes, F-59313 Valenciennes, France
来源
2017 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES) | 2017年
关键词
DELAY ANALYSIS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a User-Based model is proposed to analyze and evaluate the performance of IEEE 802.11p MAC protocol for vehicular safety applications that can save lives and improve traffic flow. The proposed model provides a complete stability analysis compared to the Markovian models. Moreover, it provides a means for conducting further analysis on the design parameters of the protocol, leading to an optimization methodology which indicates how IEEE 802.11p should be configured for improved performance. The model is cross validated against simulations; the IEEE 802.11p can meet the needed latency and reliability requirements for the delivery of safety messages under the Finite user model, however, it fails to satisfy such requirements under the Infinite user model.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 17 条
[1]  
[Anonymous], 2005, Times People Weekly, DOI DOI 10.1145/1080754.1080756
[2]   Performance comparison of media access control protocols for vehicular ad hoc networks [J].
Booysen, M. J. ;
Zeadally, S. ;
van Rooyen, G. -J. .
IET NETWORKS, 2012, 1 (01) :10-19
[3]  
Breuer L, 2005, An introduction to queueing theory: and matrix-analytic methods
[4]  
Felipe D., 2014, RR8498 INRIA
[5]  
Furstenberg H., 1981, Recurrence in Ergodic Theory and Combinatorial Number Theory
[6]   A METHOD FOR THE DELAY ANALYSIS OF RANDOM MULTIPLE-ACCESS ALGORITHMS WHOSE DELAY PROCESS IS REGENERATIVE [J].
GEORGIADIS, L ;
MERAKOS, LF ;
PAPANTONIKAZAKOS, P .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1987, 5 (06) :1051-1062
[7]  
IEEE Standard for Low-Rate Wireless Networks, 2016, IEEE Std 1068-2015 (Revision of IEEE Std 1068-2009), P1, DOI [10.1109/IEEESTD.2016.7740858, DOI 10.1109/IEEESTD.2016.7740858, DOI 10.1109/IEEESTD.2016.7378244]
[8]  
Jaidhar C. D., 2015, LECT NOTES COMPUTER, V9247, p286?
[9]  
Khairnar V.D., 2013, INT J NETW SECUR ITS, V5, P143, DOI [10.5121/ijnsa.2013.5212, DOI 10.5121/IJNSA.2013.5212]
[10]  
Lin W. Y., 2014, QUALITY RELIABILITY, V74, P559