 Research
 Open Access
 Published:
Recursive analytical performance evaluation of broadcast protocols with silencing: application to VANETs
EURASIP Journal on Wireless Communications and Networking volume 2012, Article number: 10 (2012)
Abstract
In this article, we present a novel theoretical framework suitable for analytical performance evaluation of a family of multihop broadcast protocols. The framework allows to derive several average performance metrics, including reliability, latency, and efficiency, and it is targeted to Vehicular Adhoc NETworks (VANETs) applications based on an underlying IEEE 802.11 protocol. It builds on the assumption that the positions of the nodes of a VANET can be statistically modeled as Poisson points. However, the proposed approach holds for any spatial vehicle distribution with constant average distance between consecutive vehicles. In this work, the proposed analytical framework is applied to the class of probabilistic broadcast multihop protocols with silencing, but can be generalized to nonprobabilistic protocols as well. More specifically, this work considers a few broadcast protocols with silencing, differing for the probability assignment function. The validity of the proposed analytical approach is assessed by means of numerical simulations in a highwaylike scenario.
1 Introduction
Nowadays, most of the vehicles available on the market are provided by sensorial, cognitive, and communication skills. In particular, leveraging on intervehicular communicationsa set of technologies that gives networking capabilities to the vehiclesvehicles can create decentralized and selforganized vehicular networks, commonly denoted as vehicular Adhoc NETworks (VANETs), involving either vehicles and/or fixed network nodes (e.g., road side units).
Vehicular Adhoc NETworks present a few unique characteristics: (i) the availability of virtually unlimited energetic and computational resources (in each vehicle); (ii) very dynamic network topologies, due to the high average speed of the vehicles; (iii) nodes' movements constrained by the underlying road topology; (iv) the need for broadcast communication protocols, used as truly informationbearing protocols (especially in multihop communication scenarios) and not only as auxiliary supporting tools. For instance, a multihop broadcast protocol fulfills well the requirements of applications such as the diffusion of safetyrelated messages (e.g., warning alerts) or public interest information (e.g., road interruptions).
Reducing the number of redundant packets, while still ensuring good coverage and low latency, is one of the main objectives in multihop broadcasting. In fact, a too large number of transmissions acts unavoidably leads to unsustainable levels of latency, retransmissions, and collisions: the overall phenomenon is typically referred to as broadcast storm problem [1] and it mainly affects dense networks. The problem of minimizing the number of transmissions has been deeply investigated by the Mobile Adhoc NETworks (MANETs) research community: the theoretically optimal solution consists in designating, as relays, the nodes belonging to the minimum connected dominant set (MCDS) of the network [2]. The nodes within the MCDS have the following properties: (i) they form a connected graph; (ii) every other node of the network is onehop connected with a node in the MCDS; (iii) the MCDS has the lowest cardinality over all the possible collections of nodes that satisfy the previous two requirements.
Following the "idealized" MCDSbased design approach, a plethora of multihop broadcast protocols have been recently proposed in the VANET literature. Some of them, such as the emergency message dissemination for vehicular environments (EMDV) protocol [3], achieve remarkable performance by exploiting partial or complete knowledge of the network topology [4]. However, since collecting this information may be very expensive in terms of overhead, other techniques (requiring a reduced information exchange) have been proposed. An efficient IEEE 802.11based protocol, denoted as urban multihop broadcast (UMB), was proposed in [5] and further extended in [6]. UMB suppresses the broadcast redundancy by means of a blackburst contention approach [7], followed by a readytosend/cleartosend (RTS/CTS)like mechanism. According to this protocol, a node can broadcast a packet only after having secured channel control. A different approach is adopted by another IEEE 802.11based protocol, denoted as smart broadcast (SB) [8]. Similarly to UMB, SB partitions the transmission range of the source, associating nonoverlapping contention windows to different regions. The binary partition assisted protocol (BPAB) [9] uses concepts from both UMB and SB, thus presenting similar performance, with an improvement, with respect to the SB protocol, in VANETs with low vehicle spatial density and irregular topologies. Finally, a different approach is considered when analyzing the class of probabilistic broadcast protocols, designed around the idea that each node forwards a received packet according to a characteristic probability assignment function (PAF), computed by each node in a distributed manner [10, 11]. An entire class of probabilistic broadcast protocols is proposed and analyzed in [12].
In onedimensional networks, as those considered in this work, knowledge of internode distances is necessary to implement the MCDS solution. For this reason, most of the proposed multihop broadcast protocols assume, at least to some extent, this knowledge. Therefore, the first step for deriving an analytical model consists in statistically characterizing the spatial distribution of the vehicles. In the literature, the node positions are frequently generated with a poisson point process (PPP), that allows to accurately model the real characteristics of the road topology. Despite its apparent simplicity, the derivation of an analytical performance evaluation framework based on the assumption of Poisson spatial distribution of the vehicles is not straightforward.
This work is motivated by the need of having a low complexity theoretical framework, useful for characterizing the main performance metrics of a family of probabilistic multihop broadcast protocols with applications to VANET scenarios. First, we show that the average positions of a given number of points of a PPP falling in a segment with finite length are equally spaced. Then, assuming a silencing mechanism at each hop, we derive a recursive (hopwise) theoretical performance evaluation framework which exploits the assumption of fixed and equally spaced vehicles positions in each retransmission hop. In particular, this performance analysis is likely to be representative of the average (with respect to the nodes' spatial distribution) performance of the broadcast protocols at hand, as will be confirmed by ns2 simulations. Moreover, the proposed analytical model applies also to other vehicle spatial distributions, provided that the average intervehicle distance is fixed. The impact of node mobility will also be evaluated. Although we consider two novel illustrative broadcast protocols, we underline that our approach is general.
This article is structured as follows. In Section 2, multihop broadcast protocols for linear networks are introduced. Section 3 is devoted to the derivation of the average distribution of a given number of points of a PPP in a segment with finite length. In Section 4, a succinct overview of the IEEE 802.11b standard is provided. In Section 5, the family of probabilistic broadcast protocol with silencing is accurately described. In Section 6, an analytical framework for performance evaluation of the probabilistic broadcast protocols of interest, is presented. In Section 7, after the validation of the analytical framework by means of numerical simulation, the performance of the novel probabilistic broadcast protocols is investigated and compared with that of other (known) protocols. Finally, Section 8 concludes the article.
2 Multihop broadcast protocols
2.1 Reference scenario
Figure 1 shows the linear network topology of reference for a generic multihop broadcast protocol: a static onedimensional wireless network with a source and N (receiving) nodes. The assumption of static nodes is not restricting. In fact, from the perspective of a single transmitted packet, because of the very short transmission time (with typical IEEE 802.11 transmission rates), the network appears as static [13]. At the same time, a onedimensional network is suitable for analyzing highwaylike VANETs, where the width of the road (lying in the interval [1040 m]) is significantly smaller than the transmission range of an IEEE 802.11 network interface. These motivations will be justified by simulation results in Section 7.
We consider a deterministic freespace propagation model (i.e., without fading) and a fixed transmit power: therefore, each vehicle has a fixed transmission range, denoted as z (dimension: [m]). The network size (the line length) is set to L (dimension: [m]). For generality, we denote as normalized network size the positive real number {\ell}_{\mathsf{\text{norm}}}\triangleq L/z. Generally, ℓ_{norm} > 1 and this motivates the need for multihop communication protocols.
On the basis of empirical traffic data [14], the nodes' positions are generated according to a PPP of parameter ρ_{s}, where ρ_{s} is the vehicle (linear) spatial density (dimension: [veh/m])the symbol "veh" it is not a realistic unit of measure, but it will be used for the sake of clarity. Consequently, N is a random variable characterized by a onedimensional Poisson distribution with parameter ρ_{s}L. Similarly, the random variable N_{ z }, denoting the number of nodes lying in the transmission range of the source (e.g., within the interval (0, z)), has a Poisson distribution with parameter ρ_{s}z. Thanks to the properties of the Poisson distribution, the intervehicle distance is exponentially distributed with parameter ρ_{s} and the (constant) average distance between two consecutive vehicles is 1/ρ_{s}.
As shown in Figure 1, the source node, denoted as node 0, is placed at the west end of the network, and we assume a single propagation direction (eastbound). Each of the remaining N nodes is uniquely identified by an index i ∈ {1, 2,..., N}. The distance between the ith and jth nodes (i, j ∈ {1, 2,..., N}, i ≠ j) is denoted as d_{ i,j }. Each vehicle can exactly estimate the value of d_{ i,j }, thanks to the following assumptions: (i) the position of the source is apriori known by every node; (ii) each vehicle knows its own position under the assumption of the presence (on board) of a global positioning system (GPS) receiver; (iii) each rebroadcaster inserts its own geographical coordinates within the packet.
In the (onedimensional and with a single propagation direction) scenario described in Figure 1, the operational principle of a multihop broadcast protocol is quite simple. The initial transmission of a new packet from the source is denoted as the 0th hop transmission, while the source itself identifies the socalled 0th transmission domain (TD). After the source transmission, the packet is then received by the N_{ z }source's neighbors, that are the potential rebroadcasters at the 1st hop. Hence, their ensemble constitutes the 1st TD. Each vehicle in the 1st TD decides to forward the packet according to a PAF specified by the broadcast protocol. The use of silencing corresponds to the fact that the "fastest" retransmitter (among the set of those which have decided to retransmit) silences the others. Note that a collision may happen if at least two nodes of a TD retransmit simultaneously. The propagation process is therefore constituted by multiple packet retransmissions, that continue at most till the east end of the networkas will be clear in the following, with a probabilistic broadcasting protocol the retransmission process might terminate before reaching the end of the network.
2.2 Performance metrics of interest
In this work, the performance of probabilistic multihop broadcast protocols will be investigated using the following average metrics: (i) the REachability (RE), (ii) the transmission efficiency (TE), and (iii) the endtoend delay (D). The RE (adimensional), originally introduced in [1], is the fraction of nodes that receive the source packet among the set of all reachable nodes. The cardinality of the set of the reachable nodes is denoted as n_{reach}, and can be expressed as n_{reach} = min(N, n∗), where n∗ is the minimum index such as the condition d_{ n }*, n_{*} + 1 > z is verified. This definition is necessary since in PPP scenarios, as those considered in this work, there can exist a pair of disconnected consecutive nodes (n∗,n∗ + 1). The TE (adimensional) is defined as the ratio between the RE of a packet and the overall number of rebroadcast acts experienced during its transmission to the last reachable node. Finally, D (dim: [ms]) is defined as the duration of the packet trip between the source and the last reachable node. We remark that only the packets received correctly at the n_{reach}th node of the network are considered for the evaluation of D. Therefore, this definition of D corresponds to a worst case scenario.
Owing to the symmetry of the forwarding process, the entire network can be modeled on the basis of the (local) analysis of a single TD. Therefore, in Section 3 we focus on a single TDthe reasons behind this assumption will be better clarified in Section 5.
3 Average distribution of poisson points in a segment with finite length
We now present a constructive definition of a PPP with parameter ρ_{s} ∈ ℝ^{+}, directly inspired from the one presented in [15, Ch. 3]. Given a finite interval (T/2,T/2) ⊂ ℝ, place n ∈ ℕ points in (T/2,T/2), under the constraint that n/T = ρ_{s}. A PPP is obtained by letting n → ∞ and T → ∞, under the constraint that n/T remains equal to ρ_{s}. A PPP has the following properties: (i) the distance between two consecutive points is a random variable with an exponential distribution with parameter ρ_{s}; (ii) given z ∈ ℝ^{+}, the number of points falling in the finite interval \mathcal{I}\triangleq \left(0,z\right)\subset \mathbb{R} is a random variable with a Poisson distribution with parameter ρ_{s}z. In Figure 2, an illustrative realization of a PPP with parameter ρ_{s} is shown. With reference to Figure 2, denoting by n the number of Poisson points falling in \mathcal{I} it is possible to define the ndimensional positions vector
where R_{ i }(i ∈ {1, 2,..., n}) is the distance of the ith point from the source (placed in zero)in the illustrative case in Figure 2, n = 2.
In Appendix 1, it is shown that the marginal probability density function (PDF) of R_{ j }is the following:
In Figure 3, the PDFs of the positions of consecutive nodes are shown for various values of n: (a) 1, (b) 2, and (c) 4. In Appendix 1, it is also shown that the average position of the jth node can be expressed as follows:
From Equation (3), it emerges clearly that, for a given number of nodes falling in a finite segment \mathcal{I}, their average positions are equally spaced. The average nodes' positions, for various values of the number n of nodes in \mathcal{I}, are also shown in Figure 3.
Thanks to these results, the average performance analysis of a broadcast protocol in a network with Poisson node distribution can be carried out by simply studying a deterministic scenario, where the nodes are placed in correspondence to the average positions of the corresponding Poissonbased scenario. Moreover, this average analysis applies to other vehicle spatial distributions (e.g., taking into account the constraint on the vehicle lengths) with equally spaced average positions.
4 A quick overview of the IEEE 802.11b standard
In this work, we assume that the physical and the medium access control (MAC) layers of every node adhere to the IEEE 802.11b standard [16]. In this section, we first recall the basic features of this standard. Due to the broadcast nature of the communications, the contention channel is managed through the basic access (BA) mechanism, the operational principle of which can be briefly described as follows. When a node has a frame ready to be transmitted, it checks if the channel remains idle for a period of time at least longer than a distributed interframe space (DIFS): if this is the case, the node is free to immediately transmit. On the opposite, if the wireless medium is busy, the node defers its transmission until the medium remains idle for a whole DIFS without interruption. In the latter case, once the DIFS has elapsed, the node generates a random backoff period, which corresponds to an additional waiting time before transmitting (prebackoff). The node transmits when the backoff time has elapsed. At each transmission act, the backoff time is uniformly chosen in the range [0, cw  1], where cw is the current backoff window size, that is constant and equal to the minimum value defined by the standard, denoted as CW_{min}, and corresponding to 32. The backoff period is slotted and the duration of the backoff, expressed in terms of number of backoff slots, is denoted as backoff counter (BC). This number is decremented as long as the medium is sensed idle, and it is frozen when a transmission is detected on the channel (this is an instance of a collision avoidance mechanism). Decrementing restarts when the medium is sensed idle again for more than a DIFS. At the end of every packet transmission, the node is forced to enter a postbackoff phase that coincides with the subsequent prebackoff if the node has another packet in the transmission queue.
It is important to observe that when a relay finds the channel idle, it can immediately transmit, but this is not mandatory. In order to reduce the number of collisions within a TD, we have interpreted the standard in a nonpersistent manner, imposing that every relay enters into the prebackoff phase, regardless of the channel status. We also remark that the extension of our approach to scenarios with IEEE 802.11p [17] communications, as envisioned in VANETs, is straightforward. Our approach (based on the IEEE 802.11b standard) is meaningful under the assumption of smartphonebased vehicular communications [18, 19].
5 Probabilistic broadcast protocols with silencing
5.1 Preliminaries considerations
The general goal of a multihop broadcast protocol is to attain the widest network coverage in the shortest possible time. This can be obtained by pursuing three intermediate goals: (i) minimizing the number of communication hops; (ii) minimizing the number of effective retransmissions in every hop; (iii) minimizing the latency associated with a single hop. The number of transmission hops can be minimized by designating, as relays, the nodes forming the MCDS. However, the number of retransmissions and the latency are directly affected by the protocol characteristics, and there is no general rule for minimizing themthis motivates the presence, in the literature, of a large number of heuristic broadcast protocols.
A probabilistic broadcast protocol tries to achieve the goals outlined in the previous paragraph in a probabilistic and completely distributed manner: (i) probabilistic, in the sense that every intermediate node decides to retransmit a packet according to a certain PAF, computed on a perpacket mannereven if, in general, one could introduce a perflow PAF, in this work we focus on single packet transmissions; (ii) distributed, in the sense that every node autonomously makes a retransmission decision without any coordination with its neighbors.
In "classical" probabilistic broadcast protocols (without silencing), without adopting suitable countermeasures it is possible that more than one node in a TD decides to rebroadcast the packet (even without collisions). This leads to inefficienciesbesides complicating the mathematical analysis. A more efficient probabilistic broadcast protocol, regardless of the expression of the PAF, is obtained in the presence of a single retransmitting node in every TD. This can be obtained by imposing that the reception of a packet sent by a node of a TD silences the preceding nodes of the same TD. As a consequence, the next TD starts from the node which follows the "silencer." Note that the last TD partially overlaps with the previous one if the "silencer" is not a member of the MCDS.
In this work, we consider two novel probabilistic broadcast protocols with silencing, whose operations can be described as follows, with respect to the first TD.

(1)
The source sends a new packet (directly mapped on a IEEE 802.11 frame).

(2)
The nodes within a distance z from the source receive the packet and form the 1st TD. Their number is denoted as N _{ z }.

(3)
Every node in the 1st TD probabilistically decides, according to the given PAF and taking into account its distance from the source, to retransmit (or not) the packet.

(4)
The potential forwarders (i.e., the nodes of the 1st TD which have decided to retransmit) compete for channel access, by using the BA mechanism of the IEEE 802.11b standard (described in Section 4), first entering in the prebackoff phase and, then, generating a random waiting time (denoted, in Section 4, as BC). For the purpose of analytical simplicity, we assume that the BCs of the losing contenders are set to ∞.

(5)
The BCs are continuously decreased by all nodes, until (in the case of a successful forwarding) only one of them reaches 0, say the kth BC. During a transmission of a node the other BCs freeze. Should there be the BCs of at least two nodes which reach simultaneously zero, both nodes would transmit and, thus, collide. We assume that the packets involved in a collision are considered undetectable and ignored by the other nodes. The corresponding kth node retransmits the packet.

(6)
The remaining N _{ z }1 nodes decode the packets, reset their timers, and discard the potentially queued packet. The nodes (spatially) preceding the kth node will refrain from retransmitting from then on.

(7)
The whole process (from Step 1) is restarted at the 2nd TD, for which the kth node acts as the source. The 2nd TD is composed by all nodes lying in the interval (d _{0,k}, d _{0,k}+ z) ⊂ ℝ, and it can also include some former nodes of the 1st TD (those following the kth node).
The two novel probabilistic broadcast protocols, polynomial and SIF, are described in the following two subsections.
5.2 Polynomial broadcast protocol
This protocol is characterized by a polynomial PAF, with the following form:
where: d denotes the distance (dimension: [m]) between the node of interest and the previous relay (or source, in the case of the first TD); z is the already introduced transmission range; g ∈ ℕ is the polynomial order. According to the assumptions in Section 2, both z and d are assumed to be known without the need of exchanging additional messages. In fact, z can be estimated by knowing the transmit power and the channel propagation model, while d can be estimated by simply inserting the position of the source vehicle in every transmitted packet (under the assumption of having an accurate GPS receiver).
The shape of p, as a function of d, is shown in Figure 4, for different values of g. It can be observed that the function p is monotonic and concave for all values of g. For high values of g, it becomes quite "selective," since it is approximately zero everywhere, but in the proximity of z. Note that the case with g = 0 (p = 1, ∀d) corresponds to the flooding protocol, i.e., each node retransmits. In this case, the BC value is randomly selected in {0, 1,..., cw  1} as mandated by the IEEE 802.11 standard (Section 4).
5.3 Silencing irresponsible forwarding
This broadcast protocol directly derives from the irresponsible forwarding (IF) protocol, originally presented in [20], with the introduction of the silencing mechanism with the introduction of the silencing mechanism outlined in Section 5.2. Besides this difference, IF and SIF share the same following PAF:
where c is an adimensional shaping coefficient and ρ_{s} is the vehicle spatial density. The latter can be estimated in a straightforward manner. In fact, under the assumption of knowing with a sufficient accuracy its transmission range, a node can estimate its local vehicular spatial density by simply counting the number of nodes lying within its transmission range and dividing them by the transmission range. The design of an efficient method for accurate estimation of the vehicular spatial density goes beyond the scope of this manuscript. However, intuitively it is sufficient to periodically send (and receive) Hello messages to the surrounding nodes. Alternatively, it is possible to rely on already existing beaconing mechanisms, such as the exchange of cooperative awareness messages (CAMs) foreseen by the European cartocar consortium (broadcasted by default every 500 ms) [21].
Similarly to the PAF of the polynomial broadcast protocol, also the PAF of SIF "rewards" the farthest nodes (with respect to the transmitter). However, unlike the polynomial PAF, the PAF of SIF also takes into accounts the (linear) vehicular spatial density, thus allowing to better adapt to different traffic conditions this is the very idea of IF. The shape of p, as a function of d, is shown in Figure 5, for different values of c and ρ_{s}. It can be observed that the PAF of SIF is monotonically increasing and concave for all values of c. Moreover, it becomes selective far small values of c (e.g., 1), while it tends to flatten for high values of c and for low values of ρ_{s}. Also in this case, the BC value is randomly selected in {0, 1,..., cw  1} as mandated by the IEEE 802.11 standard (Section 4).
6 A recursive analytical performance evaluation framework
In Section 2, it has been stated that, since all TDs are statistically identical, the global behavior of the network can be modeled by analyzing a single TD. By exploiting the properties of probabilistic broadcast protocols with silencing (described in Section 5), the following assumptions hold: (i) the internode distance is characterized by a (memoryless) exponential distribution, so that the topology of every TD is (statistically) identical; (ii) the PAF only depends on the distance and is, therefore, memoryless; (iii) the IEEE 802.11b contention mechanism is memoryless, in the sense that it is restarted at every retransmission. Under these assumptions, every retransmission act can be interpreted as a renewal that resets the statistics of the forwarding process. Moreover, since all TDs are statistically identical, without loss of generality we can focus on the first TD.
Therefore, a complete analytical performance evaluation framework can be derived in the following manner: (i) characterizing the first TD with local performance metrics (e.g., the successful transmission probability and the delay); (ii) deriving global performance metrics (e.g., D, RE, TE), by means of a recursive approach.
In Section 6.1, the local performance (i.e., single TD) is investigated under the assumption of a given number of equally spaced nodes, by considering, without loss of generality, the first TD. In Section 6.2, we derive the global metrics for an overall deterministic network scenario, where the nodes are equally spaced in the interval (0, L). Then, in Section 6.3 the results obtained in the deterministic scenario are extended to the original PPPbased scenario.
6.1 Local (single TD) performance analysis with a given number of nodes
Without loss of generality, we focus on the first TD, corresponding to the interval \mathcal{I} introduced in Section 3. We consider a deterministic scenario with a fixed number n of nodes equally spaced in the interval \mathcal{I}=\left(0,z\right)\subset \mathbb{R}. Every node in a TD is identified by an index i ∈ {1, 2, ..., n}. The nodes are thus positioned as in Figure 3 and the positions vector R^{(n)}is defined as in (1).
According to the operational principles of the considered protocol, after the reception of a packet in a given TD, each node decides to (or not to) retransmit according to the protocol's PAF. The nodes that lose the contention set their BCs to ∞, while the winners set their BCs according to the policy of the specific broadcast protocol. The protocol execution could lead to three different outcomes: (i) nobody decides to retransmit; (ii) some nodes decide to retransmit, but all their transmitted packets collide; (iii) some nodes decide to retransmit, and a single node transmits successfully (when its BC because zero, no other BC is zero). It is useful to define the following events, associated to the forwarding process in a TD:
The probabilities of the above defined events are the following:
Let us now introduce the random variable Y ∈ {0, 1, 2, ... , n} with the following PMF:
Since the event {Y = 0} identifies the failure event, the random variable Y indicates either which node has effectively retransmitted or a failure. Moreover, it can be observed that:
Obviously,
In other words, if there is a retransmission (\mathcal{S}), then {P}_{Y}\left(y\mathcal{S}\right)\phantom{\rule{2.77695pt}{0ex}}\left(y\in \left\{0,1,2,...,n\right\}\right) is the probability that the yth node has retransmitted.
As shown in Appendix 2, the transmission probabilities \left\{{p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right)\right\} can be expressed as follows:
where: p_{ i }denotes the value of the PAF (4) for the ith node and depends on the considered protocol; q^{(m)}is the probability that the ith node wins the contention among a set of m competing nodes (the same for a given value of n); {V}_{i}^{\left(n\right)}\in \left\{0,...,n1\right\} is the following discrete random variable:
The derivation of q^{(m)}and of the PMF of {V}_{i}^{\left(n\right)} can also be found in Appendix 2.
After deriving {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right), it is possible to compute the perhop delay, denoted as D_{ i }, of a retransmission from the ith node. Since the perhop delay is meaningful only if the ith node decides to retransmit, it is of interest to study the statistical distribution of D_{ i }conditioned on S_{ i }. For this reason, we introduce the random variable D_{ii}, which can be defined as follows:
where: T^{tx} (dimension: [s]) is the transmission time; T_{slot} (dimension: [s/slot]) is the deterministic duration of the backoff slot; DIFS (dimension: [slot]) is the duration of the DIFS; and {N}_{ii}^{\mathsf{\text{bo}}} (dimension: [slots]) is the number of slots spent by the ith node during the backoff (conditionally on the event S_{ i }). We assume that both the packet size, defined as P (dimension: [bits]), and the transmission rate, denoted as R (dimension: [bits/s]), are constant, thus leading to a deterministic packet transmission time T^{tx} = P/R. Taking into account that DIFS, T_{slot}, and T^{tx} are deterministic, the average value of D_{ii}becomes:
where, according to the derivation in Appendix 3,
where {J}_{k,v}\triangleq \text{min}\left(k,\u230a\left(v/2\right)\u230b\right) denotes the maximum number of collisions that can happen in slots 0, 1, ..., k1, while the matrix {P}_{v}^{\prime}=\left\{{P}_{v}\left(k,j\right)\right\} is defined in Appendix 3.
Proceeding in a similar manner, it is also possible to obtain the average number of retransmissions perhop of the node i, denoted as {\overline{N}}_{\mathsf{\text{rtx}}}^{\mathsf{\text{hop}}}\left(i\right):
where the matrices M_{ k,v }= M_{ k,v }(j, h) and N_{ k,v }= N_{ k,v }(j, h) are defined in Appendix 3.
6.2 Global performance analysis with fixed number of nodes
Once the perTD performance has been analyzed (as described in Section 6.1), the global performance metrics introduced in Section 2.2 (namely, RE, TE, and D) can be computed by following a recursive approach, based on the inductive principle. This recursive approach is extensively described, for the evaluation of D, in Appendix 4, but can be directly readapted for the evaluation of RE and TE. In the remainder of this subsection, we outline the final results, trying to provide the reader with the intuition behind them.
Recall that we consider a deterministic scenario with a fixed number N of nodes equally spaced in the interval (0, L) ⊂ ℝ, where L = z ℓ_{norm}. For simplicity, we assume that a generic TD contains n = N/ℓ_{norm} nodes. This corresponds to a bestcase scenario, where the farthest node of each TD is the domain forwarder (the "silencer," as denoted in Section 5).
Delay The computation of the average D is carried out taking into account only the packets successfully arriving at the end of the network (i.e., at the last reachable node) and ignoring the (remaining) packets which stop earlier. On the basis of the approach described in detail in Appendix 4, the average endtoend delay can be given the following recursive formulation:
where {\overline{D}}^{\left(Ni\right)} is the average delay in a network with N  i nodes and {\overline{T}}_{\mathsf{\text{src}}}^{\mathsf{\text{tx}}} is the average transmission time of the source, which differs from those of the following nodes, since the source does not contend with any other node and its transmission is not affected by collisions. Since the average time spent in the backoff is {\overline{T}}_{\mathsf{\text{src}}}^{\mathsf{\text{tx}}} can be expressed as
RE The average RE can be defined as follows:
where N_{reach} is a random variable denoting the number of nodes reached by a packet. As a consequence of our assumptions, N_{reach} is lower bounded by n, since the transmission from the source reaches n nodes (those of the first TD) with probability 1. The average value {\overline{N}}_{\mathsf{\text{reach}}} can be obtained by following the approach described in Appendix 4, but for the replacement of {p}_{Y}\left(i\mathcal{S}\right) with p_{Y}(i) and of {\overline{D}}_{ii} with the number of additional nodes covered by a new transmission. For example: a transmission from the 1st node of the first TD will reach only one additional node (namely, the (n + 1)th); a transmission from the 3rd node will reach three additional nodes (namely, the (n + 1)th, (n + 2)th, and (n + 3)th); and so on. Please note that, unlike the delay, in the computation of the RE we are not conditioning on the fact of reaching the Nth node of the network, i.e., the last reachable node of the network. Therefore, also the packets which stop being retransmitted are taken into account.
After the execution of the recursive approach outlined in Appendix 4, it is sufficient to add a constant equal to n, corresponding to the number of nodes directly reached by the source at the first hop. The final expression of {\overline{N}}_{\mathsf{\text{reach}}} becomes (using the notation of Appendix 4):
where {\overline{N}}_{\mathsf{\text{reach}}}^{\left(Ni\right)} corresponds to the average number of nodes reached in a network with N  i nodes and can be recursively computed in the same way.
TE In order to reduce the computational burden, we adopt the following approximated formulation of TE:
where {\overline{N}}_{\mathsf{\text{rtx}}} denotes the average overall number of retransmissions over all hops. From a computation viewpoint {\overline{N}}_{\mathsf{\text{rtx}}} is approximated by {\overline{N}}_{\mathsf{\text{rtx}}}^{{m}^{\left(*\right)}}, where m* corresponds to the average number of reached nodesit is a sort of approximated indicator of the "depth" of the propagation process. Since the RE can be interpreted as the ratio between the average number of reached nodes and the total number (N) of nodes, m* can be approximated as follows:
At this point, {\overline{N}}_{\mathsf{\text{rtx}}}^{{m}^{\left(*\right)}} can be computed by applying the recursive approach presented in Appendix 4, by replacing (i) {p}_{Y}\left(i\mathcal{S}\right) with p_{ Y }(i) and (ii) {\overline{D}}_{ii} with the average number of transmissions per hop, denoted by {\overline{N}}_{\mathsf{\text{rtx}}}^{\mathsf{\text{hop}}} and given in (9).
6.3 Generalization to a PPPbased scenario
According to the original PPPbased model, described in Section 2, the number of nodes within \mathcal{I}, denoted as N_{ z }, has the following Poisson distribution:
However, since a real vehicle has a finite length, it is not possible to have an infinite number of vehicles within \mathcal{I}. Therefore, it makes sense to impose an arbitrary limit to the maximum number of nodes within \mathcal{I}, denoted as N_{ c }. The new truncated Poisson random variable, denoted as {N}_{z}^{\prime}, has the following distribution:
where we have also removed the event n = 0this would correspond to an empty TD.
In order to exploit the results of Section 6.1, the stochastic network topology of the PPP needs to be mapped into a deterministic one with equally spaced nodes. In order to do this, the interval \mathcal{I} is partitioned in N^{int} subintervals of length z/N^{int}, where N^{int} ∈ {N_{ c }, N_{ c }+ 1, N_{ c }+ 2,...} is a design parameter. The computational burden and the accuracy are directly related to the value of N^{int}. After some numerical tests, we observed that the value N^{int} = 100 is a good tradeoff between precision and computational time. The ith subinterval thus is:
Every subinterval can contain at most one node: in general, we assume that in each subinterval there is a "virtual" node. Consequently, it is possible to associate a transmission probability {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right) to the generic subinterval {\mathcal{I}}_{i}, defined as {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right), and a corresponding pernode delay, denoted as D(i)^{eq} (i = 1,..., N^{int}).
We define as {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(j\right) the probability of retransmission of the jth node, given that there are exactly n nodes in the interval \mathcal{I}. Using the total probability theorem, {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right) can be expressed as follows:
where f(i,j,n) is an indicator function defined as follows:
The probability {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right) is now a function of {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right) (n ∈ {1, 2,..., N_{ c }}, i ∈ {1, 2,..., n}), which can be computed with combinatorics, since it is associated with a deterministic scenario with n static nodes equally spaced in [0, z].
At this point, by using (6) in Equation (15), it is possible to obtain a closedform expression for {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right). Leveraging on the knowledge of {p}_{\mathsf{\text{rtx}}}^{\mathsf{\text{eq}}}\left(i\right), by using Equations (15) into (7) and (9), it is possible to obtain, respectively, D(i)^{eq} (i = 1,...,N^{int}) and {n}_{\mathsf{\text{rtx}}}^{\mathsf{\text{ho}}{\mathsf{\text{p}}}^{\mathsf{\text{eq}}}}. Then, it is possible to use the framework presented in Section 6.2 to derive RE, TE, and D for a deterministic network composed by N_{c}ℓ_{norm} nodes, since N_{ c }is the (imposed) number of nodes in the interval \mathcal{I} (and, thus, in each TD).
As anticipated at the end of Section 1, we remark that the presented analytical framework can be employed to study other types of broadcast protocols, not necessarily probabilistic, by simply readapting the definition of {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right) and D_{ii}. This is the subject of our current research activities.
7 Theoretical performance analysis and simulationbased validation
7.1 Polynomial protocol
In this section, we compare the results obtained with the analytical framework presented in Section 6 with results obtained through numerical simulations carried out with the ns2.34 simulator [22]. In particular, the polynomial protocol has been "inserted" on top of the IEEE 802.11b model, after fixing the bugs reported in [23]. We observe that, conditionally on the fact of suitably scaling the packet size and the packet generation rate, from the perspective of our framework the IEEE 802.11a/p standards will offer the same performance of the IEEE 802.11b standard. All the results presented are accurate within ±5% of the values shown with 95% confidence. The relevant parameters of the simulation are listed in Table 1. The results are obtained for a fixed node spatial density ρ_{s} = 0.1 veh/m, while the possible values of the transmission range z are listed in Table 1. In particular, the values of z are selected so that the corresponding values of ρ_{s}z are between 10 and 40veh. In the numerical simulations, we do not consider any case with ρ_{s}z < 10 veh, since this corresponds to topologies that are disconnected with a high probability, as shown in [10]. In Figure 6, (a) D, (b) RE, and (c) TE are shown as functions of ρ_{ s }z, for different values of g, by taking into account both the results of the analytical framework and of the numerical simulations, thus allowing to assess the validity of the analytical model. As shown in [10], using the considered values of ρ_{ s }z (between 10 and 40 veh), the network is fully connected (i.e., n_{reach} = N) with a high probability. From Figure 6b it emerges that, in terms of RE, there is an excellent match between the results of the theoretical framework and those of the simulator. As shown by Figure 6c, the agreement between analysis and simulations is still good also in terms of TE. On the other hand, the delay predicted by the analytical framework overestimates the true delay for small values of g (e.g., g = 0), whereas it becomes very accurate for large values of g (e.g., g = 7). The comparative investigation of analytical and simulation results indicates the validity of the proposed framework (especially for large values of g).
According to the results in Figure 6a,c, it emerges that a higher polynomial degree leads to a better performance, regardless of the value of ρ_{s}z, in terms of both D and TE. Conversely, since the PAF is highly selective for large values of g (as shown in Figure 4), this leads to poor performance in terms of RE, as shown in Figure 6b. By considering small values of g (e.g., g = 0 corresponds to flooding), one observes the opposite phenomenon: a drastic improvement in terms of RE, at the price of a slightly higher D and a smaller TE.
In order to better understand the impact of g and ρ_{s}z on the protocol performance: in Figure 7a, D is shown, parametrized with respect to g, as a function of RE for different values of ρ_{s}z; while in Figure 7b D is shown, parametrized with respect to ρ_{s}z, as a function of RE for different values of g. From the results in Figure 7a, it emerges that even little variations of g lead to radically different protocol behaviors. On the contrary, ρ_{s}z has an impact on the performance only for small values of ρ_{s}z, while for increasing values of ρ_{s}z (e.g., larger than 20 veh) its impact vanishes.
From the results in Figures 6 and 7, it emerges clearly that there is no optimal value of g. However, the proposed framework allows to optimize a single performance metric, after having imposed some constraints on the other metrics, on the basis of proper quality of service criteria. A possible choice consists in ignoring TE and minimizing D under the constraint of attaining a target value of RE. Since D is a decreasing function of g, it is possible to define the following quasioptimal g*:
Selecting g = g* allows to achieve the minimum delay under a constraint on the RE. The obtained g* is shown, as a function of ρ_{s}z, in Figure 8a, and the following considerations can be drawn: (i) g* is an increasing monotonic function of ρ_{s}z; (ii) with the exception of the region in proximity to ρ_{s}z = 0, where g* tends to 0, g* has a quasilinear dependence with respect to ρ_{s}z. It can be shown that if \mathsf{\text{RE}}\simeq 1 for each value of ρ_{s}z. Note that the selection of g* allows to maximize RE. However, as shown in Figure 8, D is always higher than 0.08s, a delay which is instead guaranteed by the use of g = 7, as shown in the same figure.
7.2 Silencing irresponsible forwarding
As pointed out in Section 6, the proposed framework can be applied to a large family of broadcast protocols. In this section, the framework is applied to SIF. In particular, the validity of the proposed analytical framework is clearly shown in Figure 9, where (a) D, (b) RE, and (c) TE are shown, as functions of ρ_{ s }z, for different values of c, by directly comparing both analytical and simulation results. As with the polynomial broadcast protocol, in this case as well there is a good agreement between the results obtained with the analytical model and the simulations. In particular, it can be observed that the accuracy of the model depends on the value of the shape parameter c (the highest average accuracy, over all metrics, is observed with c = 7). By comparing Figures 6 and 9, one can observe that polynomial and SIF protocols have a different dependence on ρ_{ s }z. In particular, in the case of SIF, as the product ρ_{ s }z increases RE remains roughly the same, while D decreases and TE increases. In other words, SIF performs better in dense networks. On the other hand, in the case of the polynomial protocol (Figure 6), D and TE have an opposite behavior (namely, D slightly increases and TE slightly decreases for increasing values of ρ_{ s }z), and RE strongly depends on ρ_{ s }z, especially in sparse networks. In general, SIF outperforms the polynomial broadcast protocol.
Furthermore, from Figure 9 it is clear that also for SIF there is no optimal value of the parameter c which simultaneously optimizes the performance according to all considered metrics. This fact can be better understood from Figure 10, where D is shown as a function of RE, parametrized, respectively, with respect to (a) ρ_{ s }z and (b) c. In particular, from Figure 10b it emerges that if one wants to guarantee a minimum value of RE (say 0.95), it is necessary to use a sufficiently high value of c. This, in turns, does not minimize D, which, as shown in Figure 10b, is directly proportional to c. Moreover, the results in Figure 10a strengthen the observations carried out regarding the results in Figure 9. In fact, they clearly evidence two important characteristics of SIF: (i) RE is not affected by the value of ρ_{ s }z, as SIF automatically adapts; (ii) counterintuitively D is a decreasing function of ρ_{ s }z (e.g., SIF performs better in dense networks).
7.3 Comparison with benchmark protocols
As aforementioned, the theoretical framework presented in this manuscript can be used for evaluating a large number of broadcast protocols. In this subsection, it is applied to two benchmark broadcast protocols: (i) the flooding protocol (denoted with "FLOOD"), where each node forwards a received message; (ii) the optimal MCDSbased protocol (denoted with "MCDS"), where a hypothetical network genius selects as relays only the nodes belonging to the MCDS set (as described in Section 1). In both cases, the silencing mechanism is employed.
These benchmark protocols are compared with the SIF and polynomial protocols, considering a vehicle spatial distribution characterized by a Poisson distribution with parameter ρ_{ s }z = 16veh. In order to have a significant comparison, the optimal values of c and g (c* = 4.8 and g* = 2.7) are considered. These values, obtained through the analytical framework, allow to minimize D under the constraint of having a RE higher than 0.95, in a scenario with ρ_{s}z = 16veh. The results, attained through both simulations and theoretical analysis, are shown in Figure 11. From the results in Figure 11, a few considerations can be drawn. First, for all considered metrics, there is a performance loss between the MCDSbased and the optimized SIF/polynomial protocols. At the same time, the SIF/polynomial protocols exhibit a similar performance gain with respect to flooding (with the exception of the RE metric). It is also possible to observe that, counterintuitively, the SIF and the polynomial protocols offer a similar performance level. This result can be motivated by considering that their PAFs tend to converge to a common shape, when using, respectively, the optimal values g* and c* as their key parameters. Finally, it can be also be noticed an excellent match between simulation and theoretical results can be observed.
7.4 Impact of topology on the protocol performance
The goal of this subsection is to assess (aposteriori) the validity of the assumption, made in Section 2, of considering a unidimensional static network. The validation is performed through simulations, by taking into account the protocols considered in Section 7.3 (namely, flooding, MCDSbased, SIF, and polynomial protocols). According to our assumption, we expect that the performances offered by these protocols will not be significantly affected by the network topology. To this end, we consider three different scenarios: (i) the unidimensional (singlelane) static network presented in Section 2; (ii) a multilane static network; (iii) a multilane mobile network. The multilane static scenario is composed by N_{lane} = 6 adjacent lanes, each with width equal to w_{lane} = 4 m. This network is obtained by simply replicating the singlelane topology. In particular, in each lane the positions of the vehicles are generated according to a PPP of parameter ρ_{s}/N_{lane}. Similarly, the multilane mobile scenario is composed by N_{lane} = 6 adjacent lanes (3 per direction of movement), each with width equal to w_{lane} = 4 m. In this case, the vehicles are moving according to the intelligent driver motion with lane changes (IDMLC) mobility model [24] and, therefore, their positions do not have Poisson distribution. The mobility traces have been obtained using VanetMobiSim [25] and plugged in the ns2 network simulator. The vehicles' speeds are independent and uniformly distributed in the interval (2040) m/s. Greater insights about the mobility models and the trace generation process are provided in [26]. It should be noticed that the value of the perlane vehicular density (ρ_{s}) is timeaveraged, since it is computed directly from the mobility trace and thus is timevarying. In Figure 12, we show the results obtained by considering ρ_{s} = 16 veh and the optimal values of c and g (c* = 4.8 and g* = 2.7). It can be easily noticed that the performances obtained in the considered scenarios are quite similar. Hence, this proves (aposteriori) that the assumptions made in Section 2 are substantially correct. More specifically, it can be observed that increasing the width of the network leads to very similar values of RE and D, and to slightly higher TE (this can be justified by considering that there is a higher number of nodes in the neighborhood of a vehicle). Instead, if we consider the same scenario but with mobile vehicles, one can observe that the RE becomes slightly lower, while D and TE become higher. This behavior is motivated by the tendency of mobile VANETs to form ephemeral clusters of vehicles [27], leading to a reduced RE and increased D but to a higher TE.
Finally, the limited impact of the vehicle mobility on the protocols' performance could have been expected by considering the values of the worst case transmission time (about 0.2 s) and of the the maximum allowed speed (roughly equal to 40 m/s, corresponding to 144km/h). In these conditions, two vehicles proceeding in opposite directions on a highway have a differential speed of 80 m/s, and this leads, in turn, to a distance variation of 16 m during a packet transmission time. A distance of 16 m (the worstcase variation) corresponds to a small fraction of the transmission range of a typical IEEE 802.11 network interface (in Figure 12, we have considered z = 160 m).
8 Conclusions
In this article, we have presented a theoretical framework, based on a recursive computational approach, for average performance analysis of multihop broadcast protocols with silencing. We have then considered its application to VANET scenarios. The framework can be used in all the scenarios where the nodes' positions are distributed in such a way that their average positions are equally spaced. For example, it can be readily used for topologies where the nodes' positions have approximately a Poisson distribution. The proposed framework can be applied to a broad family of protocols and its validity has been assessed by means of ns2 simulations, by considering several VANET scenarios. In particular, the framework allows to characterize the average performance of broadcast multihop protocols in highwaylike scenarios, either static or mobile, thus preventing the use of timewasting numerical simulations.
Appendix 1: Derivation of the average nodes positions
In this appendix, we derive the average value of the positions vector R(^{n}) (n ∈ ℕ) of n Poisson points falling in the finite interval \mathcal{I}=\left(0,z\right). The average values can be computed by firstly deriving the joint PDF of the vector R^{(n)}, denoted as {f}_{R}^{\left(n\right)}\left(r\right), and defined over a proper ndimensional domain {\mathcal{D}}_{n}. From {f}_{R}^{\left(n\right)}\left(r\right), it is then possible to derive the marginal PDF of R_{ j }(j = 1, 2,..., n), denoted as {f}_{{R}_{j}}^{\left(n\right)}\left({r}_{j}\right) and, from this, the average value {\overline{R}}_{j}^{\left(n\right)}.
A single point in \mathcal{I}
In this case, n = 1 and {\mathcal{D}}_{n}=\mathcal{I}. In this case, R_{1} has a uniform distribution in \mathcal{I} and its (marginal) PDF is given by:
The average value is:
Two points in \mathcal{I}
Without loss of generality, it is possible to order the points by imposing that r_{2} > r_{1}. Thanks to this assumption, {\mathcal{D}}_{2} can be expressed as follows:
The joint PDF is uniform over {\mathcal{D}}_{2} and can be expressed as follows:
From the joint PDF, the marginal PDFs of R_{1} and R_{2} can be obtained:
Using Equations (17) and (18), the average values of R_{1} and R_{2} can be expressed:
A generic number of n points in \mathcal{I}
As in the case with n = 2, it is possible to order the points as that r_{1} < r_{2} < · · · < r_{ n }, without losing any generality. Hence, the ndimensional domain can be expressed as follows:
The joint PDF of the n Poisson points has the following expression:
where
The marginal PDF of the position of the ith point is given by:
On the basis of Equation (19), it is straightforward to derive the marginal PDF of R_{ i }(i = 1, 2, ..., n), given the presence of n points in the interval \mathcal{I}:
Finally, from Equation (20) the average value of R_{ i }can be expressed as follows:
Appendix 2: Pernode retransmission probability in a network with equally spaced nodes
We consider the deterministic scenario introduced in Section 6.1, composed by a fixed number n of nodes equally spaced in the interval \mathcal{I}=\left(0,z\right)\subset \mathbb{R}, with the positions vector R(^{n}) defined in Equation (1). In this appendix, we derive the following probabilities:
where the event {\mathcal{S}}_{i} was defined in Section 6.1. In order to derive {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right), it is helpful to introduce the following auxiliary events:

{\mathcal{B}}_{i}\triangleq {the node i is designated as a relay};

{\mathcal{C}}_{i}\triangleq {the node i wins the contention among a set of n nodes};

{\mathcal{D}}_{i}^{\left(m\right)}\triangleq A {the node i wins the contention among a set of m contending nodes};

{\mathcal{W}}_{k}\triangleq {the value BC = k is chosen by a single node} k = 0,..., cw  1;

\mathcal{W}\triangleq {at least a value of BC ∈ [0, cw  1] is chosen by a single node}.
The event {\mathcal{S}}_{i}, defined in Subsection 6.1, is verified if both the events {\mathcal{B}}_{i} and {\mathcal{C}}_{i} happen. Therefore, {p}_{\mathsf{\text{rtx}}}^{\left(n\right)}\left(i\right) can be expressed as:
where the last equality is motivated by the independence of the events {\mathcal{B}}_{i} and {\mathcal{C}}_{i}. The probability \mathsf{\text{P}}\left\{{\mathcal{B}}_{i}\right\} is known, since it should be replaced with one of the PAF used by the protocols considered in this work (defined in Equations (4) and (5)). On the opposite, the unknown probability \mathsf{\text{P}}\left\{{\mathcal{C}}_{i}\right\} can be derived by applying the total probability theorem, thus obtaining:
where {q}^{\left(m\right)}\left(i\right)\triangleq P\left\{{\mathcal{D}}_{i}^{\left(m\right)}\right\} and {V}_{i}^{\left(n\right)}\in \left\{0,\dots ,n1\right\} is a discrete random variable defined as:
It can be shown that the PMF of {V}_{i}^{\left(n\right)} can be expressed as follows:
where L\triangleq \left\{1,2,\dots ,N\right\}\backslash \left\{i\right\} and the sets \left\{{J}_{k,i,v}\right\} are defined as follows:
The probability q^{(m)}(i) can be computed by analyzing the BA mechanism of the IEEE 802.11b standard. In particular, it emerges that q^{(m)}(i) is independent of i and can be expressed as follows:
Since the events \left\{{\mathcal{W}}_{k}\right\} are not disjoint, it is necessary to use the generalized union probability formula [29, Ch.4] to compute \mathsf{\text{P}}\left\{\mathcal{W}\right\}:
Since the addenda of each single sum of the righthand side of (22) are the same, taking into account the number of possible combinations, the generic righthand side of (22) can be then expressed as follows:
Thanks to Equation (22), q^{(n)}can be finally given the following expression:
where the term min (n, cw) is introduced to deal with the case n < cw.
Appendix 3: Pernode delay in a network with equally spaced nodes
In this appendix, we derive the number of slots spent by the ith node during the backoff conditioned to the event {\mathcal{S}}_{i}, denoted as {N}_{ii}^{\mathsf{\text{bo}}}. By analyzing the BA mechanism of the IEEE 802.11b standard, one obtains:
where P\left\{{V}_{i}^{\left(N\right)}=v{\mathcal{S}}_{i}\right\} can be derived by means of the Bayes theorem as follows:
Instead, E\left[{N}_{i}^{\mathsf{\text{bo}}}{V}_{i}^{\left(N\right)}=v,{\mathcal{S}}_{i}\right] can be derived by observing that the delay associated with the event {the node i transmits with success given v contending nodes} depends on two factors: (i) the slot BC_{ i }∈ {0,..., cw1} selected by the node i for transmitting; (ii) the number of collisions occurred in the slots 0,..., k  1, which, given that BC_{ i }= k, corresponds to the following random variable:
where {J}_{k,v}\triangleq \text{min}\left(k,\u230a\left(v/2\right)\u230b\right) denotes the maximum number of collisions that can happen in slots 0,..., k 1. On the basis of these considerations it can be shown that:
where {P}_{v}\left(k,j\right)\triangleq \mathsf{\text{P}}\left\{B{C}_{i}=k\wedge {N}_{k,v}^{\mathsf{\text{col}}}=j{V}_{i}^{\left(N\right)}=v,{\mathcal{S}}_{i}\right\} is the (k, j)th element of the matrix P_{ v }, of dimension cw × (J_{cw1,v}+ 1). There exist N matrices P_{ v }, one for each value of \left\{{V}_{i}^{\left(N\right)}=v\right\},v\in \left\{0,N1\right\}..
In order to derive P_{v} it is necessary to define the following random variables:
It is then possible to compute P_{ v }(k, j) using Bayes theorem and the total probability theorem:
where the (j, h)th elements of matrix N_{ k,v }(with dimension (v + 1) × (v + 1)) are defined as:
while the (j, h)th elements of matrix M_{ k,v }(with dimension (J_{ k,v }+ 1) × (v + 1)) are defined as:
In order to reduce the computational burden, the matrix M_{ k,v }can be derived by means of a recursive strategy. In particular, it can be observed that the number of collisions at the kth hop is identical to (if nobody select the value BC = k  1) or greater than 1 (if at least two nodes selects that value). Hence, once derived M_{1,v}it is possible to determine M_{ k,v }for all the remaining values of k. In particular, the direct formulation for k = 1 is the following:
from which it is possible to derive M_{k+1,v}for any values of k:
where the indicator function I_{ j,k }is defined as
Finally, using Equations (24) and (25) in (23), one obtains the final expression:
This allows to determine D_{ii}for every node of a given TD.
Appendix 4: Recursive approach for the evaluation of the performance global metrics
In this appendix, we outline the recursive approach which, coherently with an inductive principle, allows to derive the average global performance metrics (namely, RE, D, and TE), on the basis of the average local performance metrics of a generic TD. We recall that, thanks to the assumptions of the deterministic approach, all the TDs are identical and composed of n nodes. The recursive approach is detailed by considering the computation of D, but with the same approach it is also possible to derive RE and TE. The computation of the average D is carried out taking into account only the packets successfully arriving at the last reachable node, ignoring the unsuccessful retransmissions.
For all the values of m such that m ≤ n, all the n nodes within the 1st TD are reached by the source. Therefore, the average delay coincides with the average transmission time of the source, given by Equation (11), i.e.,
However, for all the values m > n, at least a retransmission is necessary to reach the mth node. In particular, if we consider the case m = n + 1, the (n + 1)th node can be reached only and only if a successful transmission is carried out by a node of the 1st TD. This event can happen in n different ways, each associated with a different delay. The tree of the possible decisions is represented in Figure 13, where every branch is labeled with the associated probability and with the corresponding value of delay. Since we are conditioning to the fact of having a successful transmission, the probability of the event {the ith node transmits} is given by {p}_{Y}\left(i\mathcal{S}\right). Therefore, the average delay {\overline{D}}^{\left(n+1\right)} can be obtained as follows:
When m = n + 2 the situation is slightly more complicated, since when the 1st node is selected in the 1st TD, two transmissions are needed to reach the (n + 2)th node. In this case, a second TD, identical to the first, is formed, thus leading to the addition of n branches to the tree, as shown in Figure 14. However, since the two TDs are identical, the branches following the event \left\{y=1\mathcal{S}\right\}, can be replaced by the average delay computed for m = n + 1. Therefore, one obtains:
Similar considerations can be drawn in the case with m = n + 3: the corresponding tree is shown in Figure 15. In this case, the two circled branches in the left figure, can be replaced by {\overline{D}}^{\left(n+1\right)}, obtaining the tree in the central figure that can be further simplifying by using {\overline{D}}^{\left(n+2\right)}, thus leading to the following expression:
Now, by induction it is possible to derive the formulation of {\overline{D}}^{\left(N\right)} given in (10).
Abbreviations
 VANETs:

vehicular adhoc NETworks
 MANETs:

mobile adhoc NETworks
 MCDS:

minimum connected dominant set
 RTS/CTS:

readytosend/cleartosend
 UMB:

urban multihop broadcast
 SB:

smart broadcast
 BPAB:

binary partition assisted protocol
 PPP:

poisson point process
 GPS:

global positioning system
 RE:

REachability
 TE:

transmission efficiency
 D:

delay
 MAC:

medium access control
 BA:

basic access
 DIFS:

distributed interframe space
 BC:

backoff counter
 PAF:

probability assignment function
 TD:

transmission domain.
References
Ni S, Tseng Y, Chen Y, Sheu J: The Broadcast Storm Problem in a Mobile Ad Hoc Network. In Proc. ACM Intern. Conf. on Mobile Comput. and Networking. (MOBICOM), Seattle, WA, USA; 1999:151162.
Zanella A, Pierobon G, Merlin S: On the limiting performance of broadcast algorithms over unidimensional adhoc radio networks. In Proc. of IEEE Intl. Conf. on Wireless Personal Multimedia Communications. (WMPC), Abano Terme, Italy; 2004:165169. (2004)
TorrentMoreno M, Mittag J, Santi P, Hartenstein H: Vehicletovehicle communication: fair transmit power control for safetycritical information. IEEE Trans. Veh. Technol. 2009, 58(7):36843707.
Kihl M, Sichitiu M, Joshi HP: Design and evaluation of two geocast protocols for vehicular adhoc networks. J Internet Eng 2008, 2: 127135.
Korkmaz G, Ekici E, Özgüner F, Özgüner U: Urban multihop broadcast protocol for intervehicle communication systems. In Proc. of ACM Intl. Workshop on Vehicular ad hoc networks. (VANET), (ACM, Philadelphia, USA; 2004:7685.
Korkmaz G, Ekici E, Ozguner F: Blackburstbased multihop broadcast protocols for vehicular networks. IEEE Trans. Veh. Technol. 2007, 56(5):31593167.
Sobrinho J, Krishnakumar A: Qualityofservice in ad hoc carrier sense multiple access wireless networks. IEEE J .Sel. Areas Commun. 2002, 17(8):13531368.
Fasolo E, Zanella A, Zorzi M: An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In Proc. IEEE International Conf. on Commun.. Volume 9. (ICC), Istanbul, Turkey; 2006:39603965. (ICC)
Sahoo J, Wu E, Sahu P, Gerla M: BPAB: binary partition assisted emergency broadcast protocol for vehicular ad hoc networks. In Proc. of Intl. Conference on Computer Communications and Networks. (ICCCN), San Francisco, CA, USA; 2009:16.
Busanelli S, Ferrari G, Panichpapiboon S: Efficient broadcasting in IEEE 802.11 networks through irresponsible forwarding. In Proc. IEEE Global Telecommun. Conf.. (GLOBECOM), Honolulu, HA, USA; 2009:16.
Hanashi AM, Siddique A, Awan I, Woodward M: Performance evaluation of dynamic probabilistic broadcasting for flooding in mobile ad hoc networks. Simul. Model. Pract. Theory 2009, 17(2):364375. 10.1016/j.simpat.2008.09.012
Wisitpongphan N, Tonguz O, Parikh J, Mudalige P, Bai F, Sadekar V: Broadcast storm mitigation techniques in vehicular ad hoc networks. IEEE Wirel. Commun. Mag. 2007, 14(6):8494.
Busanelli S, Ferrari G, Giorgio VA: On the effects of mobility for efficient broadcast data dissemination in I2V networks. In Proc. SWiM Workshop IEEE Global Telecommun. Conf.. (GLOBECOM), Miami, FL, USA; 2010:3842.
Wisitpongphan N, Bai F, Mudalige P, Sadekar V, Tonguz OK: Routing in sparse vehicular ad hoc wireless networks. IEEE J. Sel. Areas Commun. 2007, 25(8):15381556.
Papoulis A: Probability, Random Variables and Stochastic Processes. 3rd edition. McGrawHill, New York; 2001.
Insitute of Electrical and Electronics Engineers, IEEE Std 802. 11TM2007. 2007.
IEEE Standard for Information technologyTelecommunications and information exchange between systems Local and metropolitan area networksSpecific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std 802.11p2010 (Amendment to IEEE Std 802.112007) 2010, 151.
Mohan P, Padmanabhan VN, Ramjee R: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In ACM Int. Conf. on Embedded Networked Sensor Systems. (SenSys), Raleigh, NC, USA; 2008:323336.
Ferrari G, Busanelli S, Iotti N, Kaplan Y: Crossnetwork information dissemination in VANETs. In Proc. of IEEE Intl. Conf. on ITS Telecommunications. (ITST), SaintPetersburg, Russia; 2011:133139.
Panichpapiboon S, Ferrari G: Irresponsbile forwarding. In Proc. IEEE Intl. Conf. on Intelligent Transport System Telecommunication. (ITST), Phuket, Thailand; 2008:311316.
Kosch T, Kulp I, Bechler M, Strassberger M, Weyl B, Lasowski R: Communication architecture for cooperative systems in Europe. IEEE Commun. Mag. 2009, 47(5):116125.
Network Simulator 2 (ns2)Available at; [http://isi.edu/nsnam/ns/]
Chen Q, SchmidtEisenlohr F, Jiang D, TorrentMoreno M, Delgrossi L, Hartenstein H: Overhaul of IEEE 802.11 modeling and simulation in ns2. In Proc. of the ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. (MSWiM), Chania, Crete Island, Greece; 2007:159168.
Fiore M, Härri J, Filali F, Bonnet C: Vehicular mobility simulation for VANETs. In Proc. of SCS Annual Simulation Symposium. (ANSS), Norfolk, VA, USA; 2007:301309.
VanetMobiSim Project[http://vanet.eurecom.fr/]
Busanelli S, Ferrari G, Giorgio VA: I2V highway and urban vehicular networks: a comparative analysis of the impact of mobility on broadcast data dissemination. J. Comm. SI Seam. Mobil. Wirel. Netw. 2011, 6: 87100.
Busanelli S, Ferrari G, Panichpapiboon S: Clusterbased irresponsible forwarding. In The Internet of Things, 20th Tyrrhenian International Workshop on Digital Communications, Springer. Edited by: D Giusto, G Morabito, A Iera, L Atzori. Pula, Sardinia, Italy; 2009.
Eureka Project 6252 XNETAD[Http://www.eurekanetwork.org/project//id/6252]
Feller W: An Introduction to Probability Theory and its Applications. Volume 1. Wiley, New York; 1968.
Acknowledgements
This work is carried out under the oneyear project "CrossNetwork Effective Traffic Alerts Dissemination" (XNETAD, Eureka Label E! 6252 [28]), sponsored by the Ministry of Foreign Affairs (Italy) and The Israeli Industry Center for R&D (Israel) under the "IsraelItaly Joint Innovation Program for Industrial, Scientific and Technological Cooperation in R&D." The authors would like to thank Prof. A. Bononi of the University of Parma for his support and help.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Busanelli, S., Ferrari, G. & Gruppini, R. Recursive analytical performance evaluation of broadcast protocols with silencing: application to VANETs. J Wireless Com Network 2012, 10 (2012). https://doi.org/10.1186/16871499201210
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/16871499201210
Keywords
 poisson point process
 VANET
 broadcast protocol
 performance analysis
 IEEE 802.11
 ns2
 highway
 VanetMobiSim