Skip to main content

Recursive analytical performance evaluation of broadcast protocols with silencing: application to VANETs

Abstract

In this article, we present a novel theoretical framework suitable for analytical performance evaluation of a family of multihop broadcast protocols. The framework allows to derive several average performance metrics, including reliability, latency, and efficiency, and it is targeted to Vehicular Ad-hoc NETworks (VANETs) applications based on an underlying IEEE 802.11 protocol. It builds on the assumption that the positions of the nodes of a VANET can be statistically modeled as Poisson points. However, the proposed approach holds for any spatial vehicle distribution with constant average distance between consecutive vehicles. In this work, the proposed analytical framework is applied to the class of probabilistic broadcast multihop protocols with silencing, but can be generalized to non-probabilistic protocols as well. More specifically, this work considers a few broadcast protocols with silencing, differing for the probability assignment function. The validity of the proposed analytical approach is assessed by means of numerical simulations in a highway-like scenario.

1 Introduction

Nowadays, most of the vehicles available on the market are provided by sensorial, cognitive, and communication skills. In particular, leveraging on inter-vehicular communications--a set of technologies that gives networking capabilities to the vehicles--vehicles can create decentralized and self-organized vehicular networks, commonly denoted as vehicular Ad-hoc NETworks (VANETs), involving either vehicles and/or fixed network nodes (e.g., road side units).

Vehicular Ad-hoc NETworks present a few unique characteristics: (i) the availability of virtually unlimited energetic and computational resources (in each vehicle); (ii) very dynamic network topologies, due to the high average speed of the vehicles; (iii) nodes' movements constrained by the underlying road topology; (iv) the need for broadcast communication protocols, used as truly information-bearing protocols (especially in multihop communication scenarios) and not only as auxiliary supporting tools. For instance, a multihop broadcast protocol fulfills well the requirements of applications such as the diffusion of safety-related messages (e.g., warning alerts) or public interest information (e.g., road interruptions).

Reducing the number of redundant packets, while still ensuring good coverage and low latency, is one of the main objectives in multi-hop broadcasting. In fact, a too large number of transmissions acts unavoidably leads to unsustainable levels of latency, retransmissions, and collisions: the overall phenomenon is typically referred to as broadcast storm problem [1] and it mainly affects dense networks. The problem of minimizing the number of transmissions has been deeply investigated by the Mobile Ad-hoc NETworks (MANETs) research community: the theoretically optimal solution consists in designating, as relays, the nodes belonging to the minimum connected dominant set (MCDS) of the network [2]. The nodes within the MCDS have the following properties: (i) they form a connected graph; (ii) every other node of the network is one-hop connected with a node in the MCDS; (iii) the MCDS has the lowest cardinality over all the possible collections of nodes that satisfy the previous two requirements.

Following the "idealized" MCDS-based design approach, a plethora of multihop broadcast protocols have been recently proposed in the VANET literature. Some of them, such as the emergency message dissemination for vehicular environments (EMDV) protocol [3], achieve remarkable performance by exploiting partial or complete knowledge of the network topology [4]. However, since collecting this information may be very expensive in terms of overhead, other techniques (requiring a reduced information exchange) have been proposed. An efficient IEEE 802.11-based protocol, denoted as urban multihop broadcast (UMB), was proposed in [5] and further extended in [6]. UMB suppresses the broadcast redundancy by means of a black-burst contention approach [7], followed by a ready-to-send/clear-to-send (RTS/CTS)-like mechanism. According to this protocol, a node can broadcast a packet only after having secured channel control. A different approach is adopted by another IEEE 802.11-based protocol, denoted as smart broadcast (SB) [8]. Similarly to UMB, SB partitions the transmission range of the source, associating non-overlapping contention windows to different regions. The binary partition assisted protocol (BPAB) [9] uses concepts from both UMB and SB, thus presenting similar performance, with an improvement, with respect to the SB protocol, in VANETs with low vehicle spatial density and irregular topologies. Finally, a different approach is considered when analyzing the class of probabilistic broadcast protocols, designed around the idea that each node forwards a received packet according to a characteristic probability assignment function (PAF), computed by each node in a distributed manner [10, 11]. An entire class of probabilistic broadcast protocols is proposed and analyzed in [12].

In one-dimensional networks, as those considered in this work, knowledge of inter-node distances is necessary to implement the MCDS solution. For this reason, most of the proposed multihop broadcast protocols assume, at least to some extent, this knowledge. Therefore, the first step for deriving an analytical model consists in statistically characterizing the spatial distribution of the vehicles. In the literature, the node positions are frequently generated with a poisson point process (PPP), that allows to accurately model the real characteristics of the road topology. Despite its apparent simplicity, the derivation of an analytical performance evaluation framework based on the assumption of Poisson spatial distribution of the vehicles is not straightforward.

This work is motivated by the need of having a low complexity theoretical framework, useful for characterizing the main performance metrics of a family of probabilistic multihop broadcast protocols with applications to VANET scenarios. First, we show that the average positions of a given number of points of a PPP falling in a segment with finite length are equally spaced. Then, assuming a silencing mechanism at each hop, we derive a recursive (hop-wise) theoretical performance evaluation framework which exploits the assumption of fixed and equally spaced vehicles positions in each retransmission hop. In particular, this performance analysis is likely to be representative of the average (with respect to the nodes' spatial distribution) performance of the broadcast protocols at hand, as will be confirmed by ns-2 simulations. Moreover, the proposed analytical model applies also to other vehicle spatial distributions, provided that the average inter-vehicle distance is fixed. The impact of node mobility will also be evaluated. Although we consider two novel illustrative broadcast protocols, we underline that our approach is general.

This article is structured as follows. In Section 2, multihop broadcast protocols for linear networks are introduced. Section 3 is devoted to the derivation of the average distribution of a given number of points of a PPP in a segment with finite length. In Section 4, a succinct overview of the IEEE 802.11b standard is provided. In Section 5, the family of probabilistic broadcast protocol with silencing is accurately described. In Section 6, an analytical framework for performance evaluation of the probabilistic broadcast protocols of interest, is presented. In Section 7, after the validation of the analytical framework by means of numerical simulation, the performance of the novel probabilistic broadcast protocols is investigated and compared with that of other (known) protocols. Finally, Section 8 concludes the article.

2 Multihop broadcast protocols

2.1 Reference scenario

Figure 1 shows the linear network topology of reference for a generic multihop broadcast protocol: a static one-dimensional wireless network with a source and N (receiving) nodes. The assumption of static nodes is not restricting. In fact, from the perspective of a single transmitted packet, because of the very short transmission time (with typical IEEE 802.11 transmission rates), the network appears as static [13]. At the same time, a one-dimensional network is suitable for analyzing highway-like VANETs, where the width of the road (lying in the interval [10-40 m]) is significantly smaller than the transmission range of an IEEE 802.11 network interface. These motivations will be justified by simulation results in Section 7.

Figure 1
figure 1

A typical linear network topology of a VANET.

We consider a deterministic free-space propagation model (i.e., without fading) and a fixed transmit power: therefore, each vehicle has a fixed transmission range, denoted as z (dimension: [m]). The network size (the line length) is set to L (dimension: [m]). For generality, we denote as normalized network size the positive real number norm L/z. Generally, ℓnorm > 1 and this motivates the need for multihop communication protocols.

On the basis of empirical traffic data [14], the nodes' positions are generated according to a PPP of parameter ρs, where ρs is the vehicle (linear) spatial density (dimension: [veh/m])--the symbol "veh" it is not a realistic unit of measure, but it will be used for the sake of clarity. Consequently, N is a random variable characterized by a one-dimensional Poisson distribution with parameter ρsL. Similarly, the random variable N z , denoting the number of nodes lying in the transmission range of the source (e.g., within the interval (0, z)), has a Poisson distribution with parameter ρsz. Thanks to the properties of the Poisson distribution, the inter-vehicle distance is exponentially distributed with parameter ρs and the (constant) average distance between two consecutive vehicles is 1/ρs.

As shown in Figure 1, the source node, denoted as node 0, is placed at the west end of the network, and we assume a single propagation direction (eastbound). Each of the remaining N nodes is uniquely identified by an index i {1, 2,..., N}. The distance between the i-th and j-th nodes (i, j {1, 2,..., N}, ij) is denoted as d i,j . Each vehicle can exactly estimate the value of d i,j , thanks to the following assumptions: (i) the position of the source is a-priori known by every node; (ii) each vehicle knows its own position under the assumption of the presence (on board) of a global positioning system (GPS) receiver; (iii) each rebroadcaster inserts its own geographical coordinates within the packet.

In the (one-dimensional and with a single propagation direction) scenario described in Figure 1, the operational principle of a multihop broadcast protocol is quite simple. The initial transmission of a new packet from the source is denoted as the 0-th hop transmission, while the source itself identifies the so-called 0-th transmission domain (TD). After the source transmission, the packet is then received by the N z source's neighbors, that are the potential rebroadcasters at the 1-st hop. Hence, their ensemble constitutes the 1-st TD. Each vehicle in the 1-st TD decides to forward the packet according to a PAF specified by the broadcast protocol. The use of silencing corresponds to the fact that the "fastest" retransmitter (among the set of those which have decided to retransmit) silences the others. Note that a collision may happen if at least two nodes of a TD retransmit simultaneously. The propagation process is therefore constituted by multiple packet retransmissions, that continue at most till the east end of the network--as will be clear in the following, with a probabilistic broadcasting protocol the retransmission process might terminate before reaching the end of the network.

2.2 Performance metrics of interest

In this work, the performance of probabilistic multihop broadcast protocols will be investigated using the following average metrics: (i) the REachability (RE), (ii) the transmission efficiency (TE), and (iii) the end-to-end delay (D). The RE (adimensional), originally introduced in [1], is the fraction of nodes that receive the source packet among the set of all reachable nodes. The cardinality of the set of the reachable nodes is denoted as nreach, and can be expressed as nreach = min(N, n), where n is the minimum index such as the condition d n *, n* + 1 > z is verified. This definition is necessary since in PPP scenarios, as those considered in this work, there can exist a pair of disconnected consecutive nodes (n,n + 1). The TE (adimensional) is defined as the ratio between the RE of a packet and the overall number of rebroadcast acts experienced during its transmission to the last reachable node. Finally, D (dim: [ms]) is defined as the duration of the packet trip between the source and the last reachable node. We remark that only the packets received correctly at the nreach-th node of the network are considered for the evaluation of D. Therefore, this definition of D corresponds to a worst case scenario.

Owing to the symmetry of the forwarding process, the entire network can be modeled on the basis of the (local) analysis of a single TD. Therefore, in Section 3 we focus on a single TD--the reasons behind this assumption will be better clarified in Section 5.

3 Average distribution of poisson points in a segment with finite length

We now present a constructive definition of a PPP with parameter ρs +, directly inspired from the one presented in [15, Ch. 3]. Given a finite interval (-T/2,T/2) , place n points in (-T/2,T/2), under the constraint that n/T = ρs. A PPP is obtained by letting n → ∞ and T → ∞, under the constraint that n/T remains equal to ρs. A PPP has the following properties: (i) the distance between two consecutive points is a random variable with an exponential distribution with parameter ρs; (ii) given z +, the number of points falling in the finite interval I ( 0 , z ) is a random variable with a Poisson distribution with parameter ρsz. In Figure 2, an illustrative realization of a PPP with parameter ρs is shown. With reference to Figure 2, denoting by n the number of Poisson points falling in I it is possible to define the n-dimensional positions vector

Figure 2
figure 2

Illustrative realization of a PPP (the points corresponds to X).

R ( n ) = [ R 1 R 2 . . . R n ]
(1)

where R i (i {1, 2,..., n}) is the distance of the i-th point from the source (placed in zero)--in the illustrative case in Figure 2, n = 2.

In Appendix 1, it is shown that the marginal probability density function (PDF) of R j is the following:

f R j ( n ) ( r ) = n ! z n ( z - r ) n - j r j - 1 ( n - j ) ! ( j - 1 ) ! r ( 0 , z ) j = 1 , . . . , n 0 otherwise .
(2)

In Figure 3, the PDFs of the positions of consecutive nodes are shown for various values of n: (a) 1, (b) 2, and (c) 4. In Appendix 1, it is also shown that the average position of the j-th node can be expressed as follows:

Figure 3
figure 3

The marginal distributions of the positions of n nodes for various values of n. The marginal distributions ( { f R i ( n ) ( r ) } i = 1 n ) of the positions of n nodes generated with a PPP in a interval of length equal to z. The distributions are shown for different values of n: (a) n = 1, (b) n = 2, and (c) n = 4. The average nodes' positions are also shown.

R ¯ j ( n ) = 0 z r n ! z n ( z - r ) n - j r j - 1 ( n - j ) ! ( j - 1 ) ! d r j = j z n + 1 j = 1 , . . . , n .
(3)

From Equation (3), it emerges clearly that, for a given number of nodes falling in a finite segment I, their average positions are equally spaced. The average nodes' positions, for various values of the number n of nodes in I, are also shown in Figure 3.

Thanks to these results, the average performance analysis of a broadcast protocol in a network with Poisson node distribution can be carried out by simply studying a deterministic scenario, where the nodes are placed in correspondence to the average positions of the corresponding Poisson-based scenario. Moreover, this average analysis applies to other vehicle spatial distributions (e.g., taking into account the constraint on the vehicle lengths) with equally spaced average positions.

4 A quick overview of the IEEE 802.11b standard

In this work, we assume that the physical and the medium access control (MAC) layers of every node adhere to the IEEE 802.11b standard [16]. In this section, we first recall the basic features of this standard. Due to the broadcast nature of the communications, the contention channel is managed through the basic access (BA) mechanism, the operational principle of which can be briefly described as follows. When a node has a frame ready to be transmitted, it checks if the channel remains idle for a period of time at least longer than a distributed interframe space (DIFS): if this is the case, the node is free to immediately transmit. On the opposite, if the wireless medium is busy, the node defers its transmission until the medium remains idle for a whole DIFS without interruption. In the latter case, once the DIFS has elapsed, the node generates a random backoff period, which corresponds to an additional waiting time before transmitting (pre-backoff). The node transmits when the backoff time has elapsed. At each transmission act, the backoff time is uniformly chosen in the range [0, cw - 1], where cw is the current backoff window size, that is constant and equal to the minimum value defined by the standard, denoted as CWmin, and corresponding to 32. The backoff period is slotted and the duration of the backoff, expressed in terms of number of backoff slots, is denoted as backoff counter (BC). This number is decremented as long as the medium is sensed idle, and it is frozen when a transmission is detected on the channel (this is an instance of a collision avoidance mechanism). Decrementing restarts when the medium is sensed idle again for more than a DIFS. At the end of every packet transmission, the node is forced to enter a post-backoff phase that coincides with the subsequent pre-backoff if the node has another packet in the transmission queue.

It is important to observe that when a relay finds the channel idle, it can immediately transmit, but this is not mandatory. In order to reduce the number of collisions within a TD, we have interpreted the standard in a non-persistent manner, imposing that every relay enters into the pre-backoff phase, regardless of the channel status. We also remark that the extension of our approach to scenarios with IEEE 802.11p [17] communications, as envisioned in VANETs, is straightforward. Our approach (based on the IEEE 802.11b standard) is meaningful under the assumption of smartphone-based vehicular communications [18, 19].

5 Probabilistic broadcast protocols with silencing

5.1 Preliminaries considerations

The general goal of a multihop broadcast protocol is to attain the widest network coverage in the shortest possible time. This can be obtained by pursuing three intermediate goals: (i) minimizing the number of communication hops; (ii) minimizing the number of effective retransmissions in every hop; (iii) minimizing the latency associated with a single hop. The number of transmission hops can be minimized by designating, as relays, the nodes forming the MCDS. However, the number of retransmissions and the latency are directly affected by the protocol characteristics, and there is no general rule for minimizing them--this motivates the presence, in the literature, of a large number of heuristic broadcast protocols.

A probabilistic broadcast protocol tries to achieve the goals outlined in the previous paragraph in a probabilistic and completely distributed manner: (i) probabilistic, in the sense that every intermediate node decides to retransmit a packet according to a certain PAF, computed on a per-packet manner--even if, in general, one could introduce a per-flow PAF, in this work we focus on single packet transmissions; (ii) distributed, in the sense that every node autonomously makes a retransmission decision without any coordination with its neighbors.

In "classical" probabilistic broadcast protocols (without silencing), without adopting suitable counter-measures it is possible that more than one node in a TD decides to rebroadcast the packet (even without collisions). This leads to inefficiencies--besides complicating the mathematical analysis. A more efficient probabilistic broadcast protocol, regardless of the expression of the PAF, is obtained in the presence of a single retransmitting node in every TD. This can be obtained by imposing that the reception of a packet sent by a node of a TD silences the preceding nodes of the same TD. As a consequence, the next TD starts from the node which follows the "silencer." Note that the last TD partially overlaps with the previous one if the "silencer" is not a member of the MCDS.

In this work, we consider two novel probabilistic broadcast protocols with silencing, whose operations can be described as follows, with respect to the first TD.

  1. (1)

    The source sends a new packet (directly mapped on a IEEE 802.11 frame).

  2. (2)

    The nodes within a distance z from the source receive the packet and form the 1-st TD. Their number is denoted as N z .

  3. (3)

    Every node in the 1-st TD probabilistically decides, according to the given PAF and taking into account its distance from the source, to retransmit (or not) the packet.

  4. (4)

    The potential forwarders (i.e., the nodes of the 1-st TD which have decided to retransmit) compete for channel access, by using the BA mechanism of the IEEE 802.11b standard (described in Section 4), first entering in the pre-backoff phase and, then, generating a random waiting time (denoted, in Section 4, as BC). For the purpose of analytical simplicity, we assume that the BCs of the losing contenders are set to ∞.

  5. (5)

    The BCs are continuously decreased by all nodes, until (in the case of a successful forwarding) only one of them reaches 0, say the k-th BC. During a transmission of a node the other BCs freeze. Should there be the BCs of at least two nodes which reach simultaneously zero, both nodes would transmit and, thus, collide. We assume that the packets involved in a collision are considered undetectable and ignored by the other nodes. The corresponding k-th node retransmits the packet.

  6. (6)

    The remaining N z -1 nodes decode the packets, reset their timers, and discard the potentially queued packet. The nodes (spatially) preceding the k-th node will refrain from retransmitting from then on.

  7. (7)

    The whole process (from Step 1) is restarted at the 2-nd TD, for which the k-th node acts as the source. The 2-nd TD is composed by all nodes lying in the interval (d 0,k, d 0,k+ z) , and it can also include some former nodes of the 1-st TD (those following the k-th node).

The two novel probabilistic broadcast protocols, polynomial and SIF, are described in the following two subsections.

5.2 Polynomial broadcast protocol

This protocol is characterized by a polynomial PAF, with the following form:

p ( d , z , g ) d z g
(4)

where: d denotes the distance (dimension: [m]) between the node of interest and the previous relay (or source, in the case of the first TD); z is the already introduced transmission range; g is the polynomial order. According to the assumptions in Section 2, both z and d are assumed to be known without the need of exchanging additional messages. In fact, z can be estimated by knowing the transmit power and the channel propagation model, while d can be estimated by simply inserting the position of the source vehicle in every transmitted packet (under the assumption of having an accurate GPS receiver).

The shape of p, as a function of d, is shown in Figure 4, for different values of g. It can be observed that the function p is monotonic and concave for all values of g. For high values of g, it becomes quite "selective," since it is approximately zero everywhere, but in the proximity of z. Note that the case with g = 0 (p = 1, d) corresponds to the flooding protocol, i.e., each node retransmits. In this case, the BC value is randomly selected in {0, 1,..., cw - 1} as mandated by the IEEE 802.11 standard (Section 4).

Figure 4
figure 4

Probability of retransmission (denoted as p ) of the polynomial probabilistic protocol as a function of the distance d for several values of g.

5.3 Silencing irresponsible forwarding

This broadcast protocol directly derives from the irresponsible forwarding (IF) protocol, originally presented in [20], with the introduction of the silencing mechanism with the introduction of the silencing mechanism outlined in Section 5.2. Besides this difference, IF and SIF share the same following PAF:

p ( d , z , g ) exp - ρ s ( d - z ) c
(5)

where c is an adimensional shaping coefficient and ρs is the vehicle spatial density. The latter can be estimated in a straightforward manner. In fact, under the assumption of knowing with a sufficient accuracy its transmission range, a node can estimate its local vehicular spatial density by simply counting the number of nodes lying within its transmission range and dividing them by the transmission range. The design of an efficient method for accurate estimation of the vehicular spatial density goes beyond the scope of this manuscript. However, intuitively it is sufficient to periodically send (and receive) Hello messages to the surrounding nodes. Alternatively, it is possible to rely on already existing beaconing mechanisms, such as the exchange of cooperative awareness messages (CAMs) foreseen by the European car-to-car consortium (broadcasted by default every 500 ms) [21].

Similarly to the PAF of the polynomial broadcast protocol, also the PAF of SIF "rewards" the farthest nodes (with respect to the transmitter). However, unlike the polynomial PAF, the PAF of SIF also takes into accounts the (linear) vehicular spatial density, thus allowing to better adapt to different traffic conditions-- this is the very idea of IF. The shape of p, as a function of d, is shown in Figure 5, for different values of c and ρs. It can be observed that the PAF of SIF is monotonically increasing and concave for all values of c. Moreover, it becomes selective far small values of c (e.g., 1), while it tends to flatten for high values of c and for low values of ρs. Also in this case, the BC value is randomly selected in {0, 1,..., cw - 1} as mandated by the IEEE 802.11 standard (Section 4).

Figure 5
figure 5

Probability of retransmission (denoted as p ) of the SIF protocol as a function of the distance d for several values of c and ρ s z.

6 A recursive analytical performance evaluation framework

In Section 2, it has been stated that, since all TDs are statistically identical, the global behavior of the network can be modeled by analyzing a single TD. By exploiting the properties of probabilistic broadcast protocols with silencing (described in Section 5), the following assumptions hold: (i) the inter-node distance is characterized by a (memoryless) exponential distribution, so that the topology of every TD is (statistically) identical; (ii) the PAF only depends on the distance and is, therefore, memoryless; (iii) the IEEE 802.11b contention mechanism is memoryless, in the sense that it is restarted at every retransmission. Under these assumptions, every retransmission act can be interpreted as a renewal that resets the statistics of the forwarding process. Moreover, since all TDs are statistically identical, without loss of generality we can focus on the first TD.

Therefore, a complete analytical performance evaluation framework can be derived in the following manner: (i) characterizing the first TD with local performance metrics (e.g., the successful transmission probability and the delay); (ii) deriving global performance metrics (e.g., D, RE, TE), by means of a recursive approach.

In Section 6.1, the local performance (i.e., single TD) is investigated under the assumption of a given number of equally spaced nodes, by considering, without loss of generality, the first TD. In Section 6.2, we derive the global metrics for an overall deterministic network scenario, where the nodes are equally spaced in the interval (0, L). Then, in Section 6.3 the results obtained in the deterministic scenario are extended to the original PPP-based scenario.

6.1 Local (single TD) performance analysis with a given number of nodes

Without loss of generality, we focus on the first TD, corresponding to the interval I introduced in Section 3. We consider a deterministic scenario with a fixed number n of nodes equally spaced in the interval I= ( 0 , z ) . Every node in a TD is identified by an index i {1, 2, ..., n}. The nodes are thus positioned as in Figure 3 and the positions vector R(n)is defined as in (1).

According to the operational principles of the considered protocol, after the reception of a packet in a given TD, each node decides to (or not to) retransmit according to the protocol's PAF. The nodes that lose the contention set their BCs to ∞, while the winners set their BCs according to the policy of the specific broadcast protocol. The protocol execution could lead to three different outcomes: (i) nobody decides to retransmit; (ii) some nodes decide to retransmit, but all their transmitted packets collide; (iii) some nodes decide to retransmit, and a single node transmits successfully (when its BC because zero, no other BC is zero). It is useful to define the following events, associated to the forwarding process in a TD:

1 { nobody decides to retransmit} = {BC i = , i { 0 , 1 , ... , n } } 2 { all the transmitted packets collide} = { i { 0 , 1 , ... , n } : BC i < , j { 0 , 1 , ... , n } , j i , BC j < such as BC i = BC j } { nobody wins the contention}= 1 2 S i { the node  i  successfully retransmits } i { 1 , ... , n } = { BC i < , BC i = min ( { BC m } m = 1 n ) { if j { 1 , ... , n } , i j : BC j < BC i , then m { 1 , ... , n } , m j , m i : BC j = BC m } i { 1 , ... , n } S { a node successfully retransmits}= i = 1 n S i

The probabilities of the above defined events are the following:

p rtx ( n ) ( i ) P { S i } i = 1 , 2 , . . . , n p succ ( n ) P { S } = i = 1 n p rtx ( n ) ( i ) p fail ( n ) 1 - P { S } = 1 - i = 1 n p rtx ( n ) ( i ) .

Let us now introduce the random variable Y {0, 1, 2, ... , n} with the following PMF:

P Y ( y ) = P { Y = y } = p fail ( n ) y = 0 p rtx ( n ) ( y ) y { 1 , 2 , . . . , n } .

Since the event {Y = 0} identifies the failure event, the random variable Y indicates either which node has effectively retransmitted or a failure. Moreover, it can be observed that:

y = 1 n { Y = y } = F S .

Obviously,

P Y ( y | S ) = P Y ( Y = y | S ) = 0 y = 0 p rtx ( n ) ( x ) t = 1 n p rtx ( n ) ( i ) y { 1 , 2 , . . . , n } .

In other words, if there is a retransmission (S), then P Y ( y | S ) ( y { 0 , 1 , 2 , . . . , n } ) is the probability that the y-th node has retransmitted.

As shown in Appendix 2, the transmission probabilities { p rtx ( n ) ( i ) } can be expressed as follows:

p rtx ( n ) ( i ) = p i m = 1 n q ( m ) p V i ( n ) ( m - 1 )
(6)

where: p i denotes the value of the PAF (4) for the i-th node and depends on the considered protocol; q(m)is the probability that the i-th node wins the contention among a set of m competing nodes (the same for a given value of n); V i ( n ) { 0 , . . . , n - 1 } is the following discrete random variable:

V i ( n ) { number of nodes , among the  n  nodes, competing with the  i - th node } .

The derivation of q(m)and of the PMF of V i ( n ) can also be found in Appendix 2.

After deriving p rtx ( n ) ( i ) , it is possible to compute the per-hop delay, denoted as D i , of a retransmission from the i-th node. Since the per-hop delay is meaningful only if the i-th node decides to retransmit, it is of interest to study the statistical distribution of D i conditioned on S i . For this reason, we introduce the random variable Di|i, which can be defined as follows:

D i | i T slot ( D I F S + N i | i bo ) + T tx i = 1 , . . . , n

where: Ttx (dimension: [s]) is the transmission time; Tslot (dimension: [s/slot]) is the deterministic duration of the backoff slot; DIFS (dimension: [slot]) is the duration of the DIFS; and N i | i bo (dimension: [slots]) is the number of slots spent by the i-th node during the backoff (conditionally on the event S i ). We assume that both the packet size, defined as P (dimension: [bits]), and the transmission rate, denoted as R (dimension: [bits/s]), are constant, thus leading to a deterministic packet transmission time Ttx = P/R. Taking into account that DIFS, Tslot, and Ttx are deterministic, the average value of Di|ibecomes:

D ¯ i | i = T slot ( D I F S + N ¯ i | i bo ) + T tx i = 1 , . . . , n
(7)

where, according to the derivation in Appendix 3,

N ¯ i | i b o = p i c w p rtx ( N ) ( i ) v = 0 N - 1 p V i ( N ) ( v ) k = 1 c w - 1 k j = 0 J k , v P v ( k , j ) + T tx j = 1 J k , v j P v ( k , j )
(8)

where J k , v min ( k , ( v / 2 ) ) denotes the maximum number of collisions that can happen in slots 0, 1, ..., k-1, while the matrix P v = { P v ( k , j ) } is defined in Appendix 3.

Proceeding in a similar manner, it is also possible to obtain the average number of retransmissions per-hop of the node i, denoted as N ¯ rtx hop ( i ) :

N ¯ rtx hop ( i ) = p i c w p rtx ( N ) ( i ) 1 + v = 0 N - 1 p V i ( N ) ( v ) k = 1 c w - 1 h = 2 v h N k , v ( 0 , h ) j = 0 J k , v M k , v ( j , h )
(9)

where the matrices M k,v = M k,v (j, h) and N k,v = N k,v (j, h) are defined in Appendix 3.

6.2 Global performance analysis with fixed number of nodes

Once the per-TD performance has been analyzed (as described in Section 6.1), the global performance metrics introduced in Section 2.2 (namely, RE, TE, and D) can be computed by following a recursive approach, based on the inductive principle. This recursive approach is extensively described, for the evaluation of D, in Appendix 4, but can be directly re-adapted for the evaluation of RE and TE. In the remainder of this subsection, we outline the final results, trying to provide the reader with the intuition behind them.

Recall that we consider a deterministic scenario with a fixed number N of nodes equally spaced in the interval (0, L) , where L = znorm. For simplicity, we assume that a generic TD contains n = N/ℓnorm nodes. This corresponds to a best-case scenario, where the farthest node of each TD is the domain forwarder (the "silencer," as denoted in Section 5).

Delay The computation of the average D is carried out taking into account only the packets successfully arriving at the end of the network (i.e., at the last reachable node) and ignoring the (remaining) packets which stop earlier. On the basis of the approach described in detail in Appendix 4, the average end-to-end delay can be given the following recursive formulation:

D D ¯ ( N ) = T ¯ src tx + i = 1 n D ¯ ( N - i ) + D ¯ i | i p Y ( i | S )
(10)

where D ¯ ( N - i ) is the average delay in a network with N - i nodes and T ¯ src tx is the average transmission time of the source, which differs from those of the following nodes, since the source does not contend with any other node and its transmission is not affected by collisions. Since the average time spent in the backoff is T ¯ src tx can be expressed as

T ¯ src tx T tx + T slot D I F S + c w - 1 2 .
(11)

RE The average RE can be defined as follows:

RE N reach ¯ N
(12)

where Nreach is a random variable denoting the number of nodes reached by a packet. As a consequence of our assumptions, Nreach is lower bounded by n, since the transmission from the source reaches n nodes (those of the first TD) with probability 1. The average value N ¯ reach can be obtained by following the approach described in Appendix 4, but for the replacement of p Y ( i | S ) with pY(i) and of D ¯ i | i with the number of additional nodes covered by a new transmission. For example: a transmission from the 1-st node of the first TD will reach only one additional node (namely, the (n + 1)-th); a transmission from the 3-rd node will reach three additional nodes (namely, the (n + 1)-th, (n + 2)-th, and (n + 3)-th); and so on. Please note that, unlike the delay, in the computation of the RE we are not conditioning on the fact of reaching the N-th node of the network, i.e., the last reachable node of the network. Therefore, also the packets which stop being retransmitted are taken into account.

After the execution of the recursive approach outlined in Appendix 4, it is sufficient to add a constant equal to n, corresponding to the number of nodes directly reached by the source at the first hop. The final expression of N ¯ reach becomes (using the notation of Appendix 4):

N ¯ reach = N ¯ reach ( N ) = n + i = 1 n N ¯ reach ( N - i ) + i p Y ( i ) = n + i = 1 n N ¯ reach ( N - i ) + i p rtx ( n ) ( i )
(13)

where N ¯ reach ( N - i ) corresponds to the average number of nodes reached in a network with N - i nodes and can be recursively computed in the same way.

TE In order to reduce the computational burden, we adopt the following approximated formulation of TE:

TE RE N rtx
(14)

where N ¯ rtx denotes the average overall number of retransmissions over all hops. From a computation viewpoint N ¯ rtx is approximated by N ¯ rtx m ( * ) , where m* corresponds to the average number of reached nodes-it is a sort of approximated indicator of the "depth" of the propagation process. Since the RE can be interpreted as the ratio between the average number of reached nodes and the total number (N) of nodes, m* can be approximated as follows:

m * N RE .

At this point, N ¯ rtx m ( * ) can be computed by applying the recursive approach presented in Appendix 4, by replacing (i) p Y ( i | S ) with p Y (i) and (ii) D ¯ i | i with the average number of transmissions per hop, denoted by N ¯ rtx hop and given in (9).

6.3 Generalization to a PPP-based scenario

According to the original PPP-based model, described in Section 2, the number of nodes within I, denoted as N z , has the following Poisson distribution:

p N z ( n , ρ s z ) = e ρ s z ( ρ s z ) n n ! n { 0 , 1 , 2 , ... } .

However, since a real vehicle has a finite length, it is not possible to have an infinite number of vehicles within I. Therefore, it makes sense to impose an arbitrary limit to the maximum number of nodes within I, denoted as N c . The new truncated Poisson random variable, denoted as N z , has the following distribution:

p N z ( n , ρ s z ) = e - ρ s z ( ρ s z ) n n ! i = 1 N c e - ρ s z ( ρ s z ) i i ! n { 1 , 2 , . . . , N c }

where we have also removed the event n = 0--this would correspond to an empty TD.

In order to exploit the results of Section 6.1, the stochastic network topology of the PPP needs to be mapped into a deterministic one with equally spaced nodes. In order to do this, the interval I is partitioned in Nint sub-intervals of length z/Nint, where Nint {N c , N c + 1, N c + 2,...} is a design parameter. The computational burden and the accuracy are directly related to the value of Nint. After some numerical tests, we observed that the value Nint = 100 is a good tradeoff between precision and computational time. The i-th sub-interval thus is:

I i = ( i - i ) z N int , i z N int i = 1 , 2 , . . . , N int .

Every sub-interval can contain at most one node: in general, we assume that in each sub-interval there is a "virtual" node. Consequently, it is possible to associate a transmission probability p rtx eq ( i ) to the generic sub-interval I i , defined as p rtx eq ( i ) , and a corresponding per-node delay, denoted as D(i)eq (i = 1,..., Nint).

We define as p rtx ( n ) ( j ) the probability of retransmission of the j-th node, given that there are exactly n nodes in the interval I. Using the total probability theorem, p rtx eq ( i ) can be expressed as follows:

p rtx eq ( i ) = n = 1 N c ( p rtx eq ( i ) | N z = n ) P ( N z = n ) = n = 1 N c j = 1 n p rtx ( n ) ( j ) f ( i , j , n ) p N z ( n , ρ s z ) i { 1 , . . . , N int }
(15)

where f(i,j,n) is an indicator function defined as follows:

f ( i , j , n ) 1 R ¯ j ( n ) I i 0 R ¯ j ( n ) I i .
(16)

The probability p rtx eq ( i ) is now a function of p rtx ( n ) ( i ) (n {1, 2,..., N c }, i {1, 2,..., n}), which can be computed with combinatorics, since it is associated with a deterministic scenario with n static nodes equally spaced in [0, z].

At this point, by using (6) in Equation (15), it is possible to obtain a closed-form expression for p rtx eq ( i ) . Leveraging on the knowledge of p rtx eq ( i ) , by using Equations (15) into (7) and (9), it is possible to obtain, respectively, D(i)eq (i = 1,...,Nint) and n rtx ho p eq . Then, it is possible to use the framework presented in Section 6.2 to derive RE, TE, and D for a deterministic network composed by Ncnorm nodes, since N c is the (imposed) number of nodes in the interval I (and, thus, in each TD).

As anticipated at the end of Section 1, we remark that the presented analytical framework can be employed to study other types of broadcast protocols, not necessarily probabilistic, by simply re-adapting the definition of p rtx ( n ) ( i ) and Di|i. This is the subject of our current research activities.

7 Theoretical performance analysis and simulation-based validation

7.1 Polynomial protocol

In this section, we compare the results obtained with the analytical framework presented in Section 6 with results obtained through numerical simulations carried out with the ns-2.34 simulator [22]. In particular, the polynomial protocol has been "inserted" on top of the IEEE 802.11b model, after fixing the bugs reported in [23]. We observe that, conditionally on the fact of suitably scaling the packet size and the packet generation rate, from the perspective of our framework the IEEE 802.11a/p standards will offer the same performance of the IEEE 802.11b standard. All the results presented are accurate within ±5% of the values shown with 95% confidence. The relevant parameters of the simulation are listed in Table 1. The results are obtained for a fixed node spatial density ρs = 0.1 veh/m, while the possible values of the transmission range z are listed in Table 1. In particular, the values of z are selected so that the corresponding values of ρsz are between 10 and 40veh. In the numerical simulations, we do not consider any case with ρsz < 10 veh, since this corresponds to topologies that are disconnected with a high probability, as shown in [10]. In Figure 6, (a) D, (b) RE, and (c) TE are shown as functions of ρ s z, for different values of g, by taking into account both the results of the analytical framework and of the numerical simulations, thus allowing to assess the validity of the analytical model. As shown in [10], using the considered values of ρ s z (between 10 and 40 veh), the network is fully connected (i.e., nreach = N) with a high probability. From Figure 6b it emerges that, in terms of RE, there is an excellent match between the results of the theoretical framework and those of the simulator. As shown by Figure 6c, the agreement between analysis and simulations is still good also in terms of TE. On the other hand, the delay predicted by the analytical framework overestimates the true delay for small values of g (e.g., g = 0), whereas it becomes very accurate for large values of g (e.g., g = 7). The comparative investigation of analytical and simulation results indicates the validity of the proposed framework (especially for large values of g).

Table 1 Main IEEE 802.11b network simulation parameters
Figure 6
figure 6

Simulation and analytical performance results of the polynomial protocol. (a) D, (b) RE, and (c) TE, as a function of ρ s z, obtained using the polynomial protocol and different values of g. The values CW = 31, lnorm = 8, P = 1000 bytes, and R = 1 Mbps are considered. Both simulation (Sim) and analytical results (Ana) are shown.

According to the results in Figure 6a,c, it emerges that a higher polynomial degree leads to a better performance, regardless of the value of ρsz, in terms of both D and TE. Conversely, since the PAF is highly selective for large values of g (as shown in Figure 4), this leads to poor performance in terms of RE, as shown in Figure 6b. By considering small values of g (e.g., g = 0 corresponds to flooding), one observes the opposite phenomenon: a drastic improvement in terms of RE, at the price of a slightly higher D and a smaller TE.

In order to better understand the impact of g and ρsz on the protocol performance: in Figure 7a, D is shown, parametrized with respect to g, as a function of RE for different values of ρsz; while in Figure 7b D is shown, parametrized with respect to ρsz, as a function of RE for different values of g. From the results in Figure 7a, it emerges that even little variations of g lead to radically different protocol behaviors. On the contrary, ρsz has an impact on the performance only for small values of ρsz, while for increasing values of ρsz (e.g., larger than 20 veh) its impact vanishes.

Figure 7
figure 7

Analytical performance results of the polynomial protocol. D as a function of RE, parametrized with respect to (a) ρsz (for various values of g) and (b) g (for various values of ρ s z). The results are obtained by considering CW = 31, lnorm = 8, P = 1000 bytes, and R = 1 Mbps.

From the results in Figures 6 and 7, it emerges clearly that there is no optimal value of g. However, the proposed framework allows to optimize a single performance metric, after having imposed some constraints on the other metrics, on the basis of proper quality of service criteria. A possible choice consists in ignoring TE and minimizing D under the constraint of attaining a target value of RE. Since D is a decreasing function of g, it is possible to define the following quasi-optimal g*:

g * ( ρ s z ) = { max ( g ) | R E ( ρ s z ) > 0 . 95 } .

Selecting g = g* allows to achieve the minimum delay under a constraint on the RE. The obtained g* is shown, as a function of ρsz, in Figure 8a, and the following considerations can be drawn: (i) g* is an increasing monotonic function of ρsz; (ii) with the exception of the region in proximity to ρsz = 0, where g* tends to 0, g* has a quasi-linear dependence with respect to ρsz. It can be shown that if RE 1 for each value of ρsz. Note that the selection of g* allows to maximize RE. However, as shown in Figure 8, D is always higher than 0.08s, a delay which is instead guaranteed by the use of g = 7, as shown in the same figure.

Figure 8
figure 8

Optimal g values for the polynomial protocol. (a) g * and (b) D, as a function of ρ s z.

7.2 Silencing irresponsible forwarding

As pointed out in Section 6, the proposed framework can be applied to a large family of broadcast protocols. In this section, the framework is applied to SIF. In particular, the validity of the proposed analytical framework is clearly shown in Figure 9, where (a) D, (b) RE, and (c) TE are shown, as functions of ρ s z, for different values of c, by directly comparing both analytical and simulation results. As with the polynomial broadcast protocol, in this case as well there is a good agreement between the results obtained with the analytical model and the simulations. In particular, it can be observed that the accuracy of the model depends on the value of the shape parameter c (the highest average accuracy, over all metrics, is observed with c = 7). By comparing Figures 6 and 9, one can observe that polynomial and SIF protocols have a different dependence on ρ s z. In particular, in the case of SIF, as the product ρ s z increases RE remains roughly the same, while D decreases and TE increases. In other words, SIF performs better in dense networks. On the other hand, in the case of the polynomial protocol (Figure 6), D and TE have an opposite behavior (namely, D slightly increases and TE slightly decreases for increasing values of ρ s z), and RE strongly depends on ρ s z, especially in sparse networks. In general, SIF outperforms the polynomial broadcast protocol.

Figure 9
figure 9

Analytical performance results of the SIF protocol. D as a function of RE, parametrized with respect to ρsz (for various values of c) (a) and c (for various values of ρsz) (b). The results are obtained by using the SIF protocol and considering cw = 31, lnorm = 8, P = 1000 bytes, and R = 1 Mbps.

Furthermore, from Figure 9 it is clear that also for SIF there is no optimal value of the parameter c which simultaneously optimizes the performance according to all considered metrics. This fact can be better understood from Figure 10, where D is shown as a function of RE, parametrized, respectively, with respect to (a) ρ s z and (b) c. In particular, from Figure 10b it emerges that if one wants to guarantee a minimum value of RE (say 0.95), it is necessary to use a sufficiently high value of c. This, in turns, does not minimize D, which, as shown in Figure 10b, is directly proportional to c. Moreover, the results in Figure 10a strengthen the observations carried out regarding the results in Figure 9. In fact, they clearly evidence two important characteristics of SIF: (i) RE is not affected by the value of ρ s z, as SIF automatically adapts; (ii) counterintuitively D is a decreasing function of ρ s z (e.g., SIF performs better in dense networks).

Figure 10
figure 10

Simulation and analytical performance results of the SIF protocol. (a) D, (b) RE, and (c) TE, as a function of ρ s z, obtained using the SIF protocol and different values of c. The values CW = 31, lnorm = 8, P = 1000 bytes, and R = 1 Mbps are considered. Both simulation (Sim) and analytical results (Ana) are shown.

7.3 Comparison with benchmark protocols

As aforementioned, the theoretical framework presented in this manuscript can be used for evaluating a large number of broadcast protocols. In this subsection, it is applied to two benchmark broadcast protocols: (i) the flooding protocol (denoted with "FLOOD"), where each node forwards a received message; (ii) the optimal MCDS-based protocol (denoted with "MCDS"), where a hypothetical network genius selects as relays only the nodes belonging to the MCDS set (as described in Section 1). In both cases, the silencing mechanism is employed.

These benchmark protocols are compared with the SIF and polynomial protocols, considering a vehicle spatial distribution characterized by a Poisson distribution with parameter ρ s z = 16veh. In order to have a significant comparison, the optimal values of c and g (c* = 4.8 and g* = 2.7) are considered. These values, obtained through the analytical framework, allow to minimize D under the constraint of having a RE higher than 0.95, in a scenario with ρsz = 16veh. The results, attained through both simulations and theoretical analysis, are shown in Figure 11. From the results in Figure 11, a few considerations can be drawn. First, for all considered metrics, there is a performance loss between the MCDS-based and the optimized SIF/polynomial protocols. At the same time, the SIF/polynomial protocols exhibit a similar performance gain with respect to flooding (with the exception of the RE metric). It is also possible to observe that, counterintuitively, the SIF and the polynomial protocols offer a similar performance level. This result can be motivated by considering that their PAFs tend to converge to a common shape, when using, respectively, the optimal values g* and c* as their key parameters. Finally, it can be also be noticed an excellent match between simulation and theoretical results can be observed.

Figure 11
figure 11

Simulation and analytical performance results of several protocols. (a) D, (b) RE, and (c) TE, obtained using the SIF, polynomial, flooding, and MCDS protocols, with ρ s z = 16 veh, c* = 4.8, and g* = 2.7. Both simulation and analytical results are shown.

7.4 Impact of topology on the protocol performance

The goal of this subsection is to assess (a-posteriori) the validity of the assumption, made in Section 2, of considering a uni-dimensional static network. The validation is performed through simulations, by taking into account the protocols considered in Section 7.3 (namely, flooding, MCDS-based, SIF, and polynomial protocols). According to our assumption, we expect that the performances offered by these protocols will not be significantly affected by the network topology. To this end, we consider three different scenarios: (i) the uni-dimensional (single-lane) static network presented in Section 2; (ii) a multi-lane static network; (iii) a multi-lane mobile network. The multi-lane static scenario is composed by Nlane = 6 adjacent lanes, each with width equal to wlane = 4 m. This network is obtained by simply replicating the single-lane topology. In particular, in each lane the positions of the vehicles are generated according to a PPP of parameter ρs/Nlane. Similarly, the multi-lane mobile scenario is composed by Nlane = 6 adjacent lanes (3 per direction of movement), each with width equal to wlane = 4 m. In this case, the vehicles are moving according to the intelligent driver motion with lane changes (IDM-LC) mobility model [24] and, therefore, their positions do not have Poisson distribution. The mobility traces have been obtained using VanetMobiSim [25] and plugged in the ns-2 network simulator. The vehicles' speeds are independent and uniformly distributed in the interval (20-40) m/s. Greater insights about the mobility models and the trace generation process are provided in [26]. It should be noticed that the value of the per-lane vehicular density (ρs) is time-averaged, since it is computed directly from the mobility trace and thus is time-varying. In Figure 12, we show the results obtained by considering ρs = 16 veh and the optimal values of c and g (c* = 4.8 and g* = 2.7). It can be easily noticed that the performances obtained in the considered scenarios are quite similar. Hence, this proves (a-posteriori) that the assumptions made in Section 2 are substantially correct. More specifically, it can be observed that increasing the width of the network leads to very similar values of RE and D, and to slightly higher TE (this can be justified by considering that there is a higher number of nodes in the neighborhood of a vehicle). Instead, if we consider the same scenario but with mobile vehicles, one can observe that the RE becomes slightly lower, while D and TE become higher. This behavior is motivated by the tendency of mobile VANETs to form ephemeral clusters of vehicles [27], leading to a reduced RE and increased D but to a higher TE.

Figure 12
figure 12

Simulation analysis of the impact of the network topology on the performance of several protocols. (a) D, (b) RE, and (c) TE, obtained using the SIF, polynomial, flooding, and MCDS protocols, with ρ s z = 16 veh, c* = 4.8, and g* = 2.7. The results are obtained through simulations by considering different topologies, namely: a single-lane static network, a multi-lane static network, and a multi-lane mobile network (highway-like).

Finally, the limited impact of the vehicle mobility on the protocols' performance could have been expected by considering the values of the worst case transmission time (about 0.2 s) and of the the maximum allowed speed (roughly equal to 40 m/s, corresponding to 144km/h). In these conditions, two vehicles proceeding in opposite directions on a highway have a differential speed of 80 m/s, and this leads, in turn, to a distance variation of 16 m during a packet transmission time. A distance of 16 m (the worst-case variation) corresponds to a small fraction of the transmission range of a typical IEEE 802.11 network interface (in Figure 12, we have considered z = 160 m).

8 Conclusions

In this article, we have presented a theoretical framework, based on a recursive computational approach, for average performance analysis of multihop broadcast protocols with silencing. We have then considered its application to VANET scenarios. The framework can be used in all the scenarios where the nodes' positions are distributed in such a way that their average positions are equally spaced. For example, it can be readily used for topologies where the nodes' positions have approximately a Poisson distribution. The proposed framework can be applied to a broad family of protocols and its validity has been assessed by means of ns-2 simulations, by considering several VANET scenarios. In particular, the framework allows to characterize the average performance of broadcast multihop protocols in highway-like scenarios, either static or mobile, thus preventing the use of time-wasting numerical simulations.

Appendix 1: Derivation of the average nodes positions

In this appendix, we derive the average value of the positions vector R(n) (n ) of n Poisson points falling in the finite interval I= ( 0 , z ) . The average values can be computed by firstly deriving the joint PDF of the vector R(n), denoted as f R ( n ) ( r ) , and defined over a proper n-dimensional domain D n . From f R ( n ) ( r ) , it is then possible to derive the marginal PDF of R j (j = 1, 2,..., n), denoted as f R j ( n ) ( r j ) and, from this, the average value R ¯ j ( n ) .

A single point in I

In this case, n = 1 and D n =I. In this case, R1 has a uniform distribution in I and its (marginal) PDF is given by:

f R 1 ( 1 ) ( r 1 ) = 1 z r 1 D 1 0 otherwise .

The average value is:

R ¯ 1 ( 1 ) = z 2 .

Two points in I

Without loss of generality, it is possible to order the points by imposing that r2 > r1. Thanks to this assumption, D 2 can be expressed as follows:

D 2 = { ( r 1 , r 2 ) 2 : r 1 ( 0 , z ) , r 2 ( 0 , z ) , r 1 < r 2 } .

The joint PDF is uniform over D 2 and can be expressed as follows:

f R 1 R 2 ( r 1 , r 2 ) = 1 Area ( D 2 ) ( r 1 , r 2 ) D 2 0 otherwise = 2 z 2 ( r 1 , r 2 ) D 2 0 otherwise

From the joint PDF, the marginal PDFs of R1 and R2 can be obtained:

f R 1 ( 2 ) ( r 1 ) = 0 f R 1 R 2 ( r 1 , r 2 ) d r 2 = r 1 z 2 z 2 d r 2 r 1 ( 0 , z ) 0 otherwise = 2 ( z - r 1 ) z 2 r 1 ( 0 , z ) 0 otherwise
(17)
f R 2 ( 2 ) ( r 2 ) = 0 f R 1 R 2 ( r 1 , r 2 ) d r 1 = 0 r 2 2 z 2 d r 1 r 2 ( 0 , z ) 0 otherwise = 2 ( z - r 2 ) z 2 r 2 ( 0 , z ) 0 otherwise .
(18)

Using Equations (17) and (18), the average values of R1 and R2 can be expressed:

R ¯ 1 ( 2 ) = 0 z r 1 2 ( z - r 1 ) z 2 d r 1 = z 3 R ¯ 2 ( 2 ) = 0 z r 2 2 ( z - r 2 ) z 2 d r 2 = 2 3 z .

A generic number of n points in I

As in the case with n = 2, it is possible to order the points as that r1 < r2 < · · · < r n , without losing any generality. Hence, the n-dimensional domain can be expressed as follows:

D n = { ( r 1 , . . . , r n ) n : r i ( 0 , z ) i { 1 , . . . , n } , r 1 < r 2 < < r n } .

The joint PDF of the n Poisson points has the following expression:

f R 1 . . . R n ( r 1 , . . . , r n ) = 1 Volume ( D n ) ( r 1 , . . . , r n ) D n 0 otherwise = n ! z n ( r 1 , . . . , r n ) D n 0 otherwise .

where

Volume ( D n ) = 0 z r 1 z r n - 1 z 1 d r n d r 2 d r 1 = 0 z r 1 z r n - 2 z ( z - r n - 1 ) d r n - 1 ( z - r n - 2 ) 2 2 . . . d r 2 d r 1 = z n n ( n - 1 ) ( n - 2 ) 3 2 = z n n ! .

The marginal PDF of the position of the i-th point is given by:

f R i ( n ) ( r i ) = 0 0 n - 1  times f R 1 R n ( r 1 , , r n ) d r n d r i + 1 d r i - 1 d r 1 = 0 r i r 1 r i r i - 2 r i r i z r n - 1 z n ! z n d r n d r i + 1 d r i - 1 d r 1 = n ! z n 0 r i r 1 r i r i - 2 r i r i z r n - 2 z ( z - r n - 1 ) d r n - 1 ( z - r n - 2 ) 2 2 d r i + 1 d r i - 1 d r 1 = n ! z n 0 r i r 1 r i r i - 2 r i ( z - r i ) n - i ( n - i ) ( n - i - 1 ) . . . . 3 . 2 d r i - 1 d r 1 = n ! z n ( z - r i ) n - i ( n - i ) ! 0 r i r 1 r i r i - 2 r i d r i - 1 d r 1 = n ! z n ( z - r i ) n - i ( n - i ) ! 0 r i r 1 r i r i - 3 r i ( r i - r i - 2 ) d r i - 2 ( r i - r i - 3 ) 2 2 d r 1 = n ! z n ( z - r i ) n - i ( n - i ) ! 0 r i ( r i - r 1 ) i - 2 ( i - 2 ) . . . . 3 . 2 r i i - 1 ( i - 1 ) . . . . 3 . 2 d r 1 = n ! z n ( z - r i ) n - i r i i - 1 ( n - i ) ! ( i - 1 ) ! i = 1 , , n .
(19)

On the basis of Equation (19), it is straightforward to derive the marginal PDF of R i (i = 1, 2, ..., n), given the presence of n points in the interval I:

f R i ( n ) ( r i ) = n ! z n ( z - r i ) ( n - i ) r i i - 1 ( n - 1 ) ! ( i - 1 ) ! r i ( 0 , z ) i = 1 , , n 0 otherwise .
(20)

Finally, from Equation (20) the average value of R i can be expressed as follows:

R ¯ i ( n ) = 0 z r i n ! z n ( z - r i ) n - i r i i - 1 ( n - i ) ! ( i - 1 ) ! d r i = i z n + 1 i = 1 , , n .

Appendix 2: Per-node retransmission probability in a network with equally spaced nodes

We consider the deterministic scenario introduced in Section 6.1, composed by a fixed number n of nodes equally spaced in the interval I= ( 0 , z ) , with the positions vector R(n) defined in Equation (1). In this appendix, we derive the following probabilities:

p rtx ( n ) ( i ) = P { S i } i = 1 , 2 , , n

where the event S i was defined in Section 6.1. In order to derive p rtx ( n ) ( i ) , it is helpful to introduce the following auxiliary events:

  • B i {the node i is designated as a relay};

  • C i {the node i wins the contention among a set of n nodes};

  • D i ( m ) A {the node i wins the contention among a set of m contending nodes};

  • W k {the value BC = k is chosen by a single node} k = 0,..., cw - 1;

  • W {at least a value of BC [0, cw - 1] is chosen by a single node}.

The event S i , defined in Subsection 6.1, is verified if both the events B i and C i happen. Therefore, p rtx ( n ) ( i ) can be expressed as:

p rtx ( n ) ( i ) = P { S i } = P { B i C i } = P { B i } P { C i }

where the last equality is motivated by the independence of the events B i and C i . The probability P { B i } is known, since it should be replaced with one of the PAF used by the protocols considered in this work (defined in Equations (4) and (5)). On the opposite, the unknown probability P { C i } can be derived by applying the total probability theorem, thus obtaining:

p rtx ( n ) ( i ) = P { B i } P { C i } = p i m = 1 n P { D i ( m ) } p V i ( n ) ( m - 1 ) = p i m = 1 n q ( m ) ( i ) p V i ( n ) ( m - 1 )

where q ( m ) ( i ) P { D i ( m ) } and V i ( n ) { 0 , , n - 1 } is a discrete random variable defined as:

V i ( n ) { the number of nodes competing with node  i  given  n  nodes} .

It can be shown that the PMF of V i ( n ) can be expressed as follows:

p V i ( n ) ( v ) = s L ( 1 - p s ) v = 0 j 1 J 1 , i , v j 2 J 2 , i , v j v J v , i , v s { j 1 , j 2 , , j v } p s t L \ { j 1 , j 2 , , j v } p ̄ t 0 < v < N - 1

where L { 1 , 2 , , N } \ { i } and the sets { J k , i , v } are defined as follows:

J k , i , v = { k + 1 , k + 2 , , n - v + k } i k { k , k + 1 , , i - 1 , i + 1 , , n - v + k } k < i n - v + k - 1 { k , k + 1 , , n - v + k - 1 } i > - v + k - 1 .

The probability q(m)(i) can be computed by analyzing the BA mechanism of the IEEE 802.11b standard. In particular, it emerges that q(m)(i) is independent of i and can be expressed as follows:

q ( m ) ( i ) = q ( m ) = P { W } n = P k = 0 c w - 1 W k n .
(21)

Since the events { W k } are not disjoint, it is necessary to use the generalized union probability formula [29, Ch.4] to compute P { W } :

P { W } = P k = 0 c w - 1 W k = k 1 = 0 c w - 1 P { W k 1 } - k 1 < k 2 P { W k 1 W k 2 } + k 1 < k 2 < k 3 P { W k 1 W k 2 W k 3 } + + ( - 1 ) c w + 1 P { W 0 W 1 W c w - 1 } .
(22)

Since the addenda of each single sum of the right-hand side of (22) are the same, taking into account the number of possible combinations, the generic right-hand side of (22) can be then expressed as follows:

( 1 ) r + 1 k 1 < k 2 < < k r P { W k 1 W k 2 W k r } = ( 1 ) r + 1 ( r c w ) ( c w r ) n r j = 0 r 1 ( n j ) ( c w ) n .

Thanks to Equation (22), q(n)can be finally given the following expression:

q ( n ) = r = 1 min ( n , c w ) ( 1 ) r + 1 ( r c w ) ( c w r ) n k j = 0 r 1 ( n j ) n ( c w ) n

where the term min (n, cw) is introduced to deal with the case n < cw.

Appendix 3: Per-node delay in a network with equally spaced nodes

In this appendix, we derive the number of slots spent by the i-th node during the backoff conditioned to the event S i , denoted as N i | i bo . By analyzing the BA mechanism of the IEEE 802.11b standard, one obtains:

N ¯ i | i bo = E N i | i bo = v = 0 N - 1 E N i bo | V i ( N ) = v , S i P V i ( N ) = v | S i
(23)

where P V i ( N ) = v | S i can be derived by means of the Bayes theorem as follows:

P V i ( N ) = v | S i = P { S i | V i ( N ) = v } p t q ( v + 1 ) P { V i ( N ) = v } p V i ( N ) ( v ) P { S i } p rtx ( N ) ( i ) = p i q ( v + 1 ) p V i ( N ) ( v ) p rtx ( N ) ( i ) .
(24)

Instead, E N i bo | V i ( N ) = v , S i can be derived by observing that the delay associated with the event {the node i transmits with success given v contending nodes} depends on two factors: (i) the slot BC i {0,..., cw-1} selected by the node i for transmitting; (ii) the number of collisions occurred in the slots 0,..., k - 1, which, given that BC i = k, corresponds to the following random variable:

N k , v col = { number of collisions in slots 0, , k - 1 } N k , v col { 0 , J k , v }

where J k , v min ( k , ( v / 2 ) ) denotes the maximum number of collisions that can happen in slots 0,..., k -1. On the basis of these considerations it can be shown that:

E N i bo | V i ( N ) = v , S i = k = 0 c w - 1 j = 0 J k , v E N i bo | V i ( N ) = v , S i , B C i = k , N k , v col = j . P { B C i = k N k , v col = j | V i N = v S i } = k = 0 c w - 1 j = 0 J k , v ( k + j T tx ) P v ( k , j ) v = 0 , , N - 1

where P v ( k , j ) P B C i = k N k , v col = j | V i ( N ) = v , S i is the (k, j)-th element of the matrix P v , of dimension cw × (Jcw-1,v+ 1). There exist N matrices P v , one for each value of V i ( N ) = v ,v { 0 , N - 1 } ..

In order to derive Pv it is necessary to define the following random variables:

H k , v = { number of nodes with  B C < k } H k , v { 0 , , v } = m = 1 v I m , k k > 0 v > 0 0 otherwise I m , k = 1 B C m < k 0 B C m N k , v | h opp = { number of nodes with  B C = k | H k , v = h } N k , v | h opp { 0 , , v - h } = m = 1 v - h L m , k k 0 v > 0 0 otherwise L m , k = 1 B C m = k 0 B C m > k .
N k , v | h col = { number of collisions in the  0 , , k - 1 | H k , v = h } N k , v , | h col { 0 , , J k , h } N k , v win = { number of slots 0 , , k - 1  chosen by a single node | H k , v = h } N k , v | h win { 0 , , k }

It is then possible to compute P v (k, j) using Bayes theorem and the total probability theorem:

P v ( k , j ) = P { B C i = k N k , v col = j | V i ( N ) = v , S i } = P { S i B C i = k N k , v col = j | V i ( N ) = v } P { S i | V i ( N ) = v = P { S i N k , v col = j | V i ( N ) = v , B C i = k , } P{BC i = k | V i ( N ) = v } p i q ( v + 1 ) = 1 c w p i q ( v + 1 ) h = 0 v P { S i N k , v | h col = j | { V i ( N ) = v , B C i = k , H k , v = h } } .
(25)
P { H k , v = h | { V i ( N ) = v , B C i = k } } = = 1 c w q ( v + 1 ) P v ( k , j ) = 1 c w q ( v + 1 ) { ( c w 1 c w ) v k = 0 h = 0 v M k , v ( j , h ) N k , v ( 0 , h ) k = 0 , , c w 1 = 1 c w q ( v + 1 ) ( c w 1 c w ) v k = 0 h = 0 v M k , v ( j , h ) N k , v ( 0 , h ) k = 1 , ... , c w 1
(26)

where the (j, h)-th elements of matrix N k,v (with dimension (v + 1) × (v + 1)) are defined as:

N k , v ( n , h ) = P N k , v | h opp = n | { V i ( N ) = v , B C i = k , H k , v = h } = v - h n ( c w - k - 1 ) v - h - n ( c w - k ) v - h v = 0 , , N - 1 k = 1 , , c w - 1 h , n = 0 , , v

while the (j, h)-th elements of matrix M k,v (with dimension (J k,v + 1) × (v + 1)) are defined as:

M k , v ( j , h ) = P N k , v | h win = 0 N k , v | h col = j | { V i ( N ) = v , B C i = k , H k , v = h } . P H k , v = h | { V i ( N ) = v , B C i = k } v = 0 , , N - 1 k = 1 , , c w - 1 j = 0 , , J k , v h = 0 , , v

In order to reduce the computational burden, the matrix M k,v can be derived by means of a recursive strategy. In particular, it can be observed that the number of collisions at the k-th hop is identical to (if nobody select the value BC = k - 1) or greater than 1 (if at least two nodes selects that value). Hence, once derived M1,vit is possible to determine M k,v for all the remaining values of k. In particular, the direct formulation for k = 1 is the following:

M 1 , v ( j , h ) = { ( c w k c w ) j = 0 , h = 0 0 j = 0 , h > 0 0 j = 1 , h 1 ( h v ) ( c w k ) v h ( c w ) v j = 1 , 1 < h < v

from which it is possible to derive Mk+1,vfor any values of k:

M k + 1 , v ( j , h ) = 0 h = 1 c w - k + 1 c w v j = 0 , h = 0 I j , k M k , v ( j , h ) N k , v ( 0 , h ) + t = 2 j - 2 h - 2 M k , v ( j - 1 , t ) N k , v ( h - t , t ) j J k , v , h { 2 j , v } 0 otherwise

where the indicator function I j,k is defined as

I j , k 1 j k 0 j = k .

Finally, using Equations (24) and (25) in (23), one obtains the final expression:

N ¯ i | i bo = p i p rtx ( N ) ( i ) v = 0 N - 1 q ( v + 1 ) p V i ( N ) ( v ) k = 0 c w - 1 j = 0 J k , v ( k + j T tx ) P v ( k , j ) = p i c w p rtx ( N ) ( i ) v = 0 N - 1 p V i ( N ) ( v ) k = 0 c w - 1 j = 0 J k , v ( k + j T tx ) P v ( k , j ) = p i c w p rtx ( N ) ( i ) v = 0 N - 1 p V i ( N ) ( v ) k = 1 c w - 1 k j = 0 J k , v P v ( k , j ) + T tx j = 1 J k , v j P v ( k , j )

This allows to determine Di|ifor every node of a given TD.

Appendix 4: Recursive approach for the evaluation of the performance global metrics

In this appendix, we outline the recursive approach which, coherently with an inductive principle, allows to derive the average global performance metrics (namely, RE, D, and TE), on the basis of the average local performance metrics of a generic TD. We recall that, thanks to the assumptions of the deterministic approach, all the TDs are identical and composed of n nodes. The recursive approach is detailed by considering the computation of D, but with the same approach it is also possible to derive RE and TE. The computation of the average D is carried out taking into account only the packets successfully arriving at the last reachable node, ignoring the unsuccessful retransmissions.

For all the values of m such that mn, all the n nodes within the 1-st TD are reached by the source. Therefore, the average delay coincides with the average transmission time of the source, given by Equation (11), i.e.,

D ¯ ( m ) = T ¯ src, tx 1 < m n .

However, for all the values m > n, at least a retransmission is necessary to reach the m-th node. In particular, if we consider the case m = n + 1, the (n + 1)-th node can be reached only and only if a successful transmission is carried out by a node of the 1-st TD. This event can happen in n different ways, each associated with a different delay. The tree of the possible decisions is represented in Figure 13, where every branch is labeled with the associated probability and with the corresponding value of delay. Since we are conditioning to the fact of having a successful transmission, the probability of the event {the i-th node transmits} is given by p Y ( i | S ) . Therefore, the average delay D ¯ ( n + 1 ) can be obtained as follows:

Figure 13
figure 13

Tree-based computation of the average delay D ¯ ( m ) , when m = n + 1.

D ¯ ( n + 1 ) = T src tx + i = 1 n D ¯ i | i p Y ( i | S ) .

When m = n + 2 the situation is slightly more complicated, since when the 1-st node is selected in the 1-st TD, two transmissions are needed to reach the (n + 2)-th node. In this case, a second TD, identical to the first, is formed, thus leading to the addition of n branches to the tree, as shown in Figure 14. However, since the two TDs are identical, the branches following the event { y = 1 | S } , can be replaced by the average delay computed for m = n + 1. Therefore, one obtains:

Figure 14
figure 14

Tree-based computation of the average delay D ¯ ( m ) , when m = n + 2.

D ¯ ( n + 2 ) = T src tx + ( D ¯ ( n + 1 ) + D ¯ i | i ) p Y ( 1 | S ) + i = 2 n D ¯ i | i p Y ( i | S ) .

Similar considerations can be drawn in the case with m = n + 3: the corresponding tree is shown in Figure 15. In this case, the two circled branches in the left figure, can be replaced by D ¯ ( n + 1 ) , obtaining the tree in the central figure that can be further simplifying by using D ¯ ( n + 2 ) , thus leading to the following expression:

Figure 15
figure 15

Tree-based computation of the average delay D ¯ ( m ) , when m = n + 3.

D ¯ ( n + 3 ) = T src tx + D ¯ ( n + 2 ) + D ¯ 1 | 1 p Y ( 1 | S ) + D ¯ ( n + 1 ) + D ¯ 2 | 2 p Y ( 2 | S ) + i = 3 n D ¯ i | i p Y ( i | S ) .

Now, by induction it is possible to derive the formulation of D ¯ ( N ) given in (10).

Abbreviations

VANETs:

vehicular ad-hoc NETworks

MANETs:

mobile ad-hoc NETworks

MCDS:

minimum connected dominant set

RTS/CTS:

ready-to-send/clear-to-send

UMB:

urban multihop broadcast

SB:

smart broadcast

BPAB:

binary partition assisted protocol

PPP:

poisson point process

GPS:

global positioning system

RE:

REachability

TE:

transmission efficiency

D:

delay

MAC:

medium access control

BA:

basic access

DIFS:

distributed interframe space

BC:

backoff counter

PAF:

probability assignment function

TD:

transmission domain.

References

  1. Ni S, Tseng Y, Chen Y, Sheu J: The Broadcast Storm Problem in a Mobile Ad Hoc Network. In Proc. ACM Intern. Conf. on Mobile Comput. and Networking. (MOBICOM), Seattle, WA, USA; 1999:151-162.

    Google Scholar 

  2. Zanella A, Pierobon G, Merlin S: On the limiting performance of broadcast algorithms over unidimensional ad-hoc radio networks. In Proc. of IEEE Intl. Conf. on Wireless Personal Multimedia Communications. (WMPC), Abano Terme, Italy; 2004:165-169. (2004)

    Google Scholar 

  3. Torrent-Moreno M, Mittag J, Santi P, Hartenstein H: Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Trans. Veh. Technol. 2009, 58(7):3684-3707.

    Article  Google Scholar 

  4. Kihl M, Sichitiu M, Joshi HP: Design and evaluation of two geocast protocols for vehicular ad-hoc networks. J Internet Eng 2008, 2: 127-135.

    Google Scholar 

  5. Korkmaz G, Ekici E, Özgüner F, Özgüner U: Urban multi-hop broadcast protocol for inter-vehicle communication systems. In Proc. of ACM Intl. Workshop on Vehicular ad hoc networks. (VANET), (ACM, Philadelphia, USA; 2004:76-85.

    Chapter  Google Scholar 

  6. Korkmaz G, Ekici E, Ozguner F: Black-burst-based multihop broadcast protocols for vehicular networks. IEEE Trans. Veh. Technol. 2007, 56(5):3159-3167.

    Article  Google Scholar 

  7. Sobrinho J, Krishnakumar A: Quality-of-service in ad hoc carrier sense multiple access wireless networks. IEEE J .Sel. Areas Commun. 2002, 17(8):1353-1368.

    Article  Google Scholar 

  8. Fasolo E, Zanella A, Zorzi M: An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In Proc. IEEE International Conf. on Commun.. Volume 9. (ICC), Istanbul, Turkey; 2006:3960-3965. (ICC)

    Google Scholar 

  9. Sahoo J, Wu E, Sahu P, Gerla M: BPAB: binary partition assisted emergency broadcast protocol for vehicular ad hoc networks. In Proc. of Intl. Conference on Computer Communications and Networks. (ICCCN), San Francisco, CA, USA; 2009:1-6.

    Google Scholar 

  10. Busanelli S, Ferrari G, Panichpapiboon S: Efficient broadcasting in IEEE 802.11 networks through irresponsible forwarding. In Proc. IEEE Global Telecommun. Conf.. (GLOBECOM), Honolulu, HA, USA; 2009:1-6.

    Google Scholar 

  11. Hanashi AM, Siddique A, Awan I, Woodward M: Performance evaluation of dynamic probabilistic broadcasting for flooding in mobile ad hoc networks. Simul. Model. Pract. Theory 2009, 17(2):364-375. 10.1016/j.simpat.2008.09.012

    Article  Google Scholar 

  12. Wisitpongphan N, Tonguz O, Parikh J, Mudalige P, Bai F, Sadekar V: Broadcast storm mitigation techniques in vehicular ad hoc networks. IEEE Wirel. Commun. Mag. 2007, 14(6):84-94.

    Article  Google Scholar 

  13. Busanelli S, Ferrari G, Giorgio VA: On the effects of mobility for efficient broadcast data dissemination in I2V networks. In Proc. SWiM Workshop IEEE Global Telecommun. Conf.. (GLOBECOM), Miami, FL, USA; 2010:38-42.

    Google Scholar 

  14. Wisitpongphan N, Bai F, Mudalige P, Sadekar V, Tonguz OK: Routing in sparse vehicular ad hoc wireless networks. IEEE J. Sel. Areas Commun. 2007, 25(8):1538-1556.

    Article  Google Scholar 

  15. Papoulis A: Probability, Random Variables and Stochastic Processes. 3rd edition. McGraw-Hill, New York; 2001.

    Google Scholar 

  16. Insitute of Electrical and Electronics Engineers, IEEE Std 802. 11TM-2007. 2007.

  17. IEEE Standard for Information technology-Telecommunications and information exchange between systems- Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007) 2010, 1-51.

  18. Mohan P, Padmanabhan VN, Ramjee R: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In ACM Int. Conf. on Embedded Networked Sensor Systems. (SenSys), Raleigh, NC, USA; 2008:323-336.

    Google Scholar 

  19. Ferrari G, Busanelli S, Iotti N, Kaplan Y: Cross-network information dissemination in VANETs. In Proc. of IEEE Intl. Conf. on ITS Telecommunications. (ITST), Saint-Petersburg, Russia; 2011:133-139.

    Google Scholar 

  20. Panichpapiboon S, Ferrari G: Irresponsbile forwarding. In Proc. IEEE Intl. Conf. on Intelligent Transport System Telecommunication. (ITST), Phuket, Thailand; 2008:311-316.

    Google Scholar 

  21. Kosch T, Kulp I, Bechler M, Strassberger M, Weyl B, Lasowski R: Communication architecture for cooperative systems in Europe. IEEE Commun. Mag. 2009, 47(5):116-125.

    Article  Google Scholar 

  22. Network Simulator 2 (ns-2)Available at; [http://isi.edu/nsnam/ns/]

  23. Chen Q, Schmidt-Eisenlohr F, Jiang D, Torrent-Moreno M, Delgrossi L, Hartenstein H: Overhaul of IEEE 802.11 modeling and simulation in ns-2. In Proc. of the ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. (MSWiM), Chania, Crete Island, Greece; 2007:159-168.

    Google Scholar 

  24. Fiore M, Härri J, Filali F, Bonnet C: Vehicular mobility simulation for VANETs. In Proc. of SCS Annual Simulation Symposium. (ANSS), Norfolk, VA, USA; 2007:301-309.

    Google Scholar 

  25. VanetMobiSim Project[http://vanet.eurecom.fr/]

  26. Busanelli S, Ferrari G, Giorgio VA: I2V highway and urban vehicular networks: a comparative analysis of the impact of mobility on broadcast data dissemination. J. Comm. SI Seam. Mobil. Wirel. Netw. 2011, 6: 87-100.

    Google Scholar 

  27. Busanelli S, Ferrari G, Panichpapiboon S: Cluster-based irresponsible forwarding. In The Internet of Things, 20th Tyrrhenian International Workshop on Digital Communications, Springer. Edited by: D Giusto, G Morabito, A Iera, L Atzori. Pula, Sardinia, Italy; 2009.

    Google Scholar 

  28. Eureka Project 6252 X-NETAD[Http://www.eurekanetwork.org/project/-/id/6252]

  29. Feller W: An Introduction to Probability Theory and its Applications. Volume 1. Wiley, New York; 1968.

    Google Scholar 

Download references

Acknowledgements

This work is carried out under the one-year project "Cross-Network Effective Traffic Alerts Dissemination" (X-NETAD, Eureka Label E! 6252 [28]), sponsored by the Ministry of Foreign Affairs (Italy) and The Israeli Industry Center for R&D (Israel) under the "Israel-Italy Joint Innovation Program for Industrial, Scientific and Technological Cooperation in R&D." The authors would like to thank Prof. A. Bononi of the University of Parma for his support and help.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefano Busanelli.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Busanelli, S., Ferrari, G. & Gruppini, R. Recursive analytical performance evaluation of broadcast protocols with silencing: application to VANETs. J Wireless Com Network 2012, 10 (2012). https://doi.org/10.1186/1687-1499-2012-10

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-10

Keywords