- Research
- Open Access

# Performance evaluation of the V2I fair access with a finite retry limit

- Qiong Wu
^{1, 3}, - Hao Zhang
^{1}, - Zhengquan Li
^{2, 3}Email author, - Yang Liu
^{1}and - Cui Zhang
^{4}

**2018**:20

https://doi.org/10.1186/s13638-018-1025-5

© The Author(s). 2018

**Received:**18 November 2017**Accepted:**2 January 2018**Published:**22 January 2018

## Abstract

This paper evaluates the performance of the vehicle-to-infrastructure (V2I) fair access with a finite retry limit through constructing an analytical model. Firstly, the process of the distributed coordination function (DCF) mechanism with a finite retry limit is described through developing a 2-D Markov chain; based on the Markov chain, the transmission probability with the access parameters including the minimum window and the retry limit is derived. Then, considering the V2I unfair access problem, the relationship between the velocity and the transmission probability of a vehicle is derived. Based on the proposed model, given a finite retry limit, the minimum window of a vehicle can be determined according to its velocity. In the simulation, the proposed model is justified to be effective and the V2I fair access performance with a finite retry limit is evaluated through comparison.

## Keywords

- Performance evaluation
- Fair access
- V2I
- Retry limit

## 1 Introduction

Vehicular networks can provide safety and entertainment applications through the vehicle-to-infrastructure (V2I) communication. In a vehicular network, multiple vehicles with different velocities usually need to access a roadside unit (RSU) using a single channel, which would lead to an unfair access problem, i.e., the vehicles which move with different velocities would spend different time to move in the communication range of the RSU and thus spend different time to transmit packets to the RSU. To solve the V2I unfair access problem, it is useful to design an access scheme to achieve V2I fair access.

To solve the V2I unfair access problem, Karamad and Ashtiani proposed a fair access scheme base on the distributed coordination function (DCF) mechanism [1]. The fair access scheme allows a vehicle to change its minimum window adaptively to realize fair access. The performance of the fair access scheme is analyzed through constructing a model [1]. This protocol is proposed based on the DCF mechanism. The DCF mechanism specifies that for each packet, the number of retransmission should not be larger than a finite number, i.e., retry limit [2]. A packet would be dropped after the number of retransmission reaches the finite retry limit. However, this work assumes that the retry limit is infinite and each vehicle always has packets prepared for transmitting. In the real world, a vehicle would not always have packets prepared for transmitting. In our prior work, we have constructed models to analyze the V2I fair access performance when each vehicle does not always have packets prepared for transmitting [3, 4]. However, our prior work does not consider a finite retry limit. Without a retry limit, vehicles may retransmit a packet consecutively when the channel contention level is high. The retry limit is an important factor of the DCF mechanism. It specifies a maximum time for retransmissions and thus affects the access performance of the DCF mechanism. Extensive work has focused on the access of vehicular networks [5–27]. However, these work does not consider the V2I unfair access problem. It is necessary to construct a model to evaluate the V2I fair access performance with a finite retry limit. This is our motivation.

In this paper, we evaluate the V2I fair access performance with a finite retry limit through constructing an analytical model. Firstly, a 2-D Markov chain is developed to model the process of the DCF mechanism with a finite retry limit; based on the Markov chain, the transmission probability with the access parameters including the minimum window and the retry limit is derived. Then, considering the V2I unfair access problem, the relationship between the velocity and the transmission probability of a vehicle is derived. Based on the proposed model, given a finite retry limit, the minimum window of a vehicle can be determined according to its velocity. In the simulation, the proposed model is justified to be effective and the V2I fair access performance with a finite retry limit is evaluated through comparison.

This paper is organized as follows. Section 2 describes the network scenario and reviews related work. Section 3 proposes a Markov chain to model the process of the DCF mechanism with a finite retry limit and derives the transmission probability with the access parameters including the minimum window and the retry limit. Section 4 considers the V2I unfair access problem and derives the relationship between the velocity of a vehicle and the transmission probability to achieve the V2I fair access. Section 5 evaluates the V2I fair access performance with retry limit through simulation. Section 6 concludes this paper.

## 2 Related work

We introduce the V2I communication scenario in a vehicular network firstly and then review the related work in this section.

### 2.1 Network scenario

*λ*. The number of vehicles in each group is distributed uniformly in [0,

*b*]. The velocities of the vehicles in each group are identical and remain a constant when the vehicles are within the communication range of the RSU. Moreover, the vehicles need to communicate with the RSU once they are within the communication range of the RSU. Figure 1 shows an example with three groups.

All vehicles in the network communicate with the RSU employing the DCF mechanism. Each vehicle accesses a channel with a same retry limit and a same minimum window. In this condition, each vehicle transmits packets with a same transmission probability. However, when vehicles which move with different velocities pass through the communication range of the RSU, they would spend different time to communicate with the RSU. This would result in that the vehicles which move with higher velocity would have less opportunity to transmit packets compared with the vehicles moving with lower velocity. This problem is the unfair access problem, which can affect the access performance largely.

### 2.2 Related work

Extensive work has focused on the access of vehicular networks [5–27]. In [5], Bianchi constructed a Markov chain to evaluate the DCF performance. In [6, 7], Duffy et al. constructed a Markov chain to evaluate the DCF performance when each node does not always have packet to transmit. In [8], Sun and Dai constructed a framework to observe the effect of the retry limit on the performance optimization of the DCF mechanism. In [9], Banchs et al. constructed a model to evaluate the 802.11aa performance with retry limit. In [10], Gupta and Rai proposed a model to evaluate the performance of the DCF mechanism with a retry limit. The proposed model considers both the saturation traffic and the non-saturation traffic. In [11], Babich et al. proposed an algorithm to jointly manage the voice and video access categories through justifying the retry limit adaptively and evaluated the performance of the proposed algorithm. In [12], Rashwand et al. constructed a model for the access mechanism of the 802.15.6 in a wireless body network. The constructed model takes into account an error-prone channel, a retry limit and a packet queue. In [13], Zheng et al. construct a model to evaluate the DCF performance considering the group-synchronization. In [14], Liao et al. proposed an access scheme to improve the access performance and constructed a model to investigate the benefit of the proposed access scheme. In [15], Swain et al. evaluated the DCF performance including the throughput, delay, and power consumption considering different traffic conditions and a power save mode. In [16], Madhavi and Rao proposed a new packet access process based on the DCF mechanism to decrease the number of collision and increase the throughput. Moreover, they constructed a framework to evaluate the performance. In [17], Li et al. proposed a model to predict a vehicular network performance considering a Rayleigh channel. In [18, 19], Wu and Zheng proposed models to evaluate the performance of the IEEE 802.11p EDCA mechanism. In [20, 21], Wu and Zheng proposed models to evaluate the performance of the ADHOC MAC protocol. In [22], Chen et al. proposed a cross-tier handover algorithm based on a preset threshold policy to increase the received signal to interference plus noise ratio (SINR) at the macrocell base station/femtocell access point (MBS/FAP) in two-tier Femtocell networks. In [23], Xiong et al. proposed a broad beamforming approach (BBA) to increase the signal-tonoise ratio (SNR). In [24], Lu et al. adjusted power to improve the handover performance in high-speed railway communications systems. In [25], Xiong et al. proposed a mobile service amount based link scheduling (MSA-LS) for high-mobility vehicular networks to overcome the inefficiency of current instantaneous rate based link scheduling (IIRLS) method. In [26], Li et al. evaluated the transmission performance in the high-speed railways (HSRs) and derived an optimal power allocation strategy for HSRs. In [27], Xiong et al. proposed a novel fairness power allocation scheme to increase the high mobile service amount with fairness between the water-filling and proportional power allocation. However, these work mentioned above does not consider the unfair access problem in vehicular networks, which motivated us to conduct this work.

## 3 Modeling for the DCF mechanism

In this section, we first describe the DCF mechanism briefly and then construct a Markov chain to model the access process of the DCF mechanism with a finite retry limit.

### 3.1 DCF mechanism

The DCF mechanism uses a backoff scheme to access a channel. Each node which has packets to transmit senses the channel firstly. If the node senses that the channel stays idle continuously within a duration distributed inter-frame space (DIFS), it would transmit the packet. Otherwise, the node would start a backoff process. In this case, it will start up a counter. Initially, the value of the counter is selected from [0, *W*_{min}] randomly; here, *W*_{min} denotes the minimum window. Then, after each time slot, the value of the counter will be deduced by 1. After the value of the counter is deduced to 0, the node would transmit the packet. If an acknowledgement (ACK) packet is not received in a short inter-frame space (SIFS) duration, a collision occurred and the node would retransmit the packet. The value of *W*_{min} will be doubled firstly at the initial of each retransmission; then, the node chooses another number from [0, *W*_{min}] randomly as the value of the counter and starts a new backoff process. After *W*_{min} reaches *W*_{max}, where *W*_{max} is the maximum window, it will not be doubled and keep the value *W*_{max}. If the number of retransmissions is larger than the retry limit, the node would drop the packet and reset the value of *W*_{min} to the initial value, and then, the node would start a new backoff process. If the node has no packet to be transmitted and the counter is decremented to 0, the node would keep the counter to be 0 until it has a packet to transmit.

### 3.2 Markov chain for the backoff process

Notations used in the Markov model

Notation | Definition |
---|---|

| The number of the retransmission |

| The value of a counter |

| Stationary probability of states with a packet waiting to transmit when the number of the retransmission is |

| Stationary probability of states without packets waiting to transmit when the number of the retransmission is |

\( {W}_m^i \) | Window size when the number of the retransmission is |

| The maximum number of the retransmission beyond which the window would not be doubled |

| Retry limit |

| Probability that a node has a packet prepared to transmit |

| Collision probability |

| Probability that the channel is sensed idle |

| Transmission probability |

Like most related work [3–17], we assume that the collision probability is equal for different transmission and the channel is ideal; a collision occurred only when two nodes within a same communication range transmit packets at the same time.

*b*(0,0)

_{e}can be expressed as follows:

## 4 Performance analysis for the V2I fair access

In this section, we analyze the fair access performance with a finite retry limit.

The network scenario is shown in Fig. 1. The V2I fair access is considered, and the relationship between the velocity and the transmission probability is derived. Combining the obtained transmission probability in Section 3, we derive the relationship between the minimum window and the velocity to achieve the V2I fair access.

*i*can be expressed by

*S*denotes the normalized throughput of the networks,

*R*

_{ b }denotes the rate of the channel,

*N*

_{v}denotes the number of vehicles, and

*τ*

_{ i }denotes the transmission probability of vehicle

*i.*

*T*

_{ i }denotes the time that vehicle

*i*passes through the communication range of the RSU,

*R*denotes the communication range of the RSU,

*v*

_{ i }denotes the velocity of vehicle

*i*, and

*C*denotes a constant.

*C*

^{′}is independent of

*i*and thus is a constant. Eq. (5) can be rewritten as

*K*

_{index}is the fairness index, which is a constant. In another word, to access a channel fairly, each vehicle in the network should have the same fairness index

*K*

_{index}. Here, we obtain the relationship between the velocity and the transmission probability to achieve V2I fair access.

Parameters of a vehicle in group *i*

| The time that a vehicle passes through the communication range of the RSU |

| The transmission probability |

| The velocity |

| The number of vehicles |

| The minimum window |

\( {P}_{idle}^i \) | The probability that the channel is sensed idle |

*W*. In the DCF mechanism, the minimum window is much larger than 1, i.e.,

*W*

_{ i }>> 1 [2]. Therefore, the following approximation can be obtained:

*n*

_{ i }. Based on Eq. (7), the collision probability for group

*i*can be derived:

*B*. Therefore, the collision probability for group

*i*, i.e.,

*p*

_{ i }, can be approximated to a constant

*p*.

*p*can be approximated to a constant. According to Eq. (9), the relationship between the minimum window and the transmission probability for group

*i*can be obtained:

Since *p* is approximated to a constant, both *f*(*p*) and *K*_{1} are constant. Moreover, according to Eq. (10), we can find that the transmission probability for a group is approximated to be not dependent on *q*. Here, we obtain the approximation relationship between the minimum window and the transmission probability.

Finally, the relationship between the minimum window and the velocity can be obtained. According to Eq. (6) and Eq. (10), we can obtain the following equations:

*τ*_{
i
}*T*_{
i
} = *K*_{index} and \( {\tau}_i=\frac{K_1}{W_i} \), where \( \kern0.5em {T}_i=\frac{R}{v_i} \).

*i*can be obtained:

From Eq. (12), we can find that *K*_{2} is a constant. Moreover, we can find that the minimum window is in inverse proportion to the velocity for a group.

The average minimum window can be known according to the DCF mechanism, and in the real world, the average velocity can be calculated according to the velocities of vehicles recorded by RSU. From Eq. (13), we can calculate *K*_{2} according to \( \overline{W} \) and \( \overline{v} \). Moreover, for a vehicle, the velocity is known. Therefore, the minimum window can be calculated according to Eq. (12).

## 5 Simulation results

*λ*. Once a vehicle arrives at the communication range of the RSU, it has a packet to transmit with probability

*q*. Let

*T*be the simulation time,

*T*

_{ s }be the duration time of a successful transmission,

*T*

_{ p }be the duration time of a packet, and

*T*

_{c}be the duration of a collision

*T*

_{c}. The parameters of the DCF mechanism are set according to the 802.11 standard [2]. Table 3 shows the value of the parameters.

Parameters used in the simulation

| 8184 |

| 8972 |

| 8713 |

ACK(μs) | 240 |

DIFS(μs) | 128 |

SIFS(μs) | 28 |

Slot time(μs) | 50 |

Vehicles’ velocity(m/s) | Uniform in [5,45] |

| 500 |

Mean group size | 2 |

| 3 |

| 8 |

Average minimum window | 64 |

| 50 |

*λ*and

*q*is shown in Fig. 3. In this simulation experiment, the velocity is 25 m/s. The simulation results are almost the same with the analytical results, which means the performance analysis is accurate. In Fig. 3, the transmission probability is in inverse proportion to the minimum window and the transmission probability is not dependent on

*q*for a particular value of

*λ*, which justified the results of the Eq. (11).

*K*

_{index}is shown in Fig. 5. The traffic rate equals 0.05, and the minimum commend window size is 64 in this experiment. We can see that the simulation results are almost the same with the analytical results, i.e., the performance analysis is accurate. In Fig. 5, the value of

*K*

_{index}almost does not change with velocity increasing, which verifies Eq. (6).

*K*

_{index}with the analytical

*K*

_{index}which does not consider a retry limit. The value of

*K*

_{index}considering a retry limit is smaller than that value without considering a retry limit. This is because that the fairness index is in direct proportion to the transmission probability according to Eq. (6).

## 6 Conclusions

This paper evaluates the performance of the V2I fair access with a finite retry limit through constructing an analytical model. Firstly, a 2-D Markov chain is developed to model the process of the DCF mechanism with a finite retry limit; the transmission probability with access parameters including the minimum window and the retry limit is derived based on the Markov chain. Then, considering the V2I unfair access problem, the relationship between the velocity and the transmission probability of a vehicle is derived. Based on the proposed model, given a finite retry limit, the minimum window of a vehicle can be determined according to its velocity. In the simulation, the proposed model is justified to be effective and the V2I fair access performance with a finite retry limit is evaluated through comparison.

## Declarations

### Funding

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61701197, 61571108, 61701284, and 61761030; the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University, under Grant No. 2018D15; the China Postdoctoral Science Foundation Funded Project under Grant Nos. 2017M622233 and 2017M622103; the Open Foundation of State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, under Grant No. SKLNST-2016-2-14; the Open Foundation of Key Laboratory of Wireless Communication, Nanjing University of Posts and Telecommunication, Jiangsu Province, under Grant No. 2017WICOM01; and the Fundamental Research Funds for the Central Universities under Grant Nos. JUSRP11742 and JUSRP11738.

### Authors’ contributions

QW and ZL conceived and designed the experiments. HZ and QW performed the experiments. HZ, QW, and CZ analyzed the data. QW, HZ, and YL wrote the paper. All authors read and approved the final manuscript.

### Competing interests

The authors declare that they have no competing interests.

### Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

**Open Access**This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## Authors’ Affiliations

## References

- E Karamad, F Ashtiani, A modified 802.11-based MAC scheme to assure fair access for vehicle-to-vehicle communications. Comput. Commun.
**31**(12), 2898–2906 (2008)View ArticleGoogle Scholar - IEEE 802.11. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1997.Google Scholar
- Q Wu, J Zheng, Performance modeling and analysis of IEEE 802.11 DCF based fair channel access for vehicle-to-roadside communication in a non-saturated state. Wirel. Netw
**21**(1), 1–11 (2015)View ArticleGoogle Scholar - Q Wu, J Zheng,
*Performance Modeling of IEEE 802.11 DCF Based Fair Channel Access for Vehicular-to-Roadside Communication in a Non-saturated State*(Proc. of IEEE International Conference on Communications(ICC), Sydney, 2014), pp. 2575–2580Google Scholar - G Bianchi, Performance analysis of 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications
**18**(3), 535–547 (2000)View ArticleGoogle Scholar - K Duffy, D Malone, D Leith, Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communication Letters
**9**(8), 717–715 (2005)View ArticleGoogle Scholar - D Malone, K Duffy, D Leith, Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions. IEEE/ACM Transaction on Networking
**15**(1), 159–172 (2007)View ArticleGoogle Scholar - X Sun, L Dai, Performance optimization of CSMA networks with a finite retry limit. IEEE Trans. Wirel. Commun.
**15**(9), 5947–5962 (2016)View ArticleGoogle Scholar - A Banchs, A Qlica, L Eznarriaga, D Kowalsk, P Sereano, Performance analysis and algorithm selection for reliable multicast in IEEE 802.11aa wireless LAN. IEEE Trans. Veh. Technol.
**63**(8), 3875–3891 (2014)View ArticleGoogle Scholar - N Gupta, C Rai,
*Non-saturation Throughput Analysis of IEEE 802.11DCF Considering Short Retry Limit for Single Hop ad hoc Networks*(Proc. of 2013 second international conference on future generation communication technology(FGCT), London, 2013), pp. 10–15Google Scholar - F Babich, M Comisso, R Corrado, F Merazka, Joint voice/video retry limit adaptation for on-demand streaming over WiFi networks. IEEE Commun. Lett.
**20**(9), 1852–1855 (2016)View ArticleGoogle Scholar - S Rashwand, J Misic, V Misic, Analysis of CSMA/CA mechanism of IEEE 802.15.6 under non-saturation regime. IEEE Transactions on Parallel and Distributed Systems
**27**(5), 1279–1288 (2016)View ArticleGoogle Scholar - L Zheng, M Ni, L Cai, J Pan, C Ghosh, K Doppler, Performance analysis of group-synchronized DCF for dense IEEE 802.11 networks. IEEE Trans. Wirel. Commun.
**13**(11), 6180–6192 (2014)View ArticleGoogle Scholar - R Liao, B Bellalta, M Oliver, Modelling and enhancing full-duplex MAC for single-hop 802.11 wireless networks. IEEE Wireless Communications Letter
**4**(4), 349–352 (2015)View ArticleGoogle Scholar - P Swain, S Chakraboty, S Nandi, P Bhaduri, Performance modeling and analysis of IEEE 802.11 IBSS PSM in different traffic conditions. IEEE Trans. Mob. Comput.
**14**(8), 1536–1233 (2015)View ArticleGoogle Scholar - T Madhavi, G Rao, Modelling collision alleviating DCF protocol with finite retry limits. Electron. Lett.
**51**(2), 185–187 (2015)View ArticleGoogle Scholar - B Li, S Chen, G Sutton, Y Shi, R Liu, MAC performance analysis for drive-thru Internet networks with Rayleigh capture. IEEE ACCESS
**5**, 10649–10661 (2017)View ArticleGoogle Scholar - J Zheng, Q Wu, Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Trans. Veh. Technol.
**65**(4), 2673–2687 (2016)View ArticleGoogle Scholar - Q Wu, J Zheng,
*Performance Modeling of the IEEE 802.11p EDCA Mechanism for VANET*(proc. of IEEE Globe Communication Conference(GLOBECOM), Austin, 2014), pp. 57–63Google Scholar - Q Wu, J Zheng, Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks. Wirel. Netw
**22**(3), 799–812 (2016)View ArticleGoogle Scholar - Q Wu, J Zheng,
*Performance Modeling and Analysis of the ADHOC MAC Protocol for VANETs*(proc. of IEEE International Conference on Communications (ICC), London, 2015), pp. 3646–3652Google Scholar - G Chen, J Zheng, L Shen, A preset threshold based cross-tier handover algorithm for uplink co-channel interference mitigation in two-tier Femtocell networks. Wirel. Netw
**22**(6), 1819–1835 (2016)View ArticleGoogle Scholar - K Xiong, B Wang, C Jiang, L Liu, A broad beamforming approach for high-mobility communications. IEEE Trans. Veh. Technol. 66(11), 10546-10550 (2017)Google Scholar
- Y Lu, K Xiong, P Fan, Z Zhong, B Ai, The effect of power adjustment on handover in high-speed railway communication networks. IEEE ACCESS 5, 26237-26250 (2017)Google Scholar
- K Xiong, Y Zhang, P Fan, H Yang, X Zhou, Mobile service amount based link scheduling for high-mobility cooperative vehicular networks. IEEE Trans. Veh. Technol. 66(10), 9521-9533 (2017)Google Scholar
- T Li, K Xiong, P Fan, K Letaief, Service-oriented power allocation for high-speed railway wireless communications. IEEE ACCESS 5, 8343-8356 (2017)Google Scholar
- K Xiong, P Fan, Y Zhang, K Letaief, Towards 5G high mobility: A fairness-adjustable time-domain power allocation approach. IEEE ACCESS 5, 11817-11831 (2017)Google Scholar