Fig. 1From: Performance evaluation of the V2I fair access with a finite retry limitNetwork scenarioBack to article page