Mohammad Almalag's PhD Defense Slides
Department of Computer Science
Old Dominion University
April 3, 2013
Note: You may need to download the file to see all of the animations.
1. TDMA Slot Reservation in
Cluster-Based VANETS
Mohammad S. Almalag
Dissertation Defense
April 3, 2013
Advisor: Michele C. Weigle
2. Research Question
Can VANETs accommodate non-safety
applications’ use of the spectrum while
still meeting the requirements of safety
applications?
04/03/2013
2
3. Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
3
04/03/2013
9. The problem
• Safety message requirements
▫ High reliability
▫ Lifetime 100 msec
[Wang, ACM VANET 2008]
04/03/2013
9
Non-Safety messages
almost shut down
Low Medium High
Traffic Density
10. Related Work
MAC PROTOCOLS FOR VANET
Classified into three different categories
1.Channel partitioning:
▫ Time Division Multiple Access (TDMA), Frequency-Division
Multiple Access (FDMA) and Code-Division Multiple Access
(CDMA)
1.Random access:
▫ Contention based protocols, CSMA
1.Taking turns:
▫ Polling (master-slave) or token ring
04/03/2013
10
11. Related Work
MAC PROTOCOLS FOR VANET
Examples:
1.VeSOMAC (Yu and Biswas, 2007)
▫ TDMA + location based
▫ Does not considerV2I communication
1.VeMAC (Omar et al., 2011)
▫ TDMA + 2 transceivers
▫ Includes vehicles in both directions + RSU in one TDAM frame
▫ 2 transceivers + Overhead
1.PP-CSMA (Yang et al., 2005)
1. CSMA + priority scheme + polling scheme
2. Does not consider Broadcasting!
2.MCTRP (Bi et al., 2009)
▫ Token ring + 2 transceivers + road conditions
▫ Uses CSMA CA mechanism for inter-ring communication
04/03/2013
11
12. Thesis Statement
TDMA slot reservation in cluster-based
VANETs will improve the performance of
delivering non-safety messages with little
impact on the delivery of safety messages.
04/03/2013
12
13. Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
13
04/03/2013
14. My Approach
1. Solves network scalability and hidden terminal
problems
2. Fair transmission for safety and non-safety
messages
3. Lightweight TDMA assignment scheme
4. Efficiently manages cluster with changes of
topology
5. Develop TC-MAC cluster-based MAC protocol
6. Evaluate TC-MAC vs. WAVE
04/03/2013
14
15. TC-MAC
Structure
• Based on multi-channel DSRC layout
▫ 1 CCH and 6 SCHs
• TDMA technique using local IDs for accessing
the channels
• Cluster-based protocol
▫ Clusterhead (CH) scheme
04/03/2013
15
16. TC-MAC
TDMA
• Time Division Multiple Access (TDMA) is a method used
to enable multiple nodes to transmit on the same
frequency channel
04/03/2013
16
19. TC-MAC
Local IDs
04/03/2013
19
• Each vehicle in the cluster will receive a local ID (0 to
Nmax -1):
▫ CH will always have ID 1
▫ ID 0 is reserved for a virtual vehicle
21. TC-MAC
Intra-cluster Communication
• Lightweight communication protocol
• Each vehicle uses its own mini-slot to disseminate
safety/update messages
• First byte, 28
= 128 different situations. Examples:
▫ 0: vehicle is not communicating at the moment
▫ 1: vehicle is involved in communicating with some other vehicle
in the cluster. (Unicast)
▫ 2: vehicle is involved in communicating with some other vehicles
in the cluster. (multicast group)
▫ 3: vehicle is involved in communicating with a vehicle or RSU
outside the cluster
▫ 4: the CH is leaving the cluster
04/03/2013
21
22. TC-MAC
Intra-cluster Communication
• Disseminating intra-cluster non-safety messages:
▫ Unicast:
Set up without CH intervention.
Using the local ID for channel and slot time.
▫ Multicast:
Small group of vehicles (<5):
Set up without CH intervention.
Large group of vehicles (>=5):
Set up with CH intervention.
04/03/2013
22
24. Clustering
Clusterhead Election
• Based on the traffic flow:
▫ Lane Weight
▫ Little overhead
▫ Network Connectivity Level (NCL)
▫ Average Distance Level (ADL)
▫ Average Velocity Level (AVL)
▫ Clusterhead Level (CHL):
04/03/2013
24
iiii AVLADLtNCLCHL ++= )(
25. Clustering
Cluster Maintenance
• The behavior of many vehicles may change the
topology of the cluster:
1. A Clusterhead leaving the cluster
2. A new vehicle joining the cluster
3. A cluster member leaving the cluster
4. Two clusters come in range of each other
5. A multi-hop cluster shrinks to a one-hop cluster
04/03/2013
25
29. CDMA/TC-MAC
Inter-cluster communication
• CDMA/TC-MAC hybrid protocol for inter-cluster
communication.
• CDMA code for each cluster
▫ Intra-cluster communication
• Two protocols:
1.Code assignment protocol
1.Recovery protocol
04/03/2013
29
30. CDMA/TC-MAC
Code assignment protocol
• Select a CDMA code to the cluster
Done by the CH
• 18 different CDMA codes:
▫ Based on the highway and the cluster’s directions
▫ 2 codes are global for each highway direction
▫ 4 codes for each traffic direction
1 code is temp
▫ Two clusters with two different codes between clusters sharing the same
code
04/03/2013
30
33. Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
33
04/03/2013
34. Evaluation
Experiment Plan
04/03/2013
34
• NS-3 network simulator
▫ For VANET, (Arbabi and Weigle, 2010):
Intelligent Driver Model (IDM)
MOBIL lane change model
• Network settings:
▫ Transmission range = 300 m
▫ Max. safety message size = 200 bytes
▫ Max. non-safety message size = 1200 bytes
▫ Date rate = 6 Mbits/sec
▫ CCHI = SCHI = 0.050 sec
35. Evaluation
Experiment Plan
04/03/2013
35
• Clusterhead Election:
▫ Scenarios:
Implemented for a highway
Different number of lanes, 2, 3, and 4 lanes
2 exits, on the right
25% of vehicles on the rightmost lane take the exit
▫ Evaluation metrics:
The number of CH changes
▫ Comparison:
Lowest-ID, Highest-degree, and Utility Function
algorithms
38. Evaluation
Experiment Plan
04/03/2013
38
• TC-MAC:
▫ Scenarios:
Implemented for a highway
Different number of lanes, 2, 3, and 4 lanes
Different vehicles densities
Single-hop and two-hop clusters
▫ Evaluation metrics:
Reliability of safety messages
Direct safety/update messages
Indirect safety messages
Throughput of non-safety messages
47. Outline
• Background
• Related Work
• Thesis Statement
• TC-MAC
• Evaluation
• P2P File Sharing using TC-MAC
• Conclusion
• Future Work
47
04/03/2013
48. Application
P2P File Sharing Using TC-MAC
04/03/2013
48
• Large-scale file sharing between two vehicles
• Using their slots on the SCHs
• Using un-used slots on the SCHs
▫ Needs CH permission
• Single-hop cluster
49. Application
Example
04/03/2013
49
• Assume vehicle A with local ID=4 wants to share a 4
MB MP3 file with vehicle B with local ID=15
▫ A will make the handshake with B
▫ A will request time slots on the SCHs from the CH
50. Application
Example
04/03/2013
50
• To ensure that vehicles A and B are still receiving
update messages from other vehicles nearby during
the transmission of the shared file
▫ Switching on the SCH is required
54. Conclusion
• TC-MAC performs better than WAVE
▫ Collision free
▫ Higher reliability of safety messages
▫ High throughput of non—safety messages
▫ Support high densities
▫ Support topology changes, through the local IDs
• CH election algorithm:
▫ Fewer CH head changes compared to other
algorithms
04/03/2013
54
55. My Contributions
• Summary of existing MAC protocols for VANETs
▫ "MAC Protocols for VANETs", in Mobile Ad Hoc Networking, Cutting Edge
Directions, 2nd ed., 2013.
• A multi-channel cluster-based TDMA MAC protocol to
coordinate intra-cluster communications (TC-MAC)
▫ [IEEE VTP, 2012], [MP2P, 2013]
• A CH election and cluster formation algorithm based on the
traffic flow and a cluster maintenance algorithm.
▫ [ON-MOVE, 2010]
• A multi-channel cluster-based CDMA/TDMA hybrid MAC
protocol to coordinate inter-cluster communications
▫ [IEEE Transactions on Intelligent Transportation Systems, in preparation]
04/03/2013
55
56. Future Work
• Further Analysis:
▫ The effect of guard intervals
▫ Three-hop clusters
▫ Different data rates
• Design a numbering scheme for cluster members
▫ Missed update messages
• Enhance the utilization on the SCHs
▫ By using the un-used slots on the SCHs.
• Speed-based clustering
▫ Highways with different speed for each lane
• CDMA/TDMA evaluation using simulation
04/03/2013
56
57. Publications
• Mohammad Almalag, Michele C. Weigle, Stephan Olariu, and Samy El-Tawab, Peer-
to-Peer File Sharing in VANETs Using TC-MAC, Proceedings of the
International Workshop on Mobile Peer-to-Peer Computing (MP2P) San Diego, CA,
March 2013.
• Mohammad Almalag, Stephan Olariu, and Michele C. Weigle, TDMA Cluster-
based MAC for VANETs (TC-MAC), Proceedings of the IEEE Workshop on
VANETs From Theory to Practice (VTP). San Francisco, CA, June 2012.
• Mohammad S. Almalag and Michele C. Weigle. Using Traffic Flow for Cluster
Formation in Vehicular Ad-hoc Networks. Proceedings of the Workshop On
User Mobility and Vehicular Networks (ON-MOVE), Denver, CO, October 2010, pp.
631-636.
• Book Chapter: Mohammad Almalag, Stephan Olariu, and Michele C. Weigle. MAC
Protocols for VANETs. In S. Basagni, M. Conti. S. Giordano, I. Stojmenovic, eds.,
editors, Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd Edition. Wiley-
IEEE Press, March 2013.
• Book Chapter: Mohammad S. Almalag. Safety-related vehicular applications.
In Stephan Olariu and Michele C. Weigle, editors, Vehicular Networks From Theory
to Practice. Chap- man & Hall/CRC, 2009.ACM (Association for Computing
Machinery).
04/03/2013
57
This question was the starting point of research. The answer was NO Then I started to think, how can I make the answer to be YES?
Vehicular Ad-hoc Networks (VANETs) are important component of Intelligent Transportation Systems (ITS). VANETs enable the exchange of messages between vehicles and between vehicles and infrastructure, as shown in the figure. Such communications aim to: Increase safety on the road Improve transportation efficiency And provide comfort to drivers and passengers.
VANET is useful for a wide variety of applications, including both safety applications and non-safety applications [24]. Safety apps: Talk about EEBL as an example. If there is a truck in front of you that is blocking the view of the traffic ahead. And if someone used the break, the truck will block the tail lights, which will make the 1 sec not enough to react!!!! Non-safety apps: Talk about if you are traveling to Cali and you have a child that wants to watch a movie, how you can download it in the car.
-In the US, VANETs use 75 MHz of spectrum specially allocated by the U.S. Federal Communications Commission for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure communication (V2I) using Dedicated Short Range Communication (DSRC) technology [19]. The spectrum band is divided into seven channels: Channel 178 is the control channel (used for safety/update messages) The other SIX channels are service channels. (to support non-safety messages) WAVE The IEEE has developed the 1609 family of standards for Wireless Access in Vehicular Environments (WAVE) In WAVE, the IEEE 1609.4 standard operates on top of IEEE 802.11p in the MAC layer. Which is Based on CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) mechanism IEEE 1609.4 focuses on multichannel operations of a DSRC radio. It introduces a Sync Interval
- scalability is the ability to handle the addition of nodes or objects without suffering a noticeable loss in performance or increase in administrative complexity. 1- Due to the shared wireless channel with a CSMA/CA medium access scheme, the limited bandwidth is further decreased by poor channel utilization. Explain the hidden terminal problem
Safety messages need to be sent every 100 msec. - Why? -> This desire came from the allowable latency requirements of Life-Critical safety applications. -> note that what Wang et al. did was -- to enforce 90% and 95% reliability of safety messages, they changed the amount of time that non-safety apps can send during the 100ms interval. In high density, CCH interval will be higher than the SCH interval. So, non-safety mesg will be almost stopped. Traffic density: Low = 40 Medium = 80 High = 160
(JUST SAY ACRONYMS) The issues of MAC protocols for WAVE, as described above, led researchers in developing new MAC protocols for VANETs. In general, MAC protocols can be classified into three different categories: channel partitioning: channel partitioning is done using the following methods: Time Division Multiple Access (TDMA), Frequency-Division Multiple Access (FDMA) and Code-Division Multiple Access (CDMA). These protocols are based on sharing the channel efficiently at high uniform load. The main advantages of protocols developed under this category are reducing interference between nodes and providing fairness. However, they add allocation complexity and suffer from inefficient channel utilization at low loads. random access: also known as contention based protocols, are based on the notion of CSMA. The goal of MAC protocols is to increase throughput, so protocols under this category aim to keep packet collisions to a minimum. The advantage of random access protocols is that they are not sensitive to underlying mobility and topology changes. Also, CSMA protocols are efficient in low load scenarios. However, in networks such as VANET, the hidden terminal problem and exposed terminals affect the system performance. taking turns: use either polling (master-slave) or token ring techniques. Such techniques provide fairness by giving each node a turn to transmit. They also provide a real time bandwidth allocation.
VeSOMAC: a MAC protocol for inter-vehicular wireless networking using DSRC They designed a self-configuring TDMA slot reservation protocol capable of inter-vehicle message delivery with short and deterministic delay bounds. To achieve the shortest delay, vehicles determine their TDMA time slot based on their location and movement on the road. the TDMA slot assignment is designed to be in the same sequential order with respect to the vehicles physical location. Dis. Adv: VeSOMAC does not explain the communication between vehicles and RSUs. If the message is sent from tail to head, it will need a time frame for each hop VeMAC: TDMA two transceivers: One for CCH: safety messages and control messages for slot assignment. One for SCHs. VeMAC is designed based on having one control channel and multiple service channels in the network. Vehicles in both directions and RSUs are assigned to time slots in the same TDMA time frame. vehicles are said to be either travelling in the right (R) or left (L) direction. The time frame in VeMAC is divided into three different slots sets, L, R, and F. - To avoid the hidden terminal problem: each vehicle in VeMAC includes in the header on the CCH: the time slots used by the vehicle on the SCH the time slot used by each neighboring vehicle on the CCH the time slots used by each neighboring vehicle on the SCH the position and the current direction of the vehicle Overhead: Before accessing the CCH, vehicles has to check for the ones that are not used by other vehicles 2-hops away. This information is provided by other vehicles nearby. PP-CSMA: based on a priority scheme in CSMA using different backoff time spacing prioritization scheme as a combination of: Closeness of the transmitting vehicle to the receiving vehicle the message type Besides the priority scheme, a polling scheme: Each vehicle maintains a polling table that holds information about other vehicles positions. Dis. Adv: Did mention broadcasting MCTRP : More than one ring These rings are formed according to the velocity of vehicles and the road conditions. If a vehicle has an emergency message to be sent, it generates a tone, which is out of the frequency band used for data transmission. If the vehicle is in the receivers polling table, the receiver will clear for the sender to transmit the cd csdc
In this case, we guarantee that every vehicle in the cluster sends one update/safety message every 100 msec to meet the safety message requirements. What is accuracy of GPS time sync? Typical accuracies range from better than 100 nanoseconds to a few milliseconds depending on the synchronization protocol
Once the cluster is formed: The CH will assign local IDs to all cluster members. Then, the CH will send a table of the assigned local IDs to all cluster members
Once the cluster members receive their local IDs, they will be using them to access to the channel to send/receive safety/update and non-safety messages. Notice that the Integer Division Theorem guarantees that if i ≠ j then either:
Our goal is to design lightweight communication protocols that avoid, to the largest extent possible, the involvement of the CH in setting up connections between vehicles. The CH will also use the un-used mini-slots to rebroadcast safety messages. Remind that all vehicles in cluster within range of each other.
-
you need to add an example after this slide (before moving on to cluster). Say you have two vehicles that need to communicate while sending their update messages. How does this work? Here you could explain the issue with missing update messages if their SCH is the same slot as others' CCH. You also should explain that the CH will rebroadcast update messages during unused slots. It's never mentioned except in the evaluation, but it's an important part of the protocol.
The CH will be selected based on the flow of the majority of traffic. If 2 CHs candidates have the same CHL, the one with the lowest ID will be the CH
A Clusterhead leaving the cluster A new vehicle joining the cluster A cluster member leaving the cluster Two clusters get in range of each other A multi-hop cluster shrinks to a one-hop cluster
We modified TC-MAC to overcome the inter-cluster communications challenge. The modification I made is using CDMA combined with TC-MAC for inter-cluster communications. With the use of the CDMA assigned code and TC-MAC inside the cluster, intra-cluster collisions should not happen. Also, this will support broadcast inside the cluster without the risk of the interference with other vehicles from other clusters. Code Assignment protocol is used to assign a CDMA code to the cluster
Code Assignment protocol is used to assign a CDMA code to the cluster 14 codes CDMA/TCMAC considers vehicles in opposite directions, as well as opposite highway.
The Recovery Protocol works when a vehicle in a cluster detects another vehicle from another cluster using the same CDMA code When the gap between the two clusters is less than 300 m, at least one vehicle from each cluster will detect the present of the other cluster, vehicles X and Y. The vehicle for the approaching cluster will inform its CH The CH will pick another CODE
the GWs of both clusters need to get engaged in the process. the GWs of both clusters need to get engaged in the process. Let us assume that GW_tail of cluster A is sending and GW_head of cluster B At time t : GW_ tail of cluster A will send an advertisement on the mini-slot 0 on the CCH using CDMA code Code 1 . This advertisement will include the cluster size of A and the CDMA code used by cluster A (3, and Code 2 ). GWhead of cluster B will receive the advertisement from GWtail of cluster A. Then, it will pass the advertisement to the CH of B during its own time in cluster B using CDMA code Code 3. Note, this process could be done within 100 msec, before GWhead of cluster B sends back its own advertisement acknowledgement to GWtail of cluster A on the CCH. At time t +100 msec : GW head of cluster B will send an advertisement-acknowledgement to G Wtail of cluster A . Beside its cluster’s CDMA code and size, GW head of cluster B indicates that it has received the previous advertisement from GW tail of cluster A , and in the process of assigning a local ID in cluster B to GW tail of cluster A . The GWtail of cluster A will receive the advertisement-acknowledgement from GWhead of cluster B, and then pass its own CH. For the next transmission cycle, GWtail of cluster A should listen to the GWhead of cluster B on CCH during mini-slot 0 to get its own local ID in cluster B. At time t + 200 msec: By this time, GWhead of cluster B has already received from the CH of cluster B the local ID assigned to GWtail of cluster A. GWhead of cluster B sends the local ID to GWtail of cluster A. By the end of this cycle, GWtail of cluster A should receive the local ID of GWhead of cluster B in cluster A, and it can be sent to GWhead of cluster B during its own time slot in cluster B. After finishing the setup for the inter-cluster communications, vehicles GWtail of cluster A and GWhead of cluster B will be treated as cluster members of both clusters A and B.
I ran simulations using ns-3 network simulator [53], which is a follow-on to the popular ns-2 simulator. For VANET, I used modules [which is developed by Dr Arbabi and Weigle from our research lab] that added well-known traffic mobility models, the Intelligent Driver Model (IDM) [55] and the MOBIL lane change model [56]. The goal was to create a vehicular network on highways with different number of lanes and different number of vehicles.
Make sure to say that my algorithm is the traffic flow
Make sure to say that my algorithm is the traffic flow
Based on the network setting we have, The slots sizes are
What is Communication Density? Communication Density is used to measure the channel load in vehicular communications. This is done by calculating the number of carrier sensible events per unit of time. In our evaluation, the CD is the number of messages per second.
This aims to develop a P2P file sharing application using TC-MAC to improve the file downloading time between neighbouring vehicles.
This aims to develop a P2P file sharing application using TC-MAC to improve the file downloading time between neighbouring vehicles.
the granted time slots on the SCHs in the first half of the TDMA frame, and switch to the CCH during the second half of the TDMA frame. In the following TDMA frame, vehicles i and j will keep listening to the CCH, and then switch to the granted time slots on the SCHs in the second half of the TDMA frame. This process will continue until the file transmission is completed, or interrupted by the CH due to changes in the availability of the unused time slots