A Proposal to Analyse the Advantage of Disseminating Data on Beacons in VANETs



Similar documents
Performance Evaluation of the IEEE p WAVE Communication Standard

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Intelligent Transportation System for Vehicular Ad-Hoc Networks

CSMA/CA. Information Networks p. 1

Performance Analysis of the IEEE Wireless LAN Standard 1

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Energy Efficiency of Load Balancing in MANET Routing Protocols

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

IEEE DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

SBSCET, Firozpur (Punjab), India

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Performance Evaluation of Wired and Wireless Local Area Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Security in Ad Hoc Network

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

... neither PCF nor CA used in practice

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Adaptive DCF of MAC for VoIP services using IEEE networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Intelligent transportation systems: Past, present and look to future by using Grid technology

Algorithms for Interference Sensing in Optical CDMA Networks

A Message Propagation Model for Hybrid Vehicular Communication Protocols

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

Monitoring Free Flow Traffic using Vehicular Networks

Voice Service Support over Cognitive Radio Networks

Influence of Load Balancing on Quality of Real Time Data Transmission*

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

The Optimal Methods of IVC Routing Protocol for VANET

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Low-rate TCP-targeted Denial of Service Attack Defense

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Non-beaconing ZigBee Network Implementation and Performance Study

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Towards Efficient Routing in Vehicular Ad Hoc Networks

To Study the Various Attacks and Protocols in MANET

Dynamic Source Routing in Ad Hoc Wireless Networks

ReViV: Selective Rebroadcast Mechanism for Video

IEEE Ad Hoc Networks: Performance Measurements

An Experimental Performance Analysis of MAC Multicast in b Networks for VoIP Traffic

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Security Threats in Mobile Ad Hoc Networks

A Neighborhood Awareness Method for Handoff Assistance in Wireless Networks

EPL 657 Wireless Networks

Split TCP for Mobile Ad Hoc Networks

MAC Algorithms in Wireless Networks

Road-Based Routing Protocol for Vanet Using Sumo and Move

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

TCP in Wireless Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Figure 1. The Example of ZigBee AODV Algorithm

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

A Survey: High Speed TCP Variants in Wireless Networks

Research Projects in the Mobile Computing and Networking (MCN) Lab

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Location Information Services in Mobile Ad Hoc Networks

Internet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Estimation of Interference in Wi-Fi Networks

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

ECE/CS 372 introduction to computer networks. Lecture 13

A TCP-like Adaptive Contention Window Scheme for WLAN

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

Securing MANET Using Diffie Hellman Digital Signature Scheme

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Flexible mobility management strategy in cellular networks

Transport Layer Protocols

Transcription:

A Proposal to Analyse the Advantage of Disseminating Data on Beacons in VANETs C. Blommendaal University of Twente P.O. Box 217, 7500AE Enschede The Netherlands c.blommendaal@student.utwente.nl ABSTRACT Vehicular Ad Hoc Networks (VANETs) are an extreme form of mobile ad-hoc networks (MANETs) and can be considered as one of the enabling technologies for Intelligent Transportation Systems (ITS). With the use of VANETs efficiency applications such as cooperative adaptive cruise control and safety applications such as an emergency braking system are designed. These applications use data provided by surrounding cars to create a Cooperative Awareness (CA). This CA is created by updates periodically sent by every car containing status information and details regarding throttle and break. This process is called beaconing. However due to the broad scale of applications capacity problems raise ahead. In this paper we focus on designing an experiment in which less time critical information is piggybacked onto scheduled beacons. This seems to be a way to relieve the amount of stress on the medium. Keywords VANETs, vehicular networks, piggybacking, beaconing, data dissemination 1. INTRODUCTION Since traffic jams cost Europe 50 billion per year and 40.000 people die every year in traffic accidents [5] the time has come to make traffic more efficient and safe. To achieve these goals Intelligent Transportation Systems (ITS) can be used. By putting technology in a car that has awareness of it s surroundings the car will be able to respond faster than a human will ever can. These intelligent transportation systems are designed to make transportation more efficient, more reliable and safer. To achieve these goals ITS rely heavily on communication between vehicles. Together these vehicles form so-called Vehicular Ad Hoc Networks (VANETs), a special kind of Mobile Ad Hoc Networks (MANETs). The network topology of VANETs differs from more familiar networks such as Local Area Networks (LAN) and Wireless Local Area Networks (WLAN) in terms of mobility and coordination. Within VANETs nodes are highly mobile and there is no Access Point with the authority to grant access, assign IP-addresses and control bandwidth [8]. This open structure allows the nodes to generate the Cooperative Awareness needed by the traffic applications. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 16 th Twente Student Conference on IT, January 27 st, 2012, Enschede, The Netherlands. Copyright 2012, University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science. Looking at the communication requirements of these traffic applications we can distinguish two kinds of applications: the ones that are relying on the rapid transmission of data and the more delay tolerant kinds. This first type is usually used in safety applications such as automatic braking or sending a distress signal to all the surrounding cars. This second type of applications operates on a larger geographical scale and has as goal to make sure that the flow of cars trough the highway is as efficient as possible. Due to the informational characteristics of those applications the time between the moment of sending and receiving is becoming less relevant as long as the information actually reaches its destination within a given timeframe. Within a vehicular network all the nodes within the range of the sender will try to forward the received message as far as possible into the direction of the destination of the packet. Different strategies exist for this so called forwarding; these are discussed in section 4. Beaconing is a communication pattern in which every car regularly sends an update to all surrounding vehicles. These updates usually contain information about the status, such as the speed of the vehicle and the amount of throttle and brake used at the moment. Surrounding cars can use this information for safety applications such as an emergency braking system. When it comes to forwarding this information piggybacking comes in play. Piggybacking is a form of multi-hop forwarding in which nodes piggyback application data on top of their beacons, i.e., they transmit the data together with the already scheduled beacons. By having multiple nodes repeat the process, the data can be routed to a specific location (georouting). Combing all of the above brings us to the following research question. In what kind of experiment can piggybacking be compared with other forwarding protocols? Hereby arising question would be: what other forwarding strategies exist? And how can the effect of piggybacking be measured in an experimental set-up? Most likely will piggybacking application data onto beacons lead to a lower busy time on the medium in comparison to the separate dissemination of data. In this last scenario the node has to access the medium an extra time to send the application data, doubling the chance of not being able to get on the medium and waiting another back-off period. By the use of piggybacking all the data (the application data plus the beacon data) is send once the node has access to the medium. Furthermore this method saves on the overhead of packets headers. This saving will be discussed in section 4. The goal of this paper is to design an experiment in which the impact on the busy time of the network can be measured when piggybacking application data onto scheduled beacons,

compared to the situation in which application data is forwarded independently of the beaconing process. The outline of this paper is as follows. In section two related work will be discussed and the actual problem is stated in section three. In the subsequent section different forwarding protocols are shown and in section five there is a comparison between these protocols. Section six covers the experimental set-up and finally a conclusion is being drawn and future work is addressed in section seven. 2. RELATED WORK In this section we will discuss some of the related work in the vehicular networking sector. Vehicular networking is based on the 802.11p Wireless Access in Vehicular Environments (WAVE) standard [22], which is an enhancement of the more familiar 802.11, or better known as the Wi-Fi, standard. Lots and lots of methods have been developed to optimize applications using the 802.11p protocol (i.e. Adaptive Cruise Control [2]). Disturbing factors such as high relative speed between the sender and receiver can be countered by the proper usage of sending priorities [1]. Furthermore there is lot of discussion about security in 802.11p applications. In what way can information be exchanged without being compromised by address spoofing and man-inthe-middle attacks? After the 802.11-2007 revision it is fair to say that the 802.11 protocol is pretty safe when the TKIP and the CCMP protocols are being used. [8]. Despite all the success stories [2], [6] beaconing is still a quite new field of science. In crowded situations it s not always performing as desired [10]. Because the intention of VANETs is to provide additional safety many say that there should be a separate channel for safety messages only. This to reduce the waiting times involved when sending (emergency) messages. As said earlier, almost all the VANET applications require some kind of CA to work properly. Creating this CA for each single node puts tremendous pressure on the network. Due to the rapidly changing network topology [6] the beaconing rate must be high (=>10Hz) to create an adequate awareness. Alternatives for creating this awareness exists i.e. a Shared Context Aware system [14]. In such a system a link is established between V2V and V2I network. By putting the knowledge of the current situation in the off-road infrastructure the number of beacons required can be reduced massively. However, regardless of its efficiency, this a costly alternative compared to V2V VANETS. Other problem is that VANETs are not able to approach the designed speed. A node can never be aware of the precise network state at that particular moment. There will always be capacity loss in idle time and collisions. These collisions may be a result of the hidden node problem, cause VANETs don t use the Ready To Send/Clear To Send extension. [4] By not being able to sense the exact network state congestion is unavoidable in VANETs. When the medium is congested the actual throughput rate lies above the designed throughput rate. In this state delays increase significantly while the throughput gradually decreases. To avoid this many congestion avoidance protocols have been developed. Problem is that most of these protocols just tackle one of the many problems causing the network to congest. Studies [4], [6] show that these protocols [17] don t work good enough. The chances of a safety message is lost in a crowded situation is still enormous (>0.8) [17]. This rate is way to high for a system that has originally been designed to improve road safety. Despite the high packet loss ratings messages still reach their destinations relatively fast (within 55ms over 100nodes/1km) [17]. But since the expectation is that more and more applications will become available in the future the network load has to be reduced to prevent the medium from being congested even more in the future. 3. PROBLEM STATEMENT In this section we clearly define our problem statement. Where other papers focus on eliminating data redundancy on the medium; our focus goes to the combining of data, the so-called piggybacking. We want to design an experiment in which the effect of piggybacking on the medium can be measured. This experiment will not actually be carried out in this paper but after carrying out our designed experiment the following research question can be answered: Is piggybacking application data onto scheduled beacons a way to reduce the busy time on a VANET compared to other forwarding techniques? To make the idea of piggybacking more clear see the functional analysis below (Fig. 1). White squares represent the moment when the to be sent data is generated, and the grey squares represent the moment of actual sending. Note that with separated dissemination these moments are identical, given the fact that the medium is ready at the moment and one DIFS has passed. Figure 1, functional analysis between straight on forwarding and piggybacking Putting this question to test can be done be carrying out a large number of experiments, these are discussed in section 6. The piggybacking forwarding technique has to be tested against other protocols to determine which leads to the lowest busy time on the network. These other protocols will be introduced throughout section 4. To draw conclusions out of these experiments an average has to be taken from large sets of simulations. This because there is some randomness involved that we want to eliminate. This randomness will be explained in the next section. A set-up for such an experiment will be discussed in section 6. 4. FORWARDING PROTOCOLS In this section the piggybacking protocol will be explained further and some other protocols, that forward data in another way, will be introduced. All of these protocols use their GPS signal to determine their relative position to the receiver. In this way the node can sense whether its closer to the receiver than the node that just sent the packet to him. When there is no node available to transmit the message to then the store-carryforward mechanism [12] is used. Basically this means that the node will carry the message with him until another node that is closer to the destination becomes in range. Then the message is

forwarded to the node lying closer to the destination. This destination can either be a node or an area. This last case is called geographical routing. 4.1 PIGGYBACKED FORWARDING The first to be introduced forwarding protocol is the one that uses piggybacking. If an efficiency message has to be forwarded using this protocol it waits until the next beacon kicks in. In this case the to be send message is piggybacked onto the beacon and sent along. This means that the time till transmission will be something between zero and the beaconing frequency f -1 (see Fig. 2). the first expiring timer (hereafter noted as F 1 ) will attempt to retransmit this message. If this retransmission is successful all nodes behind F 1 will discard their time and remove the message. This because the message is now closer to the destination than they are. The responsibility to propagate the message further into the direction of the destination isn t theirs anymore. In contradiction to the nodes that lie behind F 1 the nodes lying before F 1 will not discard the message. This because there is no confirmation that the message has been propagated further along the road. So in the event of a lost message, the nodes lying after F 1 will still have a timer running. If they don t receive a retransmission by a certain F 2 they will retransmit the message to prevent it from dying out. After all, assuming that there has been no loss the average number of hops will be the distance to be travelled divided by half of the transmission range. This division by 2 is because of the random nature of the timers. Further propagation of the message will in some cases be handled be a node lying close to the sender, other times by a node lying further from the sender. Figure 2, graphical overview of timing within piggybacking Because of the randomness involved in this forwarding method it is necessary to conduct a large number of experiments to obtain averages. Then the formula to calculate the average expected number of hops required to reach the destination is: In which: nhops = d 0, 5R = 2d R Equation 1 n hops = the amount of hops required to propagate a message over a certain distance d d = the distance between sender and receiver R = the transmission radius (equal for each node) 4.2 STRAIGHT ON FORWARDING This second protocol will just straight on forward information without the use of piggybacking. The message with application data will be broadcasted between beacons. A node within range of the sender will receive the message and start a countdown timer. The value of this timer will be a random number between the smallest time slot and the time between beacons (f -1 ). The timer interval is set to these values to make a good comparison between this method and the piggyback method. Using two different timers would result in an unfair comparison. Because beacons can be considered asynchronous this will most likely cause all nodes to pick a different moment to retransmit the received message. Note that it s still possible that they pick the same moment due to the random nature of both the timer and the next beaconing moment. Assume node S sends a message M over a distance d to node R in a certain direction. All nodes that receive within the range of S who successfully receive M will start a timer. The node with 4.3 DISTANCE BASED ROUTING Distance based routing is one of the more intelligent forwarding protocols. It uses the relative position of a node towards the sender to adjust forwarding chances. In this section we will illustrate this principle with an example. Consider the image below (Fig. 3) with 9 nodes. The eclipse around n 2 illustrates the transmission range of that node. In this case n 2 (S) wants to send a message to a certain area (D). S will piggyback the message onto the next scheduled beacon and transmit it. Figure 3, example flow of a piggybacked message (1/2) Nodes n 1, n 3, n 4 and n 5 will receive this beacon. Node n 1 will sense that he is further away from D than S is so will not take any action. This sensing is done with the cars GPS signal. In absence of this signal, i.e. in tunnels, the Received Signal Strength (RSS) of the received packet can be used to determine whether to forward the packet or not as discussed in [19]. Nodes n 3, n 4 and n 5 are all candidates for forwarding the received message. Ideal would be if n 5 would forward the message since this node is the closest to the destination D. This can be achieved by using a 1-persistent protocol in which every node forwards every incoming packet with a probability of 1 [18]. In other words, every incoming packet is being forwarded. In this way large packet penetration can be achieved; drawback in this method is that a lot of redundancy comes in play and that this method floods the network [19]. Therefore 1-persistence is not the way to go in this scenario. A promising method is distance based routing as introduced in [19]. In this method the chance of further propagation along the line depends on the distance between the sender and the receiver. A higher distance leads to a higher probability and vice versa.

Figure 4, example flow of a piggybacked message (2/3) In Fig. 4 the forwarding principle is demonstrated. Either, the message flow is unpredictable. This because a higher probability of retransmission doesn t mean that a node actually will forward the message. Therefore many paths are possible. Fig. 5 shows one of the possible paths. Figure 5, example flow of a piggybacked message (3/3) 4.4 SLOTTED ROUTING In the previous stated protocols a node is allowed to start transmission as soon as the channel is idle and stays idle for one IDFS. This is a quite inefficient way of disseminating data cause the chances of collision are pretty high. To reduce these chances of collision an old principle is being used: slotting. Slotting has been used in one of the first wireless packet networks ALOHAnet. Because pure ALOHAnet had a very low effective throughput rate (1/e) if every node tried to send a message once in a frame time. In the figure above (Fig. 7) is an overview on how slotting works. All nodes (n 1, n 2, n 3 ) are only allowed to start transmitting at the beginning of a time slot. Note that there still is a chance that two nodes decide to start transmitting in the same timeslot (slot 2) and cause a collision and data loss. Performance studies [7] have shown that slotting has a remarkable influence on the performance of the channel. By only having the possible to send data in a certain slot the chances of two nodes transmitting at the same time decrease. Taking this principle a step further has been done in [3]. By selecting microslots within the already defined slots chances of collision decrease further. 5. COMPARISON To make a fair comparison between two forwarding methods it is necessary that both methods use roughly the same amount of hops and that all other parameters are identical in both test setups. This to ensure that these won t influence the results. Therefore we compare the piggybacking way of forwarding with the straight on forwarding protocol first. This because of the same kind of randomness they share and therefore they will on average use the same amount of hops. Therefore they can be equally compared to measure the impact on the medium. By analyzing both protocols it is clear that the number of hops will be roughly the same in both cases. The time that it will take for a message to reach the destination relies heavily on the random nature of the involved retransmissions in both schemes. Table 1: Differences between piggybacking protocol and the straight on forwarding protocol as discussed in section 5.1 Method Time to transmission #attempts Straight on forwarding random(0,bf) 2 piggyback random(0,bf) 1 Figure 6: Collisions in separated dissemination As stated earlier, allowing nodes to send after one idle DIFS can be risky. Sure there is the CSMA/CA that takes care of transmissions being more distributed but eventually, when n increases, nodes will be waiting over and over to transmit. In slotted schemes a node is only allowed to send data at the beginning of a timeslot. The duration of these slots is a given amount of slot times (the smallest measurable value in a network) and is implemented in the protocol. So every node can calculate the timeslot with the use of it s own internal timer. In table 1 differences between the two methods are being shown given the fact that the number of requires hops is equal. The biggest difference is the (minimal) number of attempts required to transmit. By the usage of piggybacking the number of required attempts on the network will be identical to the amount of beacons sent. Figure 8, separated dissemination of data compared with the piggybacked alternative Figure 7: Slotted Routing Note that there is also a difference in the amount of headers required to send the data. In the regular way of disseminating data two blocks are required where in the piggybacked case on one is needed. When transmitting data in a VANET the chances of collisions are pretty high [2], especially when the inter node distance is

low. Therefore reducing the number of attempts required is valuable thing. Since reducing collisions on the network will lead to a lower busy time it is likely that reducing the number of attempts made on the network will also lead to a lower busy time in comparison to the straight on forwarding protocol. When comparing this straight on forwarding protocol with the piggybacking method it its obvious that, in a scenario where both methods require an equal amount of hops, the piggyback method saves on transmission attempts and headers. Maximum header size is 32 bytes. Compared to the maximum payload on a MAC packet (4,095 bytes) it is only under the 1% in size. But in practice most packets only contain around the 1,500 bytes. [15] This means more than 2 percent saving on packet overhead per piggyback. Of course the piggybacking of multiple packets onto one beacon is possible and the savings on overhead will just continue to rise. Certainly if we scale up to a traffic jam over 4 lanes with 100 cars/km/lane. 6. EXPERIMENTAL SET-UP In this Section we describe our experimental set-up to evaluate the performance of piggybacking. The goal is to conduct an experiment in which the effect of piggybacking will be examined. Idea is to run at least two simulations on the same scenario, one simulation will use the straight on data dissemination strategy (no piggybacking involved) and the other one uses the piggyback strategy. The only difference between the two should only be the forwarding strategy. All other parameters should be identical. The to be simulated network will be a V2V VANET. Because communication between nodes happens on a much smaller timescale than the physical movement of nodes the nodes can be considered to be static. The broadcast range of one node can differ very much due to different circumstances. Killat et al have developed an empirical model for broadcast range using a Nakagami-m distribution [9] because deterministic models use a fixed broadcast range. In practice the probability of successful transmission decreases gradually. Studies [16] show that such a model can be used to model ideal circumstances on highways. A widely available cross-platform software tool for simulations in general is OMNET++ [13]. Combining this with the MiXiM plugin [11] that is especially designed for simulating vehicular networks gives a solid base to run the simulations on. Expectations in such an experiment are that without the use of piggybacking the data will be faster at the destination. This because the to be forwarded message will not have to wait for the next scheduled beacon to be piggybacked on. With piggybacking, the data will travel slower but the impact on the medium will probably be reduced. However there are a lot of parameters involved such an experiment we can define some parameter ranges prior to the experiment. The most important parameters are (derived from [2]): Number of nodes (n) The number of nodes should be varied throughout the experiment. This can be done be altering the number of lanes l, or changing the vehicles/km/lane ρ. Beacon rate (λ g ) Small changes are likely to have a huge impact on the busy time of the medium. The beacon rate can be altered, but safety applications may malfunction in such a case. Distance between sender and receiver A message has to be sent from a certain node to an area over a distance large enough (>1000m) that multiple hops are required to reach the destination. Distance should be varied throughout the experiment. As previously stated, traffic can be considered static in such environments due to the small timescale on which the transmissions take place. Most likely will piggybacking lead to a lower network load if the car density has a certain value. Further details about parameters (such as transmission power and time slots) can be found in [2] and in the 802.11p standard [18]. 6.1 MEASURING Lots of methods are available to measure the amount of stress on the medium, all using other parameter settings. A few basic parameters that can be used are: Busy Time Percentage of how much time the medium is busy Number of hops The amount of hops needed in a certain case to propagate the message Number of Collisions The amount of occurred collisions while transmitting the message from sender to the receiving area Travel time The time it takes for a message to travel from sender to receiving area. All of the parameters above serve different needs. For our purpose the busy time will be the most important parameters since we are examining the impact on the whole network. This busy time is easy to measure. Just by dividing the time that the medium is busy by the total time observed this busy time ratio is obtained. 7. CONLUSION In this paper we have designed an experiment in which the impact on the busy time of the network can be measured when piggybacking application data onto scheduled beacons, compared to the situation in which application data is forwarded independently of the beaconing process. We also gave some insight in which parameters are important and how they should be used in the experiment. Based on the theory on the 802.11p protocol the assumption raises that piggybacking application data onto scheduled beacons will lead to less stress on the medium in certain situations. It s likely that these situations involve a medium traffic density. To make sure that this assumption is right the designed experiment should be carried out. When it comes to measuring the impact of piggybacking on the medium multiple possibilities exist, each focusing on a different aspect. When it comes to measuring the overall stress level on the network, the network load approach seems most suitable.

7.1 FUTURE WORK Most important is to actually carry out the experiment as discussed in this paper. In this way it is possible to determine whether piggybacking is able to reduce the busy time on the medium. It is likely that when comparing the piggybacking forwarding method with the straight on forwarding method introduced earlier, piggybacking looks more favourable. Therefore should piggybacking also be compared with more intelligent protocols such as distance-based vector routing, or (micro) slotting as introduced in section 4. 8. REFERENCES [1] Alasmary, W.; Zhuang, W.; Mobility impact in IEEE 802.11p infrastructureless vehicular networks in Ad Hoc Networks. Volume 10, Issue 2, March 2012, Pages 222-230 [2] Eenennaam, Klein Wolterink, Karagiannis, Heijenk. Exploring the Solution Space of Beaconing in VANETs in Vehicular Networking Conference (VNC), 2009 IEEE, Pages 1-8, 28-30 Oct 2009. [3] Eenennaam, van E.M.; Heijenk, G.J. and Karagiannis, G. and van Arem, B. (2011) Over-the-Horizon Awareness for Advanced Driver Assistance Systems: the TrafficFilter and microslotted 1-Persistence Flooding. Technical Report TR-CTIT-11-21, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625. [4] Eichler, S.;, "Performance Evaluation of the IEEE 802.11p WAVE Communication Standard," Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, vol., no., pp.2199-2203, Sept. 30 2007-Oct. 3 2007 [5] European Commission. Communication on the Intelligent Car Initiative Raising awareness of ICT for smarter, safer and cleaner vehicles, COM(2006) 59 final, Brussels, Belgium, 2006. [6] Fan L.; Wang Y.;, "Routing in vehicular ad hoc networks: A survey," Vehicular Technology Magazine, IEEE, vol.2, no.2, pp.12-22, June 2007 [7] Hara, S.; Morinaga, N.;, "Throughput analysis for random access protocols in a mobile radio packet network," Global Telecommunications Conference, 1993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston. GLOBECOM '93., IEEE, vol., no., pp.113-118 vol.1, 29 Nov-2 Dec 1993 [8] "IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), vol., no., pp.c1-1184, June 12 2007 [9] Killat, M.; Hartenstein, H.; "An Empirical Model for Probability of Packet Reception in Vehicular Ad Hoc Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-12. [10] Konur, S.; Fisher, M.;, "Formal Analysis of a VANET Congestion Control Protocol through Probabilistic Verification," Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd, vol., no., pp.1-5, 15-18 May 2011 [11] Mixim. [Online]. Available: http://mixim.sourceforge.net/ [12] Oka, H.; Higaki, H.;, "Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET)," New Technologies, Mobility and Security, 2008. NTMS '08., vol., no., pp.1-5, 5-7 Nov. 2008 [13] Omnet++ network simulation framework. [Online]. Available: http://www.omnetpp.org/ [14] Santa, J.; Gomez-Skarmeta, A.F.;, "Sharing Context- Aware Road and Safety Information," Pervasive Computing, IEEE, vol.8, no.3, pp.58-65, July-Sept. 2009 [15] RFC 791, Information Sciences Institute, University of California, http://www.ietf.org/rfc/rfc791.txt [16] Taliwal, V.;Jiang D., Mangold H., Chen C., and Sengupta R., Empirical determination of channel characteristics for DSRC vehicle-to-vehicle communication, in Proceedings of the 1 st ACM International Workshop on Vehicular Ad Hoc Networks (VANET 04), p. 88, Philadelphia, Pa, USA, October 2004. [17] Tian, D., Wang Y., Ma,K., "Performance evaluation of beaconing in dense VANETs," Information Computing and Telecommunications (YC-ICT), 2010 IEEE Youth Conference on, vol., no., pp.114-117, 28-30 Nov. 2010 [18] Wireless access in vehicular environments, IEEE Std 802.11p-2010, pp. 1 51, 15 2010. [19] Wisitpongphan, N.; Tonguz, O.K.; Parikh, J.S.; Mudalige, P.; Bai, F.; Sadekar, V.;, "Broadcast storm mitigation techniques in vehicular ad hoc networks," Wireless Communications, IEEE, vol.14, no.6, pp.84-94, December 2007