Next Article in Journal
Automatic Multi-Camera Extrinsic Parameter Calibration Based on Pedestrian Torsors
Next Article in Special Issue
An Efficient Coded Streaming Using Clients’ Cache
Previous Article in Journal
Underactuated AUV Nonlinear Finite-Time Tracking Control Based on Command Filter and Disturbance Observer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Analytical Model for Interference Alignment in Broadcast Assisted VANETs

1
School of Computer and Information, Hefei University of Technology, Heifei 23009, China
2
Institute of Industry and Equipment Technology, Hefei University of Technology, Hefei 230009, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(22), 4988; https://doi.org/10.3390/s19224988
Submission received: 12 October 2019 / Revised: 8 November 2019 / Accepted: 12 November 2019 / Published: 15 November 2019
(This article belongs to the Special Issue Mobile and Ad Hoc Networks)

Abstract

:
Application of safety-related information interaction among vehicles has always been a research frontier in Vehicular Ad-hoc NETworks (VANETs). These messages require high real-time performance. There is a lot of research dependant on creating optimization model for communication task scheduling or routing protocols to reduce communication delay. In this paper, we analyze characteristics of safety-related information and introduce Interference Alignment (IA) technology in VANETs. To further improve routing efficiency, a data-driven assisted transmission routing and broadcast model framework for Vehicle to Vehicle(V2V) and Vehicle to Infrastructure (V2I) communication are constructed which are the basis for IA. Depending on the proposed model, we propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. Then a clustering algorithm is designed to narrow feasible solution space. Simulation results show that the approach can effectively reduce the number of time slots required and improve link use by 20% percent compared with no IA applied.

1. Introduction

The US Federal Communications Commission (FCC) allocated 75 MHz of wireless spectrum (5.850 GHz to 5.925 GHz) bandwidth to dedicated short range communications (DSRC) for intelligent transportation systems (ITS) service. According to FCC regulations, this band is further divided into seven isolated sub-channels, including one control channel and six service channels, where control channel is reserved for transmitting beacons or fundamental safety-related messages. Each vehicle periodically broadcasts traffic state information including its speed, acceleration and GPS on control channel. These types of information help vehicle interacts with surrounding vehicles timely. However, with the number of vehicles increasing, demand for communication between vehicles rises, causing congestion in communication band and decreasing communication efficiency.
Communication protocols of VANETs are mainly based on IEEE802.11 series protocols, but a large number of performance verification experiments show that competitive protocols cannot meet Quality of communication Service (QoS) requirement of VANETs [1,2]. Since safety related information should be delivered as quickly as possible, the effective method is that vehicles broadcast their safety-related information directly to surrounding vehicles, which will inevitably lead to information redundancy and flooding [3].
In the area of wireless communication networks, some research was conducted to improve channel resource use though managing interference between wireless terminals, such as Interference Alignment (IA). Simulation results in [4,5] show that in interference channel of the K-node communication network equipped with M antennas, if IA is adopted, the total degree of whole network freedom approaches K M / 2 . However, Channel State Information (CSI) of senders and receivers are required for IA application. The relative positions of vehicles are constantly changing, making it difficult to obtain CSI information.
Since the location of base station is fixed, in some studies, prediction model of CSI between vehicle with base station are constructed to estimate CSI during a certain period of time [6,7]. Once CSI information between vehicles and base station can be predicted in advance, IA can be applied to communication of V2I.
With the advent of Cognitive Radio (CR) and dynamic spectrum access technology, Spectrum Database (SD) including CSI information provided by ITS could be obtained by a user who is about to pass a road segment [8]. Depending on SD and the user’s location, CSI between the user and base station could be queried, which could meet time requirement for safety related information in a long enough period [9].
All above, in this paper, we analyze the communication flow of V2V and V2I in VANETs and construct broadcast model for IA technology. Different communication fashion is adopt for different type senders. Combined with characteristics of safety related information, an assisted transmission model is constructed to further reduce redundancy transmission and improve link use efficiency. Based on these model, we propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. In addition, a clustering algorithm is designed to narrow feasible solution space.

1.1. Literature Review

Safety related information exchange is the key to the next generation of VANETs. In VANETs, vehicle is required to exchange information quickly and reliably with others within safety radius. In order to fulfill this target, some studies have designed VANETs distributed cross-layer protocols to adjust the priority of safety related information and intervene the direction of data propagation to reduce communication delay [10]. In [11], Velmurugan et al., proposed a new algorithm works on the selective distance allocation methodology for data transmission.
As an emerging multiplexing-based interference cancellation method, IA is based on use of channel transmission features to align multiple interference streams to a specific direction at the receiving node to reduce interference. In [12], sAhn et al., proposed a new cellular network interference management method, which applied IA to cellular network. The simulation verified that IA can effectively improve communication rate. There is some research that studied a blind IA in cell network without full CSI information [13,14,15]. However, without full CSI information, the blind IA caused a large delay in direct communication and relatively large loss of effectiveness in routing.
In [16], Liang et al., proposed an intra-group IA scheme for V2V. In their research, the network is divided into two groups. One group used doppler frequency domain IA to ensure vehicles in this group are not interfered by other same group vehicles, while other groups only experience partial interference. However, because of the mobility, the vehicle cluster couldn’t keep for a long time.
In [17], Cheng et al., combined VANETs with CR called CR-VANETs protocol to solve spectrum scarcity problem. This method significantly increased spectrum use by equipping vehicles with a CR communication device to detect idle channel in DSRC. With the ability to capture and use available CR spectrum holes in space and time, vehicles were able to make full use of spectrum resources, thereby improving communication efficiency of VANETs [18,19].
In contrast to the preemptive channel exclusive method such as IEEE802.11p, i.e., in IA application, channel resources are allocated dynamically and the channel access method is time division multiple access (TDMA) [20,21]. There are a lot of researchers that apply TDMA in VANETs and prove TDMA could overcome problems of hidden and exposed terminals. Meanwhile, TDMA makes it possible to facilitate IA in VANETs. The study in [22] verifies the feasibility of TDMA in VANETs and proves that TDMA has shorter latency and higher communication efficiency than IEEE802.11p.
Most of the broadcast models are developed from a periodic single-hop communication. In [23], Kang et al., proposed a new model to calculate a single-hop survival broadcast packet probability with a forwarding mechanism. This model accounted all possible cases of contention window assignments to all the nodes simultaneously receiving a broadcast message. Without considering characteristic of safety related information, the performance would be limited by bandwidth. For piggybacking traffic information over periodic safety related messages, Abbasi et al., proposed a highly efficient and reliable multi-hop broadcasting protocol, Intelligent Forwarding Protocol (IFP) [24]. Tahmasbi-Sarvestani proposed a network-aware double-layer distance-dependent protocol for fast broadcasting of aggregated traffic information over multiple hops [25]. However, the hidden and exposed terminal problems still remained in these researches.

1.2. Goals of This Paper and Main Contributions

The main contributions of this article are as follows:
  • Depending on analyzing communication flow between base station and vehicles in VANETs, we construct V2V and V2I broadcast model. In this model, IA technology is adopted in upload transmission for V2I in VANETs.
  • Combining characteristics of safety-related information, we build a data-driven assisted transmission model to improve link reuse rate.
  • We propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. In order to solve this problem, we reform constraints in optimization problem by transforming quadratic items into multiple linear constraints, which simplify the optimization problem.
Based on this model, solution results of the optimization problem show that data-driven assisted transmission-based IA Application can effectively improve link reuse rate and reduce communication delay in VANETs.

1.3. Organization of this Paper

The remainder of this article is organized as follows: Section 1 introduces related works. Section 2 analyzes the research and communication scenario of VANETs, explains symbols in this paper and communication procedure. In Section 3, V2V & V2I broadcast model and IA model are constructed in detail. Combined with the characteristics of safety-related information, VANETs data-driven assisted transmission model is constructed and the optimization problem is proposed. Section 4 designs a clustering algorithm to pre-cut feasible solution space for optimization problem in Section 3. In Section 5, results of experiments are presented to evaluate performance of our approach. Section 6 concludes this paper.

2. System Model

In VANETs, according to the type of message sender and receiver, the communication fashions can be divided into two categories: (1). Vehicle to Vehicle (V2V), which means the sender and receiver are all vehicles; 2. Vehicle to infrastructure (V2I). In (V2I), the types of terminals include Base Station (BS), wireless access point (AP) and other infrastructure. Without loss of generality, in this paper, we use V to indicate vehicle and I as BS, AP, etc.

2.1. Research Scenario in VANETs and the Symbol System

As shown in Figure 1, the entire VANETs scheduling time can be divided into several time frames. Every frame is taken as one scheduling period containing several equal interval Time Slots (TS) based on TDMA. Each vehicle transmits data during the assigned TS. However, before the scheduling period, the base station sends the status of the entire network and TS scheduling scheme to each vehicle to avoid communication collision.
  • In this scenario, both V2V and V2I communication fashion are coexisting simultaneously.
  • In this scenario, the vehicle speed is relatively low and SD could be updated timely.
  • Due to the buildings and other architectures, CSI amongst vehicles with base station varies a lot, which should be solved first of all.
In this road section, there is one base station and several vehicles, denoted by I and V respectively in this paper as shown in Figure 2.
Symbol I V indicates base station broadcasts message to vehicle and V I indicates vehicles upload information to Base Station. Vehicle communicates with each other denoted as V V . Other symbols in this paper are listed in Table 1. To simply formulas, we use i = 1 : N to represent 1 i N , in which i is integer.

2.2. Case Study in VANETs Communication

CSI is the key data for IA technology application. In VANETs, CSI could be obtained from SD in ITS and should be updated in time. When a vehicle enters a new road, firstly, it registers itself in VANETs. If the vehicle is within communication range of base station, the registration request could be posted to base station directly. Otherwise the vehicle should turn to other vehicles for relaying the request. After registration, base station allocates idle time slot and sends SD containing CSI of this road to the new vehicle.
The detailed procedure is shown in Figure 3, which contains 4 stages. In the first stage, when vehicle A enters the range of base station from the boundary In point, it posts an access request to base station in communication 1. During this stage, the base station collects the new access request and allots idle time slot to vehicle A. During the second stage, the base station sends SD and time slot information to vehicle A in communication 2. During the third stage, vehicle A runs on this road and collects CSI with base station. At the last stage, when vehicle A reaches the boundary Out point, the latest CSI information collected by vehicle A is sent to base station in communication 3 for SD update. When a new vehicle B enters this road, it will repeat this process as vehicle A. In this way, the base station could keep the latest SD of this road.
During stage 3, vehicles broadcast their safety related information to surrounding vehicles. These information should be pre-encoded based on CSI before being broadcast if IA is adopt. After the information is encoded with pre-coded vector, the valid signals are mapped to different directions with the interference signals [4]. If the road is reasonably divided, as shown in Figure 4, the CSI in the same segment can be considered as the same value [10].
In this paper, vehicles adopts half-duplex working mode and safety-related information contains location, speed and acceleration et al., In VANETs, the base station is equipped with multiple antennas for Multiple-Input Multiple-Output (MIMO). A communication task that sending a safety related information from one vehicle to another one, is called a communication session. The fashions of communication sessions sent from different senders to receivers can be categorized as follows:
I V : For base station, it sends information to multiple vehicles simultaneously by broadcast.
V I : Since the base station is fixed, vehicles can obtain CSI from SD, thereby making it possible to implement IA MIMO communication with base station.
V V : Due to vehicle mobility, CSI between vehicles is not stable and difficult to be maintained. For this reason, broadcast is used as communication method for V2V without IA.
In addition, due to limited coverage of base station, the vehicles among communication range could communicate with base station directly. As shown in Figure 5, coverage of the communication for all vehicles cannot be achieved. Such as the vehicle 2 is out of base station’s service. For these vehicles, they should be assisted to upload information to base station.

3. Model of Broadcast Assisted Transmission Based IA Application in VANETs

In this section, we construct IA application model in VANETs. At first, V2V and V2I broadcast model is constructed as basis for IA. Then IA constraints are formulated. In order to support multi-hop, a data-driven assisted transmission model is constructed according to characteristics of safety related information.

3.1. V2V and V2I Broadcast Model

In our paper, all terminals adopt a half-duplex mode of operation to switch between receiving and transmitting state. δ T i ( t ) is the sending state of vehicle i at time slot t and δ R i ( t ) is receiving state. Then we get
0 δ T i ( t ) 1 0 δ R i ( t ) 1 , ( 1 i N , 1 t K )
δ T i ( t ) + δ R i ( t ) 1 , ( 1 i N , 1 t K )
Since all vehicles should broadcast their safety related information in one scheduling frame, which means they must make a broadcast task during. Thus, we have
t = 1 : K δ T i ( t ) 1 t = 1 : K , j = 1 : N λ i , j ( t ) 1 , ( L ( i , j ) = 1 ) , ( i S r c )
For V2V communication, IA cannot be applied, so the number of valid session and interference received by a vehicle cannot exceed the number of its antennas [8]. When a vehicle broadcasts to surrounding vehicles, number of receivers is equal to the number of vehicles in receiving state. Thus, the following equation should be met:
j = 1 : N λ i , j ( t ) j = 1 : N L ( i , j ) · δ R j ( t ) , ( δ T i ( t ) = 1 ) j = 1 : N λ i , j ( t ) = 0 , ( δ T i ( t ) = 0 )
Constraints in (4) can be further combined as (5):
j = 1 : N λ i , j t δ T i ( t ) · j = 1 : N [ L ( i , j ) · δ R j ( t ) ] j = 1 : N λ i , j t j = 1 : N [ L ( i , j ) · δ R j ( t ) ] j = 1 : N λ i , j t N a ( i ) · δ T i ( t )
Since vehicle i may receive interference from its surrounding vehicles at the same time, the intended information might not be decoded. Therefore, at the same time, the amount of vehicle data received by vehicle i cannot exceed its number of antennas, then we get
1 j N i j λ j , i ( t ) N a ( i ) , ( δ R i ( t ) = 1 ) 1 j N i j λ j , i ( t ) = 0 , ( δ R i ( t ) = 0 ) , ( i S t )
which can be combined as
1 j N i j λ j , i ( t ) δ R i ( t ) · N a ( i ) , ( i S t )
When a vehicle is in sending or silent state, and it cannot receive sessions from neighboring vehicles, then the following constraint should be met:
λ i , j ( t ) N a ( i ) · δ T i ( t ) δ T i ( t ) t = 1 : K , j = 1 : N λ i , j ( t ) , ( L ( i , j ) = 1 )
If a terminal switches to receiving mode and there is no vehicle sends message to it, it will only receive interference or nothing. Thus, we get
j = 1 : N λ i , j ( t ) j = 1 : N δ R j ( t ) δ R j ( t ) j = 1 : N λ i , j ( t ) , ( i S t , L ( i , j ) = 1 )
For a vehicle in receiving state, the number of interference a vehicle can receive is no exceed the number of its antennas. Then we get
i l i , j ( t ) δ T i ( t ) · N a ( i ) , ( j S t )
Some constraints can be set default value in advance based on practical situation. When the distance between vehicles exceeds communication range, λ i , j ( t ) equals 0. Similarly, when vehicles out of interference range with each others, there is no interference. Then, we have the following equations
λ i , j ( t ) N a ( i ) · L ( i , j ) i l i , j ( t ) N a ( i ) · I L ( i , j ) a l i , j ( t ) N a ( i ) · I L ( i , j )

3.2. Model of Interference Alignment between Vehicles and Base Station

According to IA technology, when vehicle communicates with base station, the interference caused by other vehicles could be aligned together in the same direction to save network freedom. Since interference from the same CSI cluster cannot be aligned in the same direction [9], then for a cluster m, we have following equation:
i C ( m ) a l i , j ( t ) = 0 , ( j = S t )
Since interference from vehicles in the same cluster cannot be aligned to each other, the number of valid signals and interference caused by vehicles in all areas should be less than the number of antennas of base station. Then, we have
i C ( m ) λ i , j ( t ) + i C ( m ) i l i , j ( t ) N a ( j ) , ( j = S t )
The number of interference can be aligned in same cluster cannot outnumber the total number of interference invoked in same area, we get the first constraint in (14). And the actual number of degrees of freedom consumed at base station cannot exceed its number of antennas, the second constraint of (14) should be met:
i C ( m ) a l i , j ( t ) i C ( m ) i l i , j ( t ) N a ( j ) i = 1 : N ( λ i , j ( t ) + i l i , j ( t ) a l i , j ( t ) ) , ( j = S t )
Symbol i l i , j ( t ) is the number of interference caused by vehicle i to station j and a l i , j ( t ) is the number of aligned interference. Then we get
a l i , j ( t ) i l i , j ( t ) , ( I L ( i , j ) = 1 , j = S t )
According to the meaning of i l i , j ( t ) , when vehicle is the off state that not transmits nor receives, it will not cause or receive any interference, we get
i l i , j ( t ) = 0 , ( δ R j = 0 , j = S t )
If vehicle is outside interference range of others, it will not be interfered by them.
i l i , j ( t ) = 0 , ( j = S t , I L ( i , j ) = 0 )
For base station, signals are treated as interference if not intended for it. Thus, we have following constraint
i l i , j ( t ) δ T i ( t ) · δ R j , ( j = S t , λ i , j ( t ) = 0 )

3.3. The Model of Data-Driven Assisted Transmission

In contrast to other types of information, safety related information in VANETs is open to all vehicles. Furthermore, during the same scheduling frame, information of a vehicle remains unchanged. Therefore, when a vehicle receives information from others, it could re-encode safety related information together and broadcasts to others in one session to improve the efficiency of information propagation. Based on these characteristics, in this subsection, we design a data-driven assisted transmission model for safety related information.
Transmission without data-driven assisted is illustrated in Figure 6. Taking the session sent from vehicle E D as an example, it can be delivered or relayed by base station and vehicle G. When vehicle E and B broadcast sessions simultaneously, vehicle D would receive two messages at same time slot. Once the number of received signals exceeds number of vehicle D’s freedom degrees, it will not be able to obtain the valid information. Therefore, in order to avoid collision, messages of vehicle E and vehicle B should be transmitted in different time slots. Since vehicle G also needs to transmit data to vehicle D, there should be one more time slot be assigned.
As shown in Figure 7, we can arrange one time slot for session E G with session B I and another time slot for G D . After vehicle G receives message from vehicle E, it can merge its own information with other vesicles. Although vehicle D get message of E one time slot later, there are only two time slots are occupied for all network.
Nevertheless, when vehicles adopt assisted transmission, it is necessary to ensure safety related information is delivered in time. In this paper, we choose minimum hop counts donated as h c o u n t to be the upper limit of hops, then we get
i = 1 : N , j = 1 : N r o t i , j ( f ) h c o u n t , ( 1 f F )
r o t i , j ( t ) is feasible routing path of session f. If a routing path bears a data relay task, the following formula is met
r o t i , j ( f ) t = 1 : K λ i , j ( t ) , ( i = S r c f , 1 f F )
For session f, its initiator is start of route, then we get
j = 1 : N r o t j , i ( f ) 0 , ( i = S r c f , 1 f F )
j = 1 : N r o t i , j ( f ) 1 , ( i = S r c f , 1 f F )
For relaying vehicles, we get the following constraint:
j = 1 : N r o t i , j ( f ) = j = 1 : N r o t j , i ( f ) , ( i S r c f , i D e s f )
As destination vehicles, there must be some vehicle that broadcasts message to them, then we have
j = 1 : N r o t j , i ( f ) 1 , ( i = D e s f , 1 f F )
In order to avoid routing loop at destination vehicle, we have:
j = 1 : N r o t i , j ( f ) 0 , ( i = D e s f , 1 f F )

3.4. Optimization Objective

It is obvious that the safety related information should be transmitted punctually. During each scheduling frame, we have K time slots and T U ( t ) is the state of time slot t. If there is no vehicle initiates communication at time slot t, T U ( t ) equals 0, then we get
T U ( t ) = 1 , ( i = 1 : N δ T i ( t ) 1 ) T U ( t ) = 0 , ( i = 1 : N δ T i ( t ) = 1 ) , ( 1 t K )
Fewer time slots are occupied, more efficient of safety related information propagation is. Therefore, we take time slot taken-up ratio denoted as P T U to be the optimization objective, then we get
P T U = t = 1 : K T U ( t ) / K
Combined with other constraints, we have the optimization problem O P T P T U :
OPT:Min P T U
s . t . ( 1 ) ( 3 ) , ( 5 ) , ( 7 ) ( 27 )
Among all the constraints, Formula (1)–(2) regulate half-duplex mode of vehicle terminals; (5)–(7) give constraints on receiving state and communication links; (8)–(10) introduce constraints on V2V broadcast communication; (11) presets initialization values to reduce searching range of feasible solutions; (14)–(18) regulate V2I and IA constraints for base station. (19)–(25) impose constraints on communicate route and data-driven assisted transmission. Among them, λ i , j ( t ) , i l i , j ( t ) , a l i , j ( t ) and r o t i , j ( t ) are positive integer variables. P T U is non-negative variable. h c o u n t can be adjusted according to delay requirement of VANETs.
Due to type of variable T U ( t ) and constraint (18) which is not linear, the prime optimization problem is Mixed Integer Nonlinear Programming (MINLP). In order to solve this problem, we have to reform some constraints into much neater forms. The next two lemmas will help us to reduce complexity of O P T P T U problem. Proofs of these two lemmas are postponed to Appendix A.
Lemma 1.
Constraint (26) with integer variable T U ( t ) is identical with the form listed in (28)
T U ( t ) 1 1 / N + i = 1 : N δ T i ( t ) / N T U ( t ) i = 1 : N δ T i ( t ) / N
Lemma 2.
Nonlinear constraint (16) combined with (17), (18) can be reformed in to the following linear constraint (29)–(31)
i l i , j ( t ) δ T j ( t ) + δ R i ( t ) λ i , j ( t ) ) 1 , ( I L ( i , j ) 0 )
i l i , j ( t ) δ R i ( t ) , ( I L ( i , j ) 0 )
i l i , j ( t ) 1 λ i , j ( t ) 0 i l i , j ( t ) , ( I L ( i , j ) 0 )
With these two lemmas, prime optimization problem is identical with the following
OPT:Min P T U
s . t . ( 1 ) ( 3 ) , ( 5 ) , ( 7 ) ( 15 ) , ( 19 ) ( 25 ) , ( 27 ) ( 31 )
O P T P T U is reformed into Mixed Integer Linear Programming that can be solved more efficiently compared with prime one.

4. The σ -Clustering Algorithm Based on CSI in VANET

To solve CSI stability problem, which is the key information of IA application, in this section, we design a CSI based clustering algorithm. Reasonable CSI clustering algorithm would improve accuracy of CSI estimation and IA efficiency though avoiding vehicles with similar CSI allocated the same time slot. In this paper, we take RSSI value as CSI parameter.
C = { C 1 , C 2 , , C η } is the clustered vehicle set. η = C is the number of clusters. p i is RSSI value between vehicle i and base station. ε i is variance of each cluster which is calculated as follows
ε j = i C j | | p i m C j p m C j | | 2 , ( 1 j η )
Traditional clustering algorithms is set with fixed η . In our clustering algorithm, we impose requirement on ε i . Define upper limit of ε i as σ . Then, we have
ε i σ , ( ε i ε )
According to the definition of ε i , we can conclude that the number of clusters increases while the value of σ decreases. A reasonable value of σ should be determined.
Since signal fading rate varies due to buildings and other obstacles, the clustering algorithm only based on RSSI is not pragmatic in VANETs. Hence, the location information should also be taken into consideration. After RSSI based clustering algorithm, we introduce kemans++ clustering algorithm based on location to avoid this problem. Pseudocode of our algorithm is listed in Algorithm 1.
Algorithm 1 Clustering ( A , S t , ε , σ )
1:
set the max cluster number η
2:
C l u s t e r s , C l u s t e r s 2
3:
N = s i z e ( A )
4:
P a t h L o s s e s = C a l P a t h L o s s ( A , S t )
5:
for i = 1 to η do
6:
{ C 1 , C 2 C i } = Cluster Based on Path loss
7:
{ ε 1 , ε 2 , , ε i } = Calculate ε for each cluster
8:
for j = 1 to i do
9:
  if ε j σ then
10:
   Add the C j into C l u s t e r s
11:
  end if
12:
  if ε j σ then
13:
   continue
14:
  end if
15:
end for
16:
end for
17:
forc in { C 1 , C 2 C i } do
18:
 cluster2=Kmeans++(c) based on location of vehicles
19:
 Add c l u s t e r 2 into C l u s t e r s 2
20:
end for
21:
return C l u s t e r s 2

5. Simulations

5.1. Simulation for Clustring Algorithm

Our simulation scenario is shown in Figure 8, including 7 vertical streets and 3 horizontal streets in this scenario. Vehicles are generated by SUMO [13]. Simulation area is 500 m in width and 2000 m in length. There is one base station in this area. The time slots of each scheduling frame is set to 20. Gurobi is chosen to be the solver for the optimization [26].
Clustering results based on RSSI and location are shown in Figure 9. The RSSI based clustering vehicles are grouped into ring-shaped area which is obviously not suitable for our scenarios since it does not take buildings into consideration.
The clustering result based on σ -clustering algorithm is shown in Figure 10. Vehicles from the same intersection or blocked by the same building are grouped into the same cluster, which is more reasonable.

5.2. Analysis of IA Simulation

In our simulation, h c o u n t is set to 6 to limit the number of hops in data routing. Then we analyze simulation results based on V2V, I2V and V2I cases.
Case Study for V2V communication: As shown in Figure 11, we select some vehicles as example. The communication sessions of selected vehicles are listed in Table 2 and routes of some sessions are listed in Table 3. From Table 3, we find that only 5 sessions adopt direct communication. And vehicle 6 and 54 contribute most routing tasks. It is because that vehicle 54 is closer to base station than any other vehicles in the same cluster and vehicle 6 is located in the center of its cluster.
The hop counts are shown in Table 4 with different size of experiments. The 5-hop routing only occurs when there are 30 vehicles in this road since the distribution of these cars is sparser. The percentage of different hop counts are shown in Figure 12. With the vehicle density increasing, the percentage of two hops is increased and the direct communication is reduced, which means the information would be propagated through assisted transmission instead of directly communication under the condition with more vehicles.
Case Study for I2V Assisted Communication: If a vehicle is within communication range of base station, direct data transmission is preferred. Otherwise, multi-hop forwarding will be adopted mostly. Direct communication from base station is shown in Figure 13 and vehicles out of communication range choose multi-hop communication method as shown in Figure 14. As increase in number of vehicles, the base station takes part in assisting data forwarding more frequently due to its higher concurrent communication ability as shown in Table 5.
Case Study for IA in V2I Communication: During the 20th time slot, vehicle 21, 31, 39, 47, 59, 68 broadcast message as shown in Figure 15. Vehicle 31, 68 and 59 broadcast to base station that will take up 3 antennas of the base station. However, the base station is also in the interference range of vehicle 39 and 47. Therefore, in order to receive intended messages from 31, 68 and 59, the interference caused by 39 and 47 will be aligned together to save 1 degree of communication freedom.
Case Study for Data-driven Assisted Transmission: We draw an example of data routing path as shown in Figure 16. The route table is shown in Table 6:
As shown in Figure 16, during 1st slot, the base station initiates a broadcast and vehicle 54 receives the message from base station. At time slot 15, vehicle 54 broadcasts to its surrounding vehicles. Since vehicle 65, 24 and 6 are out of the base station’s communication range, the session from base station is relayed by vehicle 54. At time slot 16, vehicle 6 center on the cluster broadcasts messages to surrounding vehicles. In this time slot, vehicle 6 relays message sent from vehicle 54 at time slot 15. To make full use of channel resources, during time slot 16, vehicles 43, 16 and 62 are assigned to send messages to base station simultaneously and vehicle 33 broadcasts to surrounding vehicles.
The experiment results listed in Table 7 and Figure 17 show that there exists approximate linearity between number of sessions and routing links with number of vehicles.
As shown in Figure 18, with the increase in the number of vehicles, proportion of routing task that base station participated also increases, which is is due to MIMO and large broadcast coverage of base station. Besides, P T U keeps increasing along with increase of vehicle number. The proportion of idle time slots as shown in Table 8, could be 45 % at 30 vehicles. Even in 70 vehicles simulation, this number could keep 15 % . For comparisons, the time slots of MIMO without IA are almost used up when there are 70 vehicles, which would lead communication congestion.
As shown in Table 9, in simulation with 30 vehicles, the proportion direct transmission is relatively high, mainly due to fewer vehicles within safety distance. And communication delay could be reduced by 45 % . However, with the increase of vehicle number, the proportion of assisted transmission is getting higher, which can reach 50 % . Routing communication is reduced by an average of about 20 % compared with no assisted transmission.

6. Conclusions

This paper studies communication problems of safety related information in VANETs. Under the proposed framework, the IA technology applied in VANETs is realized. Taking advantage of data-driven assisted transmission, the use ratio of route is improved. The simulation results show that this approach can effectively improve VANETs link use and reduce communication delay.

Author Contributions

C.Z. contributes to the writing of this article, references, analysis of experimental results and data interpretation. J.H. contributes to the research idea, direction, acquisition and design of this article. X.D. contributes to the literature retrieval, research content, algorithm design, data analysis, algorithm analysis, manuscript writing, etc. L.S. contributes to the experimental design, algorithm realization, experimental analysis and manuscript review of this article. F.Y. contributes to the implementation of experimental algorithm, chart making, data collection and data analysis of this article.

Funding

This work is supported by the National Natural Science Foundation of China under Grant No. 61701162 and the Fundamental Research Funds for the Central Universities (GRANT NO. JZ2019YYPY0298, JZ2019YYPY0290).

Acknowledgments

We also want to deliver our sincere gratitude to those who made arduous efforts in reviewing this article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
VANETsVehicular Ad-hoc NETworks
IAInterference Alignment
V2VVehicle to Vehicle and Vehicle
V2IVehicle to Infrastructure
CSIChannel State Information
CRCognitive Radio
SDSpectrum Database
TDMATime Division Multiple Access
ITSIntelligent Transportation Systems
MIMOMultiple-Input Multiple-Output
MINLPMixed Integer Nonlinear Programming

Appendix A

Proof of Lemma 1.
Constraint (26) with integer variable T U ( t ) is identical with the form listed in (28).
By the definition of T U ( t ) , if there exists any data transmission in time slot t, then T U ( t ) equals to 1, otherwise, it is 0.
(1) If there exists any data transmission in time slot t, then there must be one δ T i ( t ) that not equals 0. Therefore, we have
i = 1 : N δ T i ( t ) 1
For the first inequality in (28), we have:
T U ( t ) 1 1 / N + i = 1 : N δ T i ( t ) / N < 2
where i = 1 : N δ T i ( t ) / N is greater than or equal to 1. Therefore, we have T U ( t ) is less than or equal to α which is greater than or equal to 1.
For the second inequality in (28), we have:
T U ( t ) i = 1 : N δ T i ( t ) / N = 1 / N > 0
Combining the above, we have:
1 / N T U ( t ) < 2
Since the value of T U ( t ) can only be chosen from integer 0 and 1, we have T U ( t ) = 1 , which is identical to the first equation in (28)
(2) If there is no data transmission on time slot t, it is obvious that i = 1 : N δ T i ( t ) equals 0.
For the first inequality in (28), we have:
T U ( t ) 1 1 / N + i = 1 : N δ T i ( t ) / N = 1 1 / N < 1
For the second inequality in (28), we have:
T U ( t ) i = 1 : N δ T i ( t ) / N = 0
Combining the above, we have:
0 T U ( t ) 1 1 / N < 1
Since the value of T U ( t ) can only be chosen from integer 0 and 1, we have T U ( t ) = 0 , which is identical to the second equation in (28).
Therefore, we draw the conclusion that (26) and (28) are identical to each other. □
Proof of Lemma 2.
Nonlinear constraint (16) combined with (17), (18) can be reformed in to the following linear constraint (29)–(31)
During the communication, we have following cases:
(1)
When vehicle i is in transmitting mode, we have δ T i ( t ) = 1 . In the same time slot, if vehicle j is in receiving mode, we have δ R j ( t ) = 1 . However, if session from vehicle i is NOT intended for j, we have λ i , j ( t ) = 0 . In this case, we have i l i , j ( t ) = 0 .
(2)
When vehicle i is in transmitting mode, we have δ T i ( t ) = 1 . In the same time slot, if vehicle j is in receiving mode, we have δ R j ( t ) = 1 . And if session from vehicle i is intended for j, we have λ i , j ( t ) = 1 . In this case, we have i l i , j ( t ) = 0 .
(3)
When vehicle i is in transmitting mode, we have δ T i ( t ) = 1 . In the same time slot, if vehicle j is NOT in receiving mode, we have δ R j ( t ) = 0 . In this case, we have λ i , j ( t ) = 0 . In this case, we have i l i , j ( t ) = 0 .
(4)
When vehicle i is NOT in transmitting mode, we have δ T i ( t ) = 0 . In the same time slot, if vehicle j is in receiving mode, we have δ R j ( t ) = 1 . In this case, we have λ i , j ( t ) = 0 . In this case, we have i l i , j ( t ) = 0 .
(5)
When vehicle i is NOT in transmitting mode, we have δ T i ( t ) = 0 . In the same time slot, if vehicle j is in receiving mode, we have δ R j ( t ) = 0 . In this case, we have λ i , j ( t ) = 0 . In this case, we have i l i , j ( t ) = 0 .
Combining the above five cases, we have the following Equation:
i l i , j ( t ) = δ T i ( t ) · δ R j · ( 1 λ i , j ( t ) ) = δ T i ( t ) · δ R j δ T i ( t ) · δ R j · λ i , j ( t )
We have two items on the right-hand-side of the equation. One is in the quadratic form, the other one is in cubic form, which will lead to a relatively high complexity in solving the optimization problem. What is done next is to reshape the polynomial form of constraint into a linear one. Considering the following constraints with (10), (29)–(31):
i l i , j ( t ) δ T j ( t ) + δ R i ( t ) λ i , j ( t ) ) 1 , ( I L ( i , j ) 0 i l i , j ( t ) δ T i ( t ) · N a ( i ) , ( j S t ) i l i , j ( t ) δ R i ( t ) , ( I L ( i , j ) 0 i l i , j ( t ) 1 λ i , j ( t ) 0 i l i , j ( t ) , ( I L ( i , j ) 0 )
In the case corresponding to case (1), we have:
δ T i ( t ) = 1 , δ R j ( t ) = 1 , λ i , j ( t ) = 1
i l i , j ( t ) 1 + 1 1 1 = 0 i l i , j ( t ) 1 i l i , j ( t ) 1 i l i , j ( t ) 1 1 = 0 λ i , j ( t ) = 0
In the case corresponding to case (2), we have:
δ T i ( t ) = 1 , δ R j ( t ) = 1 , λ i , j ( t ) = 0
i l i , j ( t ) 1 + 1 0 - 1 = 1 i l i , j ( t ) 1 i l i , j ( t ) 1 i l i , j ( t ) 1 0 = 1 λ i , j ( t ) = 1
In the case corresponding to case (3), we have:
δ T i ( t ) = 0 , δ R j ( t ) = 0 , λ i , j ( t ) = 0
i l i , j ( t ) 0 + 0 0 1 = 1 i l i , j ( t ) 0 i l i , j ( t ) 0 i l i , j ( t ) 1 0 = 1 λ i , j ( t ) = 0
In the case corresponding to case (4), we have:
δ T i ( t ) = 0 , δ R j ( t ) = 1 , λ i , j ( t ) = 0
i l i , j ( t ) 0 + 1 0 1 = 0 i l i , j ( t ) 0 i l i , j ( t ) 1 i l i , j ( t ) 1 0 = 1 λ i , j ( t ) = 0
In the case corresponding to case (5), we have:
δ T i ( t ) = 1 , δ R j ( t ) = 0 , λ i , j ( t ) = 0
i l i , j ( t ) 1 + 0 0 1 = 0 i l i , j ( t ) 1 i l i , j ( t ) 0 i l i , j ( t ) 1 0 = 1 λ i , j ( t ) = 0
Therefore, the outcomes of these series of inequalities are identical to the values calculated by Equation (10), (29)–(31). Hence, we reach the conclusion that polynomial constraint (16), (17), (18) is the same as inequalities (10), (29)–(31). □

References

  1. Dressler, F.; Klingler, F.; Sommer, C.; Cohen, R. Not All VANET Broadcasts Are the Same: Context-Aware Class Based Broadcast. IEEE/ACM Trans. Netw. 2018, 26, 17–30. [Google Scholar] [CrossRef]
  2. Nguyen, V.; Oo, T.Z.; Chuan, P.; Hong, C.S. An Efficient Time Slot Acquisition on the Hybrid TDMA/CSMA Multichannel MAC in VANETs. IEEE Commun. Lett. 2016, 20, 970–973. [Google Scholar] [CrossRef]
  3. Limouchi, E.; Mahgoub, I. Volunteers Dilemma Game Inspired Broadcast Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transport. Syst. 2019, 1–11. [Google Scholar] [CrossRef]
  4. Zeng, H.; Shi, Y.; Hou, Y.T.; Lou, W.; Kompella, S.; Midkiff, S.F. An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks. IEEE Trans. Mobile Comput. 2016, 15, 17–31. [Google Scholar] [CrossRef]
  5. Sundaresan, K.; Sivakumar, R.; Ingram, M.A.; Chang, T.Y. Medium access control in ad hoc networks with MIMO links: Optimization considerations and algorithms. IEEE Trans. Mobile Comput. 2004, 3, 350–365. [Google Scholar] [CrossRef]
  6. Jaiswal, R.K.; Jaidhar, C.D. Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter. Wirel. Netw. 2016, 23, 1–16. [Google Scholar] [CrossRef]
  7. Feteiha, M.F.; Hassanein, H.S. Enabling Cooperative Relaying VANET Clouds Over LTE-A Networks. IEEE Trans. Veh. Technol. 2015, 64, 1468–1479. [Google Scholar] [CrossRef]
  8. Atakan, B.; Akan, O.B. Biological Foraging-Inspired Communication in Intermittently Connected Mobile Cognitive Radio Ad Hoc Networks. IEEE Trans. Veh. Technol. 2012, 61, 2651–2658. [Google Scholar] [CrossRef]
  9. Al-Ali, A.K.; Sun, Y.; Di Felice, M.; Paavola, J.; Chowdhury, K.R. Accessing Spectrum Databases Using Interference Alignment in Vehicular Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2015, 64, 263–272. [Google Scholar] [CrossRef]
  10. Ma, X.; Zhang, J.; Yin, X.; Trivedi, K.S. Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services. IEEE Trans. Veh. Technol. 2012, 61, 46–61. [Google Scholar] [CrossRef]
  11. Velmurugan, V.; Leo Manickam, J.M. A efficient and reliable communication to reduce broadcast storms in VANET protocol. Clust. Comput. 2018. [Google Scholar] [CrossRef]
  12. Sahn, S.; Chae, S.H. Blind Integer-Forcing Interference Alignment for Downlink Cellular Networks. IEEE Commun. Lett. 2019, 23, 306–309. [Google Scholar] [CrossRef]
  13. Alaa, A.M.; Ismail, M.H. Achievable Degrees of Freedom of the K-User SISO Interference Channel With Blind Interference Alignment Using Staggered Antenna Switching. IEEE Trans. Veh. Technol. 2017, 66, 2825–2829. [Google Scholar] [CrossRef]
  14. Johnny, M.; Aref, M.R. Blind Interference Alignment for the K -User SISO Interference Channel Using Reconfigurable Antennas. IEEE Commun. Lett. 2018, 22, 1046–1049. [Google Scholar] [CrossRef]
  15. Guo, Q.; Liu, S.P.; Xiong, W.; Zhou, Z.Y. A Ground Target Positioning Method Facing Small UAVs. Key Eng. Mater. 2012, 503, 272–276. [Google Scholar] [CrossRef]
  16. Liang, W.; Zhang, Z.; Jian, D.; Wu, Y. Frequency-Domain Inter-Group Interference Coordination for V2V Communications. IEEE Signal Process. Lett. 2017, 24, 1739–1743. [Google Scholar]
  17. Cheng, N.; Zhang, N.; Lu, N.; Shen, X.; Mark, J.W.; Liu, F. Opportunistic Spectrum Access for CR-VANETs: A Game-Theoretic Approach. IEEE Trans. Veh. Technol. 2014, 63, 237–251. [Google Scholar] [CrossRef]
  18. Deepak, G.C.; Navaie, K.; Ni, Q. Radio Resource Allocation in Collaborative Cognitive Radio Networks Based on Primary Sensing Profile. IEEE Access 2018, 6, 50344–50357. [Google Scholar] [CrossRef]
  19. Han, Y.; Ekici, E.; Kremo, H.; Altintas, O. Throughput-Efficient Channel Allocation Algorithms in Multi-Channel Cognitive Vehicular Networks. IEEE Trans. Wirel. Commun. 2017, 16, 757–770. [Google Scholar] [CrossRef]
  20. Omar, H.A.; Zhuang, W.; Li, L. VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs. IEEE Trans. Mobile Comput. 2013, 12, 1724–1736. [Google Scholar] [CrossRef]
  21. Cao, S.; Lee, V.C.S. A Novel Adaptive TDMA-Based MAC Protocol for VANETs. IEEE Commun. Lett. 2018, 22, 614–617. [Google Scholar] [CrossRef]
  22. Arthur, D.; Vassilvitskii, S. K-Means++: The Advantages of Careful Seeding. In Proceedings of the Eighteenth ACM-SIAM Symposium on Discrete Algorithms, New Orleans, LA, USA, 7–9 January 2007. [Google Scholar]
  23. Virdaus, I.K.; Kang, M.; Shin, S.; Lee, C.G.; Pyim, J. A Counting-Based Broadcast Model of Emergency Message Dissemination in VANETs. In Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 927–930. [Google Scholar] [CrossRef]
  24. Abbasi, H.I.; Voicu, R.C.; Copeland, J.; Chang, Y. Towards Fast and Reliable Multi-hop Routing in VANETs. IEEE Trans. Mobile Comput. 2019. [Google Scholar] [CrossRef]
  25. Tahmasbi-Sarvestani, A.; Fallah, Y.P.; Kulathumani, V. Network-Aware Double-Layer Distance-Dependent Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 2015, 64, 5536–5546. [Google Scholar] [CrossRef]
  26. Gurobi Optimization, Inc. Gurobi Optimizer Reference Manual. 2018. Available online: http://www.gurobi.com (accessed on 1 November 2019).
Figure 1. Contents of Scheduling Time.
Figure 1. Contents of Scheduling Time.
Sensors 19 04988 g001
Figure 2. Typical VANETs Scenario.
Figure 2. Typical VANETs Scenario.
Sensors 19 04988 g002
Figure 3. Workflow of New Vehicle Registering at Base Station and Uploading CSI to SD.
Figure 3. Workflow of New Vehicle Registering at Base Station and Uploading CSI to SD.
Sensors 19 04988 g003
Figure 4. CSI Based Road Segments.
Figure 4. CSI Based Road Segments.
Sensors 19 04988 g004
Figure 5. Illustration of Base Station Broadcast Coverage and Assisted Transmission.
Figure 5. Illustration of Base Station Broadcast Coverage and Assisted Transmission.
Sensors 19 04988 g005
Figure 6. Example of V2I without Assisted Transmission.
Figure 6. Example of V2I without Assisted Transmission.
Sensors 19 04988 g006
Figure 7. Example of V2I with Assisted Transmission.
Figure 7. Example of V2I with Assisted Transmission.
Sensors 19 04988 g007
Figure 8. Base Station and Clusters ( H i indicates cluster of vehicles with similar CSI).
Figure 8. Base Station and Clusters ( H i indicates cluster of vehicles with similar CSI).
Sensors 19 04988 g008
Figure 9. Clustering According to RSSI.
Figure 9. Clustering According to RSSI.
Sensors 19 04988 g009
Figure 10. σ -Clustering Algorithm According to path loss and location.
Figure 10. σ -Clustering Algorithm According to path loss and location.
Sensors 19 04988 g010
Figure 11. Example of V V Communication Simulation Result.
Figure 11. Example of V V Communication Simulation Result.
Sensors 19 04988 g011
Figure 12. Graph of Proportions of Different Hops.
Figure 12. Graph of Proportions of Different Hops.
Sensors 19 04988 g012
Figure 13. Sessions Base Station Participated.
Figure 13. Sessions Base Station Participated.
Sensors 19 04988 g013
Figure 14. Sessions Uploading from Vehicles out of Base Station Communication Range.
Figure 14. Sessions Uploading from Vehicles out of Base Station Communication Range.
Sensors 19 04988 g014
Figure 15. Example of IA in 20th Time Slot.
Figure 15. Example of IA in 20th Time Slot.
Sensors 19 04988 g015
Figure 16. An Example of I V Session Routes from Base Station to Vehicles out of Vommunication Range.
Figure 16. An Example of I V Session Routes from Base Station to Vehicles out of Vommunication Range.
Sensors 19 04988 g016
Figure 17. Number of Route Links and Sessions.
Figure 17. Number of Route Links and Sessions.
Sensors 19 04988 g017
Figure 18. P T U and Some Percentages of Sessions as the number of vehicles increases.
Figure 18. P T U and Some Percentages of Sessions as the number of vehicles increases.
Sensors 19 04988 g018
Table 1. SYMBOLS and NOTATION.
Table 1. SYMBOLS and NOTATION.
SymbolRemark
NNumber of terminals in network including vehicles and base station
FNumber of communication times
S t ID of Base station
S r c = S r c 1 , S r c 2 . . . S r c F Set of sources
D e s = D e s 1 , D e s 2 . . . D e s F Set of destinations
T s = t 1 , t 2 . . . t K Set of Scheduling time slots
KNumber of time slots
N a ( i ) Number of antennas equipped on terminal i
I L ( i , j ) Symbol of interference status between i and j (0 means j is out of interference range of i)
L ( i , j ) Symbol of connectivity between i and j (0 means j is out of communicate range of i)
C ( i ) Set of vehicles in cluster i
λ i , j ( t ) Number of communication session vehicle i sends to vehicle j during the same time slot t
i l i , j ( t ) Number of interference caused by i to j during time slot t
a l i , j ( t ) Number of interference caused by i to j which could be aligned during time slot t
δ T i ( t ) Sending state of vehicle i at time slot t (0 means that vehicle i is not broadcasting during time slot t)
δ R i ( t ) Receiving state of vehicle i at time slot t (0 means that vehicle i is not receiving during time slot t)
h c o u n t Threshold value of max hops
r o t i , j ( f ) Integer value indicates whether vehicle i relays data to j for session f (1 means that i and j take part in relaying for session f )
T U ( t ) Integer value indicates whether time slot t is assigned to any vehicles (0 means that there is no vehicle sends data during time slot t, 1 means that at least one vehicle sends data to others)
P T U Proportion of the time slots allocated
Table 2. S r c and D e s for V V Session.
Table 2. S r c and D e s for V V Session.
SRCDES 1DES 2DES 3DES 4DES 5
652470
2466570
62434425070
5026344270
4265070
37323370
24345070
4270
Table 3. Routes of V V .
Table 3. Routes of V V .
SRCDESROUTESRCDESROUTE
65245450346
24625042
246554426
624 425049
634 246
642502346
6503925049
5024
506
Table 4. Number of Route Hops for V V as The Number of Vehicles Increases.
Table 4. Number of Route Hops for V V as The Number of Vehicles Increases.
Number of Hops12345
Number of Vehicle
302418121216
40522512210
50664319200
60717428230
70837641440
Table 5. Percentage of Base Station Participation in Route.
Table 5. Percentage of Base Station Participation in Route.
Number of VehiclesNumber of all SessionsCount of Participation of Base StationPercentage
308250.06
40110140.13
50148210.14
60196450.23
70244500.20
Table 6. Proportions of Different Hops in Routes of V V .
Table 6. Proportions of Different Hops in Routes of V V .
SrcDesRoutesSrcDesRoutes
706554701454, 6
702454705054, 6
7065470454, 6
703954, 6703454, 6
Table 7. The number of Sessions and Transmit Links.
Table 7. The number of Sessions and Transmit Links.
Number of VehiclesNumber of Transmit Links (Z)Number of SessionsNumber of Base Station Session
30618253
409311071
5011914899
60135196137
70220244175
Table 8. PTU and Percentages of Sessions.
Table 8. PTU and Percentages of Sessions.
Number of VehiclesProportion of Base Station SessionRatio of Transmit Links to SessionsPTUPTU without IA
300.650.740.550.65
400.650.850.650.76
500.670.800.700.88
600.700.690.800.93
700.720.900.850.98
Table 9. Proportion of Direct and Forward Transmission.
Table 9. Proportion of Direct and Forward Transmission.
Number of VehiclesProportion Direct TransmissionProportion of Forward Transmission
300.300.71
400.470.53
500.450.55
600.360.64
700.340.66

Share and Cite

MDPI and ACS Style

Zhao, C.; Han, J.; Ding, X.; Shi, L.; Yang, F. An Analytical Model for Interference Alignment in Broadcast Assisted VANETs. Sensors 2019, 19, 4988. https://doi.org/10.3390/s19224988

AMA Style

Zhao C, Han J, Ding X, Shi L, Yang F. An Analytical Model for Interference Alignment in Broadcast Assisted VANETs. Sensors. 2019; 19(22):4988. https://doi.org/10.3390/s19224988

Chicago/Turabian Style

Zhao, Chong, Jianghong Han, Xu Ding, Lei Shi, and Fan Yang. 2019. "An Analytical Model for Interference Alignment in Broadcast Assisted VANETs" Sensors 19, no. 22: 4988. https://doi.org/10.3390/s19224988

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop