MAC + PHY Modeling & Multilayer Simulation of DSRC V2V Network

Similar documents
Mohamed Khedr.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Lecture 16: QoS and "

Wireless Local Area Networks (WLANs) Part I

3.1. Introduction to WLAN IEEE

Wireless LANs. ITS 413 Internet Technologies and Applications

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

CMPE 257: Wireless and Mobile Networking

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

IEEE MAC Sublayer (Based on IEEE )

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

IEEE Medium Access Control. Medium Access Control

Local Area Networks NETW 901

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Multiple Access in Cellular and Systems

CSE 461: Wireless Networks

Performance Evaluation of IEEE a MAC Protocol for Vehicle Intersection Collision Avoidance System

Wireless Network Security Spring 2014

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

IEEE WLAN (802.11) Copyright. Nomadic Communications

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

IEEE Wireless LANs Part I: Basics

Nomadic Communications WLAN MAC Fundamentals

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

MAC Protocols for VANETs

Wireless Network Security Spring 2015

Computer Networks. Wireless LANs

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

ECE442 Communications Lecture 3. Wireless Local Area Networks

Data Communications. Data Link Layer Protocols Wireless LANs

WLAN Performance Aspects

Design Approach for MAC Design in Vehicle Safety System Using Dedicated Short Range Communications (DSRC)

Unit 7 Media Access Control (MAC)

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Last Lecture: Data Link Layer

Wireless Communication

Data and Computer Communications. Chapter 13 Wireless LANs

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Mohammad Hossein Manshaei 1393

Rahman 1. Application

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Dedicated Short Range Communication: What, Why and How?

Wireless and Mobile Networks

Wireless Local Area Networks. Networks: Wireless LANs 1

MAC. Fall Data Communications II 1

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Multiple Access Links and Protocols

Wireless Networked Systems

Strengthening Unlicensed Band Wireless Backhaul

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless Network Security Spring 2013

Enabling The Connected Car Revolution

Advanced Computer Networks WLAN

Department of Electrical and Computer Systems Engineering

Wireless Local Area Network (IEEE )

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

15-441: Computer Networking. Wireless Networking

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

Wireless Protocols. Training materials for wireless trainers

MSIT 413: Wireless Technologies Week 8

CMPE 257: Wireless and Mobile Networking

Wireless Network and Mobility

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Hands-On Exercises: IEEE Standard

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008)

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

Guide to Wireless Communications, Third Edition. Objectives

Now, Near and Far: The Case For CV2X. Don Butler Executive Director Connected Vehicle Platform and Product Ford Motor Company.

ENSC 427, Spring 2012

Wireless Network Security Spring 2012

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Mobile & Wireless Networking. Lecture 7: Wireless LAN

CS263: Wireless Communications and Sensor Networks

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Wireless MACs: MACAW/802.11

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless Networks (MAC)

Introduction to IEEE

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Sample solution to Midterm

Logical Link Control (LLC) Medium Access Control (MAC)

Attacks on WLAN Alessandro Redondi

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless LANs. Wireless Network

Mohammad Hossein Manshaei 1393

Wireless and Mobile Networks 7-2

Wireless Networking & Mobile Computing

Computer Communication III

Transcription:

MAC + PHY Modeling & Multilayer Simulation of DSRC V2V Network Cynthia Cudicini - MathWorks 2015 The MathWorks, Inc. 1

Vehicular Communications Vehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I) Vehicle-to-Pedestrian (V2P) Vehicle-to-Network (V2N) V2X Continuous, high-speed, and authenticable safety data exchange among moving vehicles (V2V) and between vehicles and roadway infrastructure (V2I), pedestrians (V2P) and cellular network (V2N) 2

Motivations for V2X Safety 33,000 death in highway accidents (US DOT, 2012) 5.1 million crashes (US DOT, 2012) Leading cause of death for people of age 11-27 Mobility & Productivity 5.5 billion hours of traffic delay (per year) 121 billion USD cost of urban congestion (per year) Environment 2.9 billion gallons of waste in fossil fuel (per year) 56 billion lbs. of additional emitted CO2 3

Impact of V2X technology US DOT NHTSA: If V2X technologies alone are widely deployed, they have the potential to address 81 percent of light-vehicle crashes V2X based on cooperative communications Extends the safety features offered by Advanced Driver Assistance Systems (ADAS) technologies RADAR LiDAR Video processing 4

V2X Safety Applications 5

Proposed V2X Technologies 1. Dedicated Short Range Communications (DSRC) 2. Cellular Vehicle-to-Any-Device communications (C-V2X) Operating at 5.9 Gigahertz (GHz) band Strict performance requirements - Latency: Less-than-100-ms delay - Range: Up to 300 meters - Supported speeds: Typical highway velocities Using Basic Safety Messages (BSM) data exchange 6

Basic safety messages (BSM) & algorithm development Position information Velocity information Acceleration information Size information 7

What you will learn today How to model, simulate, visualize V2X safety applications: 1. Visualize and model traffic scene and vehicles in motion 2. Apply equations of motion to handle vehicular maneuvers, collision prediction, collision avoidance and after-collision trajectory algorithms 3. Simulate IEEE 802.11p physical layer of DSRC standard for V2V communications 4. Simulate IEEE MAC layer of DSCR standard at the same time as the PHY 8

Example: 802.11p V2V Safety Scenario Simulation 9

Implementation MATLAB User Interface wifinet Network specifications wifisim Network simulator Simulation Artifacts wifistation wifistation wifistation Multilayer simulation of a WiFi station Multilayer simulation of a WiFi station Multilayer simulation of a WiFi station wifista wifista wifista Station specifications Station specifications Station specifications Simulink User Interface PHY TX DCF (CSMA/CA) PHY RX waveform2psdu Convert waveform to PSDU wifilib WiFi block library psdu2waveform Convert PSDU to waveform waveformaggregate Simulate interference Legend MATLAB structure MATLAB function MATLAB object (incl. System object) Simulink library wifichannel Manage all links on a shared channel wifilink wifilink wifilink One-way PHY link & noise One-way PHY link & noise One-way PHY link & noise 10

802.11 PHY design made easy with WLAN System Toolbox 11

802.11 MAC and CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) Media Access Control (MAC) a set of rules that coordinate stations to share common bandwidth efficiently 802.11 uses CSMA/CA method for both Ad-hoc (or IBSS) mode, and Infrastructure mode CSMA/CA includes 2 mechanisms Basic access RTS/CTS (Request To Send/Clear To Send) 12

Simulate Interference of Multiple Bursts of Waveforms Receiver hear time-shifted aggregation of waveforms An illustrative example Collision/Interference RX2 TX3 TX2 TX1 13

CSMA/CA Basic Access Source station states 1. Carrier sense (DIFS) 2. Random back-off 3. Transmit data 4. Turn-around (SIFS) 5. Wait/receive ACK Other station Virtual carrier sensing Listen/read duration field of MAC headers, set NAV (Network Allocation Vector) counter as indicator of channel busy 14

How 802.11 RTS/CTS Resolve Hidden Terminal Problem CSMA basic access cannot avoid the collisions due to hidden terminal problem 1 is sending data to 2 3 is out of range of 1, therefore believes channel free 3 sends data to 2 and causes collision RTS/CTS can help 1 sends RTS (Request To Send) to 2 1 2 3 2 responds with CTS (Clear To Send) CTS heard by both 1 and 3 1 starts to send data 3 detects CTS is for others, and set NAV 15

CSMA/CA with RTS/CTS Source station states 1. Carrier sensing (DIFS) 2. Random back-off 3. RTS 4. Turn-around (SIFS) 5. Wait/receive CTS 6. Turn-around (SIFS) 7. Transmit data 8. Turn-around (SIFS) 9. Wait/receive ACK NAV of RTS/CTS covers entire data transmission 16

Re-transmission Increase retry counter Doubles Contention Window (CW) up to CW_max Backoff counter = random number between [0, CW] Initial attempt: CW = CW_min Drop the frame when: Retry counter > Retry_max Example re-transmission configuration CW_min = 31, CW_max = 1023, Retry_max = 6 17

Multilayer Simulation Enable MAC/PHY Co-Design Constellation diagram for frames with and without collisions PHY simulation of creation, transmission, interference, reception and recover of a 802.11 VHT frame MAC simulation of multiple, independent stations with self-managed DCFs Support both MATLAB command-line and Simulink graphical modeling/simulation 18

DEMONSTRATION 19

Alternative Approach to Model/Simulate MAC Behaviors 20

Summary - MATLAB and Simulink provide: Framework for multilayer, multi-nodes network simulation Simulate interference of multiple, independent bursts of waveforms on a shared channel Help network design, diagnose, analysis, and performance evaluation Plug-in MAC and PHY components of different types System object (MATLAB) based or Stateflow-based MAC Any PHY waveform generator (802.11, LTE, ) Visualization tools to build meaningful scenarios Supports code generation as a next step for implementation 21