A Reliable and Efficient Token-Based MAC Protocol for Platooning Applications
نویسندگان
چکیده
Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system required to operate the platoon. Rewarding since considerable fuel reductions are possible. As platooning takes place in a vehicular ad hoc network, the use of IEEE 802.11p is close to mandatory. However, the 802.11p medium access method suffers from packet collisions and random delays. Most ongoing research suggests using TDMA on top of 802.11p as a potential remedy. However, TDMA requires synchronization and is not very flexible if the beacon frequency needs to be updated, the number of platoon members changes, or if retransmissions for increased reliability are required. We therefore suggest a token-passing medium access method where the next token holder is selected based on beacon data age. This has the advantage of allowing beacons to be re-broadcasted in each beacon interval whenever time and bandwidth are available. We show that our token-based method is able to reduce the data age and considerably increase reliability compared to pure
منابع مشابه
Game Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network
Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...
متن کاملSupporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802....
متن کاملToken-MAC: Inactive RFID Systems for A light MAC Protocol
Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID s...
متن کاملAn efficient and fair reliable multicast protocol for 802.11-based wireless LANs
Many applications are inherently multicast in nature. Such applications can benefit tremendously from reliable multicast support at the MAC layer since addressing reliability at the MAC level is much less expensive than handling errors at the upper layers. However, the IEEE 802.11 MAC layer does not support reliable multicast. This void in the MAC layer is a limiting factor in the efficacy of m...
متن کاملEnergy Efficient Token Based MAC Protocol for Wireless Sensor Networks
In this paper, we propose on energy efficient token based MAC protocol for WSNs, in order to reduce energy consumption of each sensor node which is one of the important issues to prolong the network lifetime. WSN consists of a large number of small and low-cost sensor nodes powered by small batteries and equipped with various sensing devices. Due to limited energy in WSN energy efficiency is an...
متن کامل