We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The methodology chosen greatly influences the quality of performance evaluation. Field operational tests (FOTs) are being conducted in many areas and provide some very helpful first results. Yet, large-scale experimentation is conceptually complicated or even infeasible – just consider the possible number of parameter configurations that need to be tested. Thus, simulation is in most cases the method of choice for performance studies. This chapter studies how such simulations should be performed in the field of inter-vehicle communication (IVC) and which tools are available to aid researchers. One of the key concerns is the correct and realistic modeling of the vehicles' mobility. Besides that, the “correct” choice of the scenario has a strong influence on the expressiveness, the validity, and the comparability of simulation experiments. This chapter also studies the impact of radio signal propagation models, the influence of the human driver's behavior, and suitable metrics for finally assessing the performance.
This chapter is organized as follows.
• Performance measurements (Section 6.1) – In this section, we discuss strategies and techniques for performance evaluation of vehicular networking applications and protocols in general. In particular, we outline recent measurement campaigns, including the tools used, and give a high-level overview on simulation techniques.
• Simulation tools (Section 6.2) – This section covers typically used tools for simulating vehicular networks. We introduce the necessary network simulation as well as road mobility simulation and summarize integrated frameworks used for more holistic approaches to simulation of vehicular networks.
• Scenarios, models, and metrics (Section 6.3) – We study the scenarios, models, and metrics needed in this section. It makes a huge difference whether the protocols have been studied in the correct environment and using models accurately representing the realistic behavior of wireless communication channels and vehicular networking protocols. We summarize this discussion with an overview on metrics that can (and should) be used for the final performance assessment.
The objective of this chapter is to discuss data dissemination in vehicular networks in detail. We concentrate essentially on network-layer and application-layer protocols, which are often discussed and developed as a single protocol above the respective access technologies. The key objective is to achieve information exchange between any two vehicles, from one vehicle to all neighboring ones, from one vehicle to infrastructure components, from infrastructure to one or all neighboring vehicles, and dissemination from a vehicle to all those that are interested in the content.
We start by looking at ad-hoc routing protocols that were suggested in the early days of vehicular networks. Having identified their limitations, we explore alternatives, starting with geographic routing and geocast as communication primitives, and then exploring one of the most promising domains in the scope of vehicular networks: beaconing or one-hop broadcasting. In this framework, this chapter details the basic principles underlying such inter-vehicle communication (IVC) approaches, namely unicast, local broadcast, anycast, and multicast communication principles as used in vehicular networks. We of course investigate the current state of the standardization efforts, primarily focusing on the European Telecommunications Standards Institute (ETSI) standardization towards cooperative awareness messages (CAMs) and decentralized environmental notification messages (DENMs) as well as the ETSI GeoNetworking initiative. Furthermore, we explore options for exploiting available infrastructure such as roadside units (RSUs) or even parked vehicles to provide access to some backbone network or to help spread information among the vehicles. We conclude this chapter with a discussion of delay/disruption-tolerant network (DTN) approaches and the use of concepts known from Internet-based peer-to-peer networks.
This chapter is organized as follows.
• Ad-hoc routing (Section 5.1) – We start by exploring classical mobile ad-hoc network (MANET) routing algorithms in detail, because some basic knowledge of ad-hoc routing is needed in order to understand the more sophisticated vehicular ad-hoc network (VANET) routing options. In this section, we also discuss the applicability of MANET routing to VANETs as well as the specific challenges resulting from the underlying mobility pattern and delay constraints for vehicular safety applications.
The wireless technology multimedia sensor network (WMSN) is a multidisciplinary technology. Researchers from diverse fields such as wireless and ad-hoc sensor networks, multimedia, distributed signal processing, control theory, and embedded systems have contributed new ideas to innovate real-life applications. Advances in embedded electronics and MEMS have resulted in greater processing power per unit size of the sensor nodes in such a way that today it is possible to bring them together in a more powerful, complex, and compact manner. With the increased processing power, it is now able to capture and process complex multimedia data such as video, audio, and images. For example, with the help of new sensing technologies, it is possible to provide proper images and audio-visual feeds in different surveillance applications, in addition to the scalar parameters of environment. The easy availability of inexpensive miniaturized hardware such as cameras and microphones, the advancements in distributed signal processing, and multimedia source coding allow much richer sampling of the environment than traditional WSNs. This trend opened up new opportunities for protocol designers to propose effective and energy-efficient solutions of the existing problems [1–62].
Network applications
Applications of WMSNs introduce new multimedia features in addition to the general capabilities of WSNs, to enrich them in terms of monitoring. Along with enhancing the existing sensor network applications, WMSNs use various multimedia-specific ideas to pioneer new opportunities in this field. We classify these applications of WMSNs into several categories and explain them briefly in this chapter.
Wireless sensor networks (WSNs) exhibit an “autocratic” operational policy with minimal human intervention. So, such networks must be self-configurable to maintain their autonomy. The requisitions of WSN-specific applications are quenched by temporal cooperation and coordination among the sensor nodes. Naturally, these nodes are expected to perpetuate a healthy intra-network infrastructure. However, they are power constrained with a bounded communication range and low computational ability. Hence, issues related to network infrastructure should be dynamically handled with efficacy.
Topology is a vital aspect of WSNs that needs attention for both network and fault management. In this chapter, we focus on two aspects of topology: (a) topology management, and (b) topology control.
Topology management is the process of deriving a simple graph of node connectivity by determining the inter-nodal links and virtual relationships for efficient operations within a network contour. Topology management aims at conserving the energy of the nodes and consequently extending the lifetime of the network with parallel maintenance of network connectivity.
Topology control of a WSN is a measure of the degree of network coverage and internode connectivity. Topology management and control might appear analogous. However, these two aspects are distinct, and so is their categorization, which we will discuss in this chapter.
Communication between vehicles (and between vehicles and available infrastructure) is the topic of this chapter. Essentially, we give a basic introduction to inter-vehicle communication (IVC) identifying the key concepts in the safety as well as in the non-safety application domains. For this, we derive all the relevant communication concepts and solutions for those applications and, most importantly, identify the requirements such as maximum delays, minimum dissemination range, or minimum data rates. Furthermore, we present an overview on the possible communication paradigms, such as whether information is to be exchanged without the help of any available infrastructure or whether infrastructure elements – roadside units (RSUs), parked vehicles, or even widely deployed cellular networks – can be used for the information exchange.
The scope of this chapter is to introduce IVC as an active research field. The main motivation is to become familiar with the field to a level that helps one to understanding the fundamental concepts and their limitations. All the communication principles outlined will be studied in greater detail in the following chapters.
This chapter is organized as follows.
• Applications (Section 3.1) – In this section, we introduce the field starting with typical applications for IVC. We will show that the scope and character of these applications vary widely, which complicates the development of common and generalized IVC protocols.
• Requirements and components (Section 3.2) – Starting from knowledge about IVC applications, we derive requirements on IVC solutions and study metrics to assess their effectiveness. In a second part, we introduce all the communication entities involved and possible mechanisms for information exchange.
• Concepts for inter-vehicle communication (Section 3.3) – This section can be regarded as the main part of this chapter. We broadly study all the communication principles and protocols that have been considered for IVC. This overview explains why the different protocols have been studied and what their main advantages and disadvantages are.
• Fundamental limits (Section 3.4) – We conclude this chapter by discussing fundamental limits for IVC.
Wireless sensor networks (WSNs) have fascinated both the research and development communities. Applications of WSNs have mushroomed in both civilian and military domains. The growth of wireless sensor networks was originally motivated by military applications; however, WSNs are now used in all kinds of civilian and industrial applications [1–20]. Currently, the overwhelming majority of WSNs measure scalar tangible phenomena such as humidity, pressure, temperature, movement, and pollutants. Typically, most WSNs are built for delay-tolerant and low-bandwidth applications. Hence, most research efforts have concentrated on this latter paradigm, which is often called terrestrial sensor networks. In any WSN application the main challenge is the lifetime of the network. A WSN structure includes a gateway that offers wireless connectivity back to the wired/fixed network.
In nearly all applications of the WSNs, they are used to monitor certain physical processes. They are deployed for measuring the temperature, air pressure, radiation of the human body, chemical reactions, movement of objects, vitals of the body, and so on. By doing this we can recover some important information of the boundaries that are often called edges. To keep track of the edge of a physical development, the recognition of a boundary is imperative. The issue of discovering the boundary is considered to be the first step for resolving the edge detection. In digital processing there are many methods for identifying the edge; however, they are not easy to implement in the WSNs’ environment since the sensor nodes are not equally spaced like pixels, and because of limited computational power and memory [3–6].
Wireless sensor networks (WSNs) use the same medium (which is the air) for wireless transmission that the nodes in a wireless local area network use. In order for nodes in a local area network to communicate properly, standard access protocols like IEEE 802.11, IEEE 802.15.4, and ZigBee, are available. However, these and other protocols cannot be directly applied to the wireless sensor area networks. The major difference is that, unlike the devices participating in local area networks, sensors are equipped with a small source of power (usually a battery), which drains very quickly. In addition, sensor nodes have limited resources of memory and computational power. Hence, there is a need to design new protocols for medium access control (MAC). This chapter investigates some of the major MAC protocols available [1–7].
Medium access control in wireless networks
There exists a very good set of standard protocols for wired and wireless area networks, which are proven to operate efficiently. There are many reasons for not using the wired and traditional wireless MAC protocols for WSNs. The standard protocols in wired local area networks use the well-known carrier sense multiple access with collision detection (CSMA/CD) scheme for individual stations to access the medium. This protocol, the IEEE 802.3, is known as Ethernet [1–46]. In this scheme, each station senses a medium for a random amount of time. If no activity is detected it starts its own transmission. If it detects any activity in the medium it defers its transmission until the activity ceases. If it senses a collision of packets from different nodes in the networks it backs off a random exponential amount of time and then starts contending for transmission using the backoff exponential algorithm. Slotted ALOHA networks traditionally use a time division multiple access (TDMA) scheme [9–10]. In this scheme, the time is divided into an equal number of slots such that a node is allowed to transmit only in its allotted slot. Here, the disadvantage is that a node is allowed to transmit if and only if it owns the slot; otherwise it has to listen to the medium for the data intended for it. Therefore, if the node has no data to send the bandwidth is simply wasted because there will be no activity for the amount of slot time allotted to a node with no data.
Radio access technologies like WiFi, IEEE 802.11p, and LTE form the basis of any communication stack, and the choice of technology heavily influences application performance. They are the topic of this chapter.
In general, two families of radio access technologies can be differentiated: those based on cellular networks and those based on short-range radio. Traditionally, these two families were conceptually vastly different. Cellular networks relied on central coordination, whereas short-range radio operated in a fully distributed fashion. Cellular networks used licensed spectrum, whereas short-range radio had to make do with unlicensed spectrum. These differentiations are no longer strictly true. Cellular networks are slowly moving towards (some) distributed control, while short-range radio, particularly for inter-vehicle communication (IVC), is profitting from infrastructure support and central services. Further, short-range radio for IVC can now rely on allocated dedicated spectrum. A new trend further blends licensed and unlicensed spectrum into spectrum that has primary users, which can access the spectrum with absolute priority, but one also allows its white spaces to be filled by non-primary users.
We will take a detailed look at the concepts and the underlying principles of representative radio access technologies from both families, always with a focus on their use in vehicular networks.
This chapter is organized as follows.
• Cellular networks (Section 4.1) – We start by following the evolution of the Third Generation Partnership Project (3GPP) family of cellular networks: from GSM, via UMTS, to LTE, with a perspective on future technologies. We will always be considering both halves of a cellular network, that is, the air interface and the radio access network (RAN), as well as the core network.
• Short-range radio technologies (Section 4.2) – We then turn towards a classical short-range radio technology, following the evolution of IEEE 802.11 wireless LAN (WLAN) and its many extensions. We discuss one extension in particular detail: IEEE 802.11p, which extended WLAN for use in vehicular networks. Lastly, we discuss efforts building on WLAN to provide a complete IVC protocol suite.
The decision on the overall functionality to provide with a car is first of all a marketing decision and independent of the in-car networking technologies used and available. However, as soon as decisions have to be made on how to enable the functionality, in-car networking becomes important. Aspects like flexibility, scalability, or how to distribute functions are severely impacted by the properties of in-car networking. This chapter thus discusses the opportunities and changes Automotive Ethernet brings to system development.
A brief overview of the system development process
The development process in automotive follows the V-cycle. While Section 2.3.1 used the V-cycle to explain the responsibilities shared between car manufacturer and Tier 1 supplier, in this section the model is used to explain the changes the introduction of Ethernet-based communication brings to the development process. The important idea of the V-cycle is to follow a top-down approach on the development side and a bottom-up approach on the test side. On both sides, each new step requires the conclusion of the previous. During the development, the later need for testing is directly supported with the provision of test cases. This ensures stringent test coverage.
On 11 November 2013, I [Kirsten Matheus] attended a celebration of 40 years since the invention of Ethernet at an IEEE 802 plenary meeting. During the celebration Robert Metcalfe, David Boggs, Ronald Crane, and Geoff Thompson were honoured as the pioneers of Ethernet. If I had to name the people without whom Automotive Ethernet would not have happened, I would name Thomas Königseder, technical expert at BMW and co-author of this book, and Neven Pischl, EMC expert at Broadcom.
It all started in 2004, when Thomas received the responsibility for speeding up the software flash process for BMW cars. With the CAN interface used at the time, flashing the 1 Gbyte of data anticipated for 2008 would have required 16 hours to complete. After careful evaluation, Thomas chose and enabled the use of standard 100BASE-TX Ethernet for this purpose. Thus in 2008 the first serial car with an Ethernet interface, a BMW 7-series, was introduced to the world.
An explanation of the needs, the development, and some of the choices in in-car networking starts with the windows. When automobiles were invented they were simply machines on wheels without windows. It was only later that windows were added, first at the front, then at the sides and back. The windows were static or insertable in one piece. This obviously was not very comfortable, neither for the handling of the windows, nor for the temperature regulation in the passenger cabin. Thus, in 1928 the first mechanical window winder, able to hold a window at any position desired, was presented to the public [1]. The first power windows were introduced in 1941 [2]. BMW was the first company to introduce power windows in Europe and the first BMW with all electric power windows was a “Serie 2 BMW 503,” which had an SOP at the end of 1957 [3]. This is where it gets interesting.
It is quite straightforward to imagine a switch in a vehicle door that actuates the electric motor for a window located in the same door. Everything is in one physical location and the wiring will be short. The wiring gets longer when all movable windows are required to be controllable by the driver, in addition to the “local” control in every door. More wiring between almost exactly the same locations is needed if a central door lock plus an electronic side mirror adjustment are also discretely wired. Figure 2.1(a) indicates that with only the basic comfort functions the size, weight, and number of wires will soon become prohibitive. In the case of discrete wiring, inventiveness quickly circles around the question of “How is it possible to fit another wire onto this inline connector or through this opening between e.g. body and door?” instead of fully exploring the possibilities of creating a new feature. On top of this, large wiring bundles are not only heavy, costly, and hard to install, but also error prone and difficult to diagnose [4].
To understand physical transmission in in-car networks two aspects are important: the actual automotive environment in which the communication happens and how the properties of the PHY technology ensure its use in this environment. This chapter will therefore start with the PHY technologies in Section 4.1, explain the automotive channel in Section 4.2, and discuss ElectroMagnetic Compatibility (EMC) in Section 4.3. Other important requirements in this context, such as semiconductor quality, Power over Data Line (PoDL), and Energy Efficient Ethernet (EEE), are introduced in Section 4.4.
The Physical Layer (PHY) technology
100 Mbps BroadR-Reach (OABR)
It all started with the IEEE 802.3 1000BASE-T standard. During its development, the engineers at Broadcom learned to handle the communication challenges that needed to be mastered for such a high data rate transmission. So when Ethernet in the First Mile (EFM) was being developed at IEEE, Broadcom reused some of the basic principles of 1000BASE-T for a suitable solution: instead of four pairs of wiring one pair was used and the channel coding was made more robust, so that it was possible to transmit 100 Mbps data over a worse, i.e. longer, channel. IEEE standardized a different solution for EFM, while Broadcom proposed their technology for EFM in China [1]. When BMW was looking for an Ethernet solution suitable for automotive another interesting use case was found for the Broadcom technology.
In 1969 employees at AT&T/Bell Labs developed the first version of Unix. The original intention was to aid the company’s internal development of software on and for multiple platforms, but over time Unix evolved to be a very widespread and powerful operating system, which facilitated distributed computing. An important reason for the successful proliferation of Unix was that for antitrust reasons AT&T was neither allowed to sell Unix nor to keep the intellectual property to itself [1]. In consequence Unix – in source code – was shared with everybody interested.
It was especially, but not only, embraced by universities and the community that evolved provided the basis for the computing environment we are used to today and in which also Ethernet has its place. At a time when computing was dominated by large, proprietary, and very expensive mainframe computers few people could use, Unix created a demand for Local Area Networking (LAN) while at the same time providing an affordable, common platform for developing it [2]. As one example, a group at the University of California, Berkeley created a Unix derivative. The Berkeley Software Distribution (BSD) was first released in 1978 and its evolutions became as established as the “BSD-style license” attached to it [3]. Another example is the TCP protocol. The first version of this, published in 1974, was implemented for Unix by the University of Stanford by 1979 [4]. Later in 1989, the then up-to-date TCP/IP code for Unix from AT&T was placed in the public domain and thus significantly helped to distribute the TCP/IP Internet Protocol Suite [5].