ad hoc networks - electrical and computer engineeringekici/papers/vanet_survey_adhoc.pdf · network...

18
A survey of cross-layer design for VANETs Boangoat Jarupan , Eylem Ekici Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, United States article info Article history: Received 9 November 2010 Accepted 17 November 2010 Available online xxxx Keywords: Cross-layer design VANETs Vehicular networks abstract Recently, vehicular communication systems have attracted much attention, fueled largely by the growing interest in Intelligent Transportation Systems (ITS). These systems are aimed at addressing critical issues like passenger safety and traffic congestion, by integrat- ing information and communication technologies into transportation infrastructure and vehicles. They are built on top of self organizing networks, known as a Vehicular Ad hoc Net- works (VANET), composed of mobile vehicles connected by wireless links. While the solu- tions based on the traditional layered communication system architectures such as OSI model are readily applicable, they often fail to address the fundamental problems in ad hoc networks, such as dynamic changes in the network topology. Furthermore, many ITS applications impose stringent QoS requirements, which are not met by existing ad hoc net- working solutions. The paradigm of cross-layer design has been introduced as an alterna- tive to pure layered design to develop communication protocols. Cross-layer design allows information to be exchanged and shared across layer boundaries in order to enable efficient and robust protocols. There has been several research efforts that validated the importance of cross-layer design in vehicular networks. In this article, a survey of recent work on cross- layer communication solutions for VANETs is presented. Major approaches to cross-layer protocol design is introduced, followed by an overview of corresponding cross-layer proto- cols. Finally, open research problems in developing efficient cross-layer protocols for next generation transportation systems are discussed. Ó 2010 Elsevier B.V. All rights reserved. 1. Introduction In recent years, the number of motorists has been increasing drastically due to rapid urbanization. Critical traffic problems such as accidents and traffic congestion require the development of new transportation systems. The Intelligent Transportation Systems (ITS) are the inte- gration of telecommunication and information technolo- gies into transportation systems to improve the safety and efficiency of transportation systems [1]. The main tar- get of ITS is safety-related applications such as an emer- gency warning system which provides warning messages to vehicles in the affected area. Other informative and traveler-oriented applications include the electronic traffic information, electronic toll collection, etc. To cater to a wide class of applications, ITS supports two types of wireless communication: long-range and short- range. The long-range communication mainly relies on the existing infrastructure networks such as cellular net- works. The short-range communication, on the other hand, is based on emerging technologies such as 802.11 variants, and form mobile ad hoc networks comprised of mobile vehicles and stationary roadside equipments. The resulting network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types of communication: vehicle- to-vehicle (V2V) and vehicle-to-infrastructure (V2I). While V2V deals with communication among vehicles them- selves, V2I is concerned about transmitting information between a vehicle and the fixed infrastructure that is 1570-8705/$ - see front matter Ó 2010 Elsevier B.V. All rights reserved. doi:10.1016/j.adhoc.2010.11.007 Corresponding author. Tel.: +1 6142920495. E-mail addresses: [email protected] (B. Jarupan), [email protected] (E. Ekici). Ad Hoc Networks xxx (2011) xxx–xxx Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Please cite this article in press as: B. Jarupan, E. Ekici, A survey of cross-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/ j.adhoc.2010.11.007

Upload: others

Post on 05-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

Ad Hoc Networks xxx (2011) xxx–xxx

Contents lists available at ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

A survey of cross-layer design for VANETs

Boangoat Jarupan ⇑, Eylem EkiciDepartment of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, United States

a r t i c l e i n f o

Article history:Received 9 November 2010Accepted 17 November 2010Available online xxxx

Keywords:Cross-layer designVANETsVehicular networks

1570-8705/$ - see front matter � 2010 Elsevier B.Vdoi:10.1016/j.adhoc.2010.11.007

⇑ Corresponding author. Tel.: +1 6142920495.E-mail addresses: [email protected] (B. Jarupan),

Ekici).

Please cite this article in press as: B. Jarupanj.adhoc.2010.11.007

a b s t r a c t

Recently, vehicular communication systems have attracted much attention, fueled largelyby the growing interest in Intelligent Transportation Systems (ITS). These systems areaimed at addressing critical issues like passenger safety and traffic congestion, by integrat-ing information and communication technologies into transportation infrastructure andvehicles. They are built on top of self organizing networks, known as a Vehicular Ad hoc Net-works (VANET), composed of mobile vehicles connected by wireless links. While the solu-tions based on the traditional layered communication system architectures such as OSImodel are readily applicable, they often fail to address the fundamental problems in adhoc networks, such as dynamic changes in the network topology. Furthermore, many ITSapplications impose stringent QoS requirements, which are not met by existing ad hoc net-working solutions. The paradigm of cross-layer design has been introduced as an alterna-tive to pure layered design to develop communication protocols. Cross-layer design allowsinformation to be exchanged and shared across layer boundaries in order to enable efficientand robust protocols. There has been several research efforts that validated the importanceof cross-layer design in vehicular networks. In this article, a survey of recent work on cross-layer communication solutions for VANETs is presented. Major approaches to cross-layerprotocol design is introduced, followed by an overview of corresponding cross-layer proto-cols. Finally, open research problems in developing efficient cross-layer protocols for nextgeneration transportation systems are discussed.

� 2010 Elsevier B.V. All rights reserved.

1. Introduction

In recent years, the number of motorists has beenincreasing drastically due to rapid urbanization. Criticaltraffic problems such as accidents and traffic congestionrequire the development of new transportation systems.The Intelligent Transportation Systems (ITS) are the inte-gration of telecommunication and information technolo-gies into transportation systems to improve the safetyand efficiency of transportation systems [1]. The main tar-get of ITS is safety-related applications such as an emer-gency warning system which provides warning messagesto vehicles in the affected area. Other informative and

. All rights reserved.

[email protected] (E.

, E. Ekici, A survey of cro

traveler-oriented applications include the electronic trafficinformation, electronic toll collection, etc.

To cater to a wide class of applications, ITS supports twotypes of wireless communication: long-range and short-range. The long-range communication mainly relies onthe existing infrastructure networks such as cellular net-works. The short-range communication, on the other hand,is based on emerging technologies such as 802.11 variants,and form mobile ad hoc networks comprised of mobilevehicles and stationary roadside equipments. The resultingnetwork is referred to as Vehicular Ad Hoc Networks(VANETs).

VANETs support two types of communication: vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). WhileV2V deals with communication among vehicles them-selves, V2I is concerned about transmitting informationbetween a vehicle and the fixed infrastructure that is

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 2: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

2 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

installed along the road. Such infrastructure may includegateways or base stations, and they provide services suchas Internet access in VANETs. Vehicular networks share anumber of similarities with MANETs in terms of self-orga-nization, self-management, and low bandwidth. Howeverunlike in MANETs, the network topology in vehicular net-works is highly dynamic due to fast movement of vehiclesand the topology is often constrained by the road structure.Furthermore, vehicles are likely to encounter a lot of obsta-cles such as traffic lights, buildings, or trees, resulting inpoor channel quality and connectivity. Therefore, protocolsdeveloped for traditional MANETs fail to provide reliable,high throughput, and low latency performance in VANETs.Thus, there is a pressing need for effective protocols thattake the specific characteristics of vehicular networks intoaccount.

A major setback in applying MANET protocols to VA-NETS is the ability to adapt to conditions such as frequenttopological changes. This adaptability issue is primarilydue to the fact that MANET protocols are designed based

Table 1Summary table.

Protocol Objective Summ

Sections 4, 5[3] Improve link layer communication Packet

SNR-trSoftRate [4] Improve link layer communication BER-esVFHS-MMR [5] Minimize handover delay Relay802.11e+ [6] Improve link layer communication Transm

packetTDMA/TDD+ [8] Improve link layer communication TransmDFAv [9] Improve Fairness TransmRPB-MACn [10] Reduce packet collision Transm

multipLRT [11] Maintain path connectivity Link liSBRS-OLSR [12] Maintain path connectivity Relay

Section 6MOPR [13] Discover most stable routes AODVR-AOMDV [14] Communicate over minimum delay

pathsUsingcount

PROMPT [16] Communicate over minimum delaypaths

Distan

[17] Discover most stable routes RouteCVIA [19] Collision avoidance SegmeCCBF [20] Collision avoidance ClusteDBAMAC [21] Minimize broadcast delay ClusteDeReHQ [22] Discover most stable routes Path se[23] Minimize broadcast overhead Packet

controCVIA-QoS [24] Provide service garuntees PacketUMB/AMB [25,26] Avoid flooding problem 802.11

gatew802.11+ [27] Avoid flooding problem 802.11

Sections 7–10TCTC [29] Maximize throughput, minimize end-

to-end delayTransm

[30] Maintain path connectivity Link faATCP [31] Maintain path connectivity Link faVTP [32] Maintain path connectivity Link fa[34] Maximize throughput AdaptOC-MAC [36] Maximize throughput MaximDRCV [37] Maximize throughput Light w[38,39] Maximize throughput TransmCabernet [40] Reduce connection time to BS QuickWMCTP [41] Maximize throughput Link fa

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

on the standard OSI model of layered network stack archi-tecture. They follow a divide-and-conquer approach tofacilitate the interoperability among different computersystems. Such an architecture offers simplicity and modu-larity where the functionality of one layer is completelytransparent from other layers. However, such a strict-lay-ered architecture is not flexible enough to adequately sup-port the needs of wireless communication in highlydynamic vehicular networks.

The wireless communication in VANETs is inherentlyerror-prone, and suffers from issues like noise, path lossand interference as in MANETs. In addition, VANETs mustdeal with vehicle high mobility and frequent route disrup-tions. Effective handling of these issues require an informa-tion exchange among layers so that one can jointlyoptimize different layers to achieve better throughputand good transmission latency. For example, routing proto-cols can leverage the information obtained from physicaland MAC layers such as noise and interference levels todiscover stable and best possible routes to the destination.

ary Cross-layer approach

loss triggered rate adaptation M1-observation tableiggered rate adaptation M1-via control messagestimated rate adaptation M1-SoftPHY interface

selection M1-via NTM messageission range adaptation and QoS

-based prioritizationM1-neighbor information

ission power adaptation M1-neighbor informationission power adaptation M1-neighbor information tableission power adaptation of

le channelsM1-neighbor information

fe-time prediction M1-packet-based informationselection based on SNR values M1-neighbor information

-based method M1-neighbor informationhop count and retransmission M1-via RREQ/RREP packets

ce-location relay node selection M3-design coupling

life-time prediction M1-route informationnt-based packet forwarding M3-design couplingr-based packet forwarding M3-design couplingr-based solution M3-design couplinglection based on QoS parameters M4-path selection policyprioritization and queuing

lM4-benefit policy

prioritize scheduling M3-design coupling-based receiver contention with

aysM3-design coupling

-based receiver contention M2-design merging

ission rate estimation M1-packet-based information

ilures vs. network congestions M1-via ELFN messagesilures vs. network congestions M1-via ECN-ICMP messagesilures vs. network congestions M1-packet-based information

ation of beaconing interval M1-neighbor informationize path utility function M4-via JOCeight congestion control M1-channel monitoringission power adaptation M1-neighbor informationiFi connection process M2-combined functionalities

ilures vs. network congestions M1-via ECN-ICMP messages

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 3: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 3

The so-called cross-layer design has gained popularity inwireless networks due to its high performance, especiallyin delivering QoS support for real-time applications. In thisarticle, we first present the overview of cross-layer designstrategies and challenges associated with them. Next, weexplore different cross-layer schemes in VANETs and theirimplementations. We concentrate on the challenges posedby vehicular networks and discuss how cross-layer solu-tions address these challenges to improve the overall sys-tem performance. At the end of the article, wesummarize the cross-layer design approaches as shownin Table 1. We finally conclude this article by discussingimportant open problems, and avenues for continuedresearch.

2. Overview of cross-layer design approaches

There have been a large number of proposals for cross-layer design in wireless networks. However, the definitionof ‘‘cross-layer’’ is often ambiguous and inconsistent due tomany interpretations. At a high-level, the cross-layer de-sign refers to a protocol design that exploits the depen-dency between protocol layers to achieve desirableperformance gains. The designs can be classified based onhow the information is exchanged between layers. In [2],authors showed that cross-layer optimization can be donevia four different approaches. The pictorial demonstrationof these approaches is shown in Fig. 1, and we briefly pres-ent their details below.

1. M1: Information flow with new interfaces: In a traditionallayered structure, protocols in each layer operate in amodular fashion to optimize their own set of variables.In contrast, this class of cross-layer designs promotethe information flow between layers via specializedinterfaces. Information obtained from other layersoffers useful knowledge on network status and commu-nication characteristics, which can then be exploited inbetter decision making, in adjusting parameters, etc.The information flow interface can be accomplishedthrough additional database that is shared among

(a) (b)Fig. 1. Cross-layer design approaches [2] – (a) M1:information flow with newwithout new interfaces, and (d) M4: vertical calibration across layers.

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

layers, or through notification fields inside packets,which are passed between layers.

2. M2: Merging of adjacent layers: According to this strat-egy, the service and functionalities of adjacent layersare combined to form a single layer called superlayer.Since the layers are combined, joint optimization canbe done directly on the superlayer as if we are buildinga single large uniform protocol. Evidently, this methoddoes not require any additional interfaces. However,this approach is extreme and it uncommon due to thecomplexity it brings in to the superlayer. Also, thisapproach may have severe impact on maintenanceand system stability.

3. M3: Design coupling without new interfaces: In this strat-egy, multiple layers are designed in a collaborativemanner. We design one layer by looking at the func-tionality in another layer, thereby creating a depen-dency even at the time of designing. The referencedlayer is called fixed layer (FL) and the other layer iscalled designed layer (DL). Since DL is built based onFL, there is no need for an explicit interface betweenthem. For example, if the PHY layer is capable of multi-ple packet reception, then the MAC layer must beadjusted accordingly. In this particular case, PHY layeris the FL whereas MAC layer is the DL. Note that, anychange in FL must be followed with an equivalentchange in DL.

4. M4: Vertical calibration across layers: This strategy refersto adjusting parameters that span multiple layers in thestack. Since the performance seen at the level of appli-cation depends on the parameter settings of all down-stream layers, it is often desirable to jointly optimizethe parameters from all downstream layers. Such amethod achieves better performance when comparedto a method that tunes the parameters in each layerindependently. The joint optimization can either bestatic i.e., performed at design time or dynamic i.e., per-formed at run-time. Dynamic optimization is evidentlymore complex and it requires constant informationupdate across layers to ensure accuracy. Algorithmsthat fall into this category often maintains a database

(c) (d)interfaces, (b) M2: merging of adjacent layers, (c) M3: design coupling

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 4: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

4 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

or a repository to store the information that is sharedamong layers.

From this high-level classification of various designstrategies, it is apparent that implementation of cross-layer protocols may require additional processing or stor-age capabilities. Unlike other ad hoc networks, vehiclescan afford to carry high performance processing units,can potentially host large memory space, and are con-nected to virtually unlimited power sources. Thus, thereis a high scope for future research in cross-layer protocolsfor VANETs. In the rest of this article, we discuss variousexisting protocols, and we connect them to the above-de-scribed four design strategies. A summary can be foundin Table 1.

3. Cross-layer design challenges

The challenges that a designer would face while devel-oping cross-layer protocols for vehicular networks are asfollows: deciding the list of layers that need to be includedin cross-layer optimizations, and determining the beststrategy under a given set of performance requirements.The chosen strategy must also be able to deal with inher-ent performance bottlenecks related to wireless communi-cation in VANETs.

3.1. Requirement analysis

Prior to the development of any cross-layer system, onemust take the necessary requirements into consideration.The set of requirements can be of two primary types –application-oriented and performance-oriented. The for-mer type is based on the needs of end-applications. For in-stance, safety-related applications require fast, reliablebroadcast communication; and multimedia applicationsrequire adjustable QoS service and reliable point-to-pointcommunication. On the other hand, performance-orientedrequirements are typically set by system-wide objectives.An example of such an objective is to design a system thatimproves the success rate in link layer communication byallowing vehicles to adjust their transmission power adap-tively. Such an objective can further be broken down intoconstraints like delay minimization and throughputmaximization.

Given the list of objectives, the challenge in traditionallayered protocol design is to decide the strategies thatneed to be implemented in every layer. In case of cross-lay-ered design, one must also decide the list of layers overwhich the cross-layer optimization is performed. Forexample, safety-related applications demand a fast andreliable broadcasting mechanism for emergency messages.Such a requirement would require some form of cross-layer treatment between MAC and network layers. Onthe other hand, multimedia applications that require effec-tive TCP flow control must be implemented via cross-layeroptimization among transport layer and other lower lay-ers. As we identify the list of layers that need to be opti-mized for a given set of requirements, one must alsofocus on performance, implementation cost, and design

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

complexity. While the performance of cross-layer solutionsmust be better than pure layered protocols, the designcomplexity and implementation cost must be small.Including more number of layers in cross-layer designmay improve the performance, but it may also increasethe complexity and implementation cost of the solution.

3.2. Implementation strategy

Once the layers that must be optimized are determined,the next challenge is to find an appropriate strategy toimplement the optimization. Current research in cross-layer protocols offer four different methods as presentedin Section 2. The exact choice among these alternativescan be made by considering the following factors:

– Amount of change from traditional layered design: Out ofall four strategies, M1 requires minimum modificationto classic layered design as they rely on simple informa-tion sharing between layers. Appropriate interface suchas a database is added to facilitate such an exchange ofinformation. When compared to M1, other strategiesthat rely on M2 and M3 require a higher degree of mod-ification to existing layered approaches. They requireadditional functionalities to be built into existing layers,and they demand more closer interactions between lay-ers. The cross-layer design strategy M4, on the otherhand, is similar to M1 as it requires all layers to collectand share information. Examples of such informationinclude channel condition at physical layer, packet loadcondition at MAC layer, and network conditions at net-work layer.

– Implementation cost and extensibility: Designers mustfocus on protocols that have minimal implementationcost and those that are easily extendible with moreadvanced features. The tighter the integration betweenlayers, the harder it would be to extend them. Forexample, interface-based strategies involve simple datastructures that are shared between layers and hencethey are easy to extend when compared to moreinvolved strategies such as design coupling. On theother hand, the design coupling solutions typically haveminimal implementation and communication cost sincethere is no need for additional interface between thelayers. One must carefully analyze the impact of thesedifferent strategies before deciding on a particularmethod to implement the cross-layer protocol.

3.3. VANET specific constraints

Apart from above-mentioned issues, cross-layer proto-col designs must also address the fundamental prob-lems in VANETs such as high vehicular mobility,constant topological changes, error-prone wirelesschannel, and limited channel bandwidth. New cross-layer designs must handle these challenges much moreefficiently when compared to traditional layeredprotocols.

In this article, we summarize the research that has beendone so far in designing cross-layer solutions for VANETs.

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 5: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 5

We categorize existing work into different sections basedon the type of interactions that the protocols demand.

4. Cross-layer design for PHY-MAC layers

Physical layer (PHY) links several vehicles within thetransmission range through the wireless channel. Wirelesscommunication at PHY layer in VANETs is severely affectedby time and space varying channel properties due to thevehicle movement and environmental obstacles. Thus,many cross-layer solutions provide ability for PHY layerto observe the channel condition and to opportunisticallytransmit messages when current channel condition isgood. The channel condition not only affects the transmit-ting ability but it is also affects the receiving ability of vehi-cles. Thus there are number of existing solutions that arebased on signal strength measuring at the receivers. In thissection, we discussed some of existing solutions regardingto the PHY layer parameters such as transmission rate,transmission channel, or transmission power.

4.1. Transmission rate adaptation

Transmission rate adaptation is the ability to adjust themodulation rate at which packets are transmitted accord-ing to the observed channel qualities such as signal-to-noise ratio (SNR) and packet loss rate. Since both over-selec-tion and under-selection of the modulation rate can se-verely affect the communication performance, thefeedback information of channel condition is useful to im-prove the performance. The typical control flow in thistype of solutions consists of three main steps: choose ini-tial values of target parameters; observe the system condi-tion; and adjust the parameters accordingly. The cross-layer solutions in this section are mainly based on theinformation flow between MAC layer and PHY layer.

Camp and Knightly investigated cross-layer designs formodulation rate adaptation in vehicular networks targetedat urban and downtown environments [3]. Their work in-volves high-level interaction between the MAC and physi-cal layers. Through extensive evaluations, they havestudied two protocols for rate adaptation which are Loss-triggered and SNR-triggered under a variety of channelconditions.

According to the loss-triggered protocol, the transmittersdetermine the packet loss rate by simply monitoring theframe receptions of the packet transmission in MAC layer.If an ACK is received before the timeout event then thetransmission is considered to be successful. The occurrenceof timeout in MAC protocol during transmission indicatesthat the packet delivery process is failed. Such results ofpacket delivery are collected into the database that isshared between MAC and PHY layers. Each node thendetermines an appropriate modulation rate by followingone of the two mechanisms: consecutive-packet decisionloss-triggered rate adaptation; or historical-decision loss-trig-gered rate adaptation.

In the consecutive-packet decision mechanism, themodulation rate is adapted using the sequential rate step-ping based on either consecutive successes and failures.

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

The transmitter increases the transmission rate after anumber of consecutive successful transmissions and de-creases the rate after observing several consecutive fail-ures. On the other hand, the historical-decisionadaptation observes the performance of packet deliveryover a period of time. Based on the observed results, thedecision to increase or decrease the transmission rate is ta-ken by the transmitting vehicle. While the first mechanismis entirely based on current activities, the second one takesthe historical information into account.

Note that in loss-triggered protocols, the rate adapta-tion is completely taken care by the transmitter vehicle.In contrast, SNR-triggered protocol offloads this duty tothe receiver vehicle. The receiver determines the modula-tion rate by monitoring the signal strength of control mes-sages during RTS/CTS MAC contention process. Whilereceiving a RTS packet, the receiver measures SNR valueand passes the estimated rate to the transmitter as partof the CTS packet. To further improve the success percent-age, the transmitter can send multiple data packets whenthe modulation rate is found to be higher than the base va-lue. The multiple data packets are sent back-to-back at thesame rate without additional RTS/CTS handshake. This pro-cess is called SNR-triggered with equal air time. To ensurethe accuracy of the SNR results, the observation betweenMAC and PHY layers is updated per-packet evaluations.

The experiments of both loss-triggered and SNR-trig-gered protocols are performed on diverse channel operat-ing conditions including fast-fading, multi-path, andinterference, and on heterogeneous links. The authorsfound that in fast-fading environment conditions, theloss-triggered protocols underselect the modulation rate.This is due to the delay in decision process since loss-trig-gered protocol monitors only the consecutive transmis-sions before making the decision. While SNR-triggeredprotocols overselect from the ideal rate due to coherencetime sensitivity. The problem of over-selection by SNR-triggered protocol can be addressed by using ‘‘in situ’’training. Training here refers to obtaining SNR and modu-ration rate profile in various operating environments.Overall, such training helps SNR-based protocol to achievehigher throughput when compared to loss-triggered proto-col in many areas including ability to track mobility ofvehicular clients; ability to adapt the modulation rateaccurately within interference-prone outdoor environ-ments; and ability to balance resource sharing with heter-ogeneous links.

Vutukuru et al. argued that such a SNR-based protocolin [3] requires exhaustive training in each operating envi-ronment. To avoid such an extensive analysis, they pro-posed a bit rate adaptation protocol called SoftRate [4].The receivers use confidence information calculated fromthe physical layer that is exported to higher layers via aninterface called the SoftPHY interface as shown in Fig. 2.SoftPHY estimates the channel bit-error rate (BER) uponreceiving a packet frame. This per-bit confidence informa-tion is called SoftPHY hints which is the value that can beobtained from the physical layer by using log-likelihoodratio mechanism.

However the bit-error rate that is calculated from Soft-PHY hints usually includes the interference errors caused

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 6: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

Fig. 2. SoftPHY cross-layer interaction [4].

6 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

by packet collisions. To be able to accurately estimate theinterference-free channel errors, the SoftRate receiver usesa heuristic to separate out errors caused by strong interfer-ers. The receiver then inserts this feedback information tothe sender in ACK packet. Once the sender receives theestimated BER values from the receiver, it selects the besttransmission bit-rate to send the next frame. This frame-based response is shown to yield higher system through-put when compared to SNR-based protocols. The authorssuggest that BER is a sufficient statistic to predict thethroughput and it gives a good response time to reflectthe current channel conditions. SoftRate also outperformsthe trained SNR-triggered of Camp and Knightly [3] whenthey are evaluated fading conditions based on vehicularspeeds. However, this method requires more elaboratechanges in the hardware implementation than competingloss-triggered and SNR-triggered protocols. In addition,both SNR-triggered and SoftRate protocols are highlydependent on the accuracy of signal measurement andthey suffer from the overhead of passing the informationfrom the receiver to the transmitter.

4.2. Channel selection

In vehicular networks, vehicle mobility is often re-stricted by the underlying road network topology, espe-cially on highways. Due to this spatial relation of vehicleson the roads, multi-hop packet forwarding is one of thepromising solution that a vehicle can use to communicatewith other vehicles and infrastructure elements that areoutside its immediate transmission range. For example, avehicle can forward its packets toward a base station togain an internet access even while it is driving away fromthe base station. Chiu et al. investigated a relay node for-warding protocol on freeways that uses WiMax (802.16)Mobile Multi-hop Relay (MMR) [5]. Since WiMax has longcommunication range upto 50 km (30 miles) and speedupto 1 Gbps, vehicles with WiMax can potentially act asRelay Vehicles (RVs) where they can help forwarding thepackets to longer ranges with a small delay. Such a solutionis less expensive than other methods like deploying morebase stations along the road. Since WiMax may not beavailable for all vehicles, special vehicles such as buses ortrucks can be used as RVs. RVs have full power to supportcommunication and mobility management of their neigh-bors. In fact, RVs can perform neighbor management sim-ilar to cluster networks.

The challenges with this approach, however, are inthe ability to maintain communication with RVs and in

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

reducing the incremental delay incured while searchingfor RVs. Each network disconnection requires an expensivehandover process which involves scanning for correct fre-quency to gain the RVs’ service. A special Vehicular FastHandover Scheme (VFHS) is proposed to allow OncomingSide Vehicles (OSVs) to provide channel and location infor-mation of new RVs to disconnected vehicles (DV) as shownin Fig. 3. An OSV is a vehicle traveling in opposite trafficdirection, and can accumulate the neighbors’ informationwhich is the connected vehicles (CV). The OSV insertsRVs’ information into a Network Topology Message(NTM), which is then broadcasted to disconnected vehi-cles. The NTM message contains information from bothphysical layer (i.e. vehicle position and channel frequency)and MAC layer (i.e. neighbors information) of RVs. Uponreceiving a NTM, the disconnected vehicle adjusts thechannel frequency of its WiMAX adapter based on the se-lected RV value. If the DV does not receive a NTM message,it executes the standard search procedure to find new RVs.

By avoiding the expensive RV search procedure, thehandover latency can significantly be reduced. The com-munication latency between OSVs and DV is very impor-tant here. VFHS is an example of PHY-MAC protocol thatcan help in reducing delay of handover process. Here thechannel frequency of disconnected vehicle can be changedbased on the information passing from the OSVs via NTMmessage. The VFHS utilization, however, may not be sub-stantial due to the prominent relation of OSVs and RVs.The success of getting information from OSVs is mainlybased on number of vehicles of the road in different direc-tion and RVs. Since VFHS is an application and hardwarespecific, the success of using RVs is mainly dependent onthe penetration rate of WiMax technologies.

4.3. Transmission range adaptation

Vehicle mobility affects the node connectivity of VANETs.In the sparse networks, this problem becomes much morepronounced and can cause significant packet loss. To improvethe throughput in such scenarios, sender can carry thepackets until it finds the next relay node or the destination.This mechanism is popularly known as store-and-forwardwhere it is suitable for delay tolerant applications. To beable to serve real-time applications in sparse networks,the transmission range extension is one of possible strat-egy. However, increasing transmission range has manyother implications. For example, increased transmissionrange may potentially increase the interference, whichcan lead to packet drops. Thus it is beneficial to increasethe transmission range when vehicle density is low asthe increase in interference level would be small. Alterna-tively, the transmission range can be reduced when vehicledensity is found to be very high. Therefore in this section,the existing cross-layer design solutions are mainly basedon the information flow from the MAC layer to the PHYlayer. Here, MAC layer is responsible for collecting theneighbor information to the PHY layer for transmissionpower adjustment.

Rawat et al. proposed a joint adaptation between MACand physical layer that mainly focuses on adaptation oftransmission power and QoS message prioritization based

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 7: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

a b

Fig. 3. (a) MMR scheme and (b) MMR cross-layer interaction [5].

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 7

on node density and contention window size [6]. Vehiclesestimate the node density by gathering the neighborsinformation within the current transmission range. Thenew transmission range is then derived by adopting a traf-fic flow model [7] whose parameters include length of roadsegment, estimated vehicle density, and traffic flow con-stant. Here transmission power is a function of transmis-sion range.

To support QoS applications, authors incorporated802.11e standards for message prioritization. Here authorsproposed two distinct functionalities to adjust the priorityof the packets – transmission power level in physical layerand MAC channel access parameters such as minimumcontention window (CWmin), maximum contention win-dow (CWmax), and arbitration interframe space (AIFs).

By following the 802.11e standard, packets are classi-fied into four levels of priority. The values for CWmin,CWmax, and AIF parameters are set based on the urgencylevel of the messages. In case of highest priority packets,the CWs and AIFs are set to smallest values and accord-ingly the transmission power is set to the maximum value.For other priority messages, the CWs and AIFs are set basedon the priority levels and transmission power is set basedon the node density. In order to make the system more dy-namic, contention window size can be adapted based oncollision rate in the channel and the number of back-offs.

Similarly, Caizzone et al. [8] proposed a mechanism thatadjusts the transmission power adaptively based on num-ber of neighbors. First each vehicle starts with initial trans-mission power. It incrementally increases the transmissionpower as long as the number of neighbors is within a min-imum threshold, or it reaches maximum transmissionpower value. The transmission power is decreased whenthe number of neighbors greater than maximum threshold.Otherwise transmission power remains the same if thenumber of neighbors is within minimum and maximumthreshold.

Instead of using additional exchange information todetermine number of neighbors, authors proposed channel

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

observation mechanism based on time synchronousTDMA/TDD medium access control. Vehicles monitorchannel by observing the power strength and activities ateach time slot. If the receiving power is lesser than athreshold, the channel is considered to be idle and the timeslot status is classified as available state. If not, the channelis busy where the packet may get successfully transmittedor it may fail due to collision. Successfully transmitted slotis classified as engaged state whereas unsuccessful trans-mitted slot is classified as collided state. The slot that arein engaged state is counted as number of neighbor and itis used to determine transmission power. Although thisprotocol has low communication overhead, it is not dy-namic since the transmission adaptation is based on staticparameters such as maximum and minimum number ofneighbors thresholds.

The above approaches [6,8] are focus on the effort ofindividual vehicle to adjust the transmission range basedon its own observation. Asymmetrical of the transmissionrange, however, can cause significant effect to the system.The vehicle that has higher transmission range than neigh-bors can greedily consume the bandwidth and causingunfairness to neighbors that has smaller transmissionrange. This problem is more severe in case of emergencyevent where the accident vehicle who has smaller trans-mission rage than neighbors can not broadcast their mes-sage. Distributed Fair Power Adjustment for Vehicularnetworks (D-FPAV) [9] is aimed to provide the fairness ontransmission range adaptation among the neighbors.Authors argued that adjusting transmission power shouldnot only aim to improve the connectivity but also awareof channel conditions to provide fairness to the system.

The channel condition is mainly based on the load of thechannel. D-FPAV focuses on balancing the load of controlchannel of 802.11 MAC protocol. The control channel sup-ports two types of message: periodic-based and event-based. The periodic-based message or beacons is broad-casted periodically to convey information about the stateof the sending vehicle such as position and speed, and

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 8: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

8 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

aggregated data regarding the state of its neighbors. Theevent-based message is for emergency warning which re-quires fast and reliable propagation to farther nodes. Sinceevent-based message is critical for VANETs, the availablebandwidth should be reserved to guarantee the delivery.Authors proposed a mechanism that fairness called max–min fairness algorithm.

Max–min fairness algorithm is used to estimate theminimum the transmission range based on neighborsinformation. To estimate the fair transmission range, bea-con is used to exchange the transmission power informa-tion. First a vehicle, i, broadcasts its the information atmaximum power. In the mean time, it listens to the chan-nel and collects neighbors’ information. Based on neigh-bors’ information, the vehicle i estimates the number ofneighbors and computes maximum common value Pi. Thennode i broadcasts its Pi value. Upon receiving computedmaximum power level of other nodes, node i records themon the table. Using the neighbor table, node i evaluates thefinal transmission power by taking the minimum possiblepower level of all neighbors to guarantee the connectivitywithout overuse of the channel. A second parameter thatis used control the transmission power is called MaxBeac-oningLoad (MBL). Note that the maximum Pi of each nodeshould not violate the MBL threshold. Generally, a largeMBL allows more beacons message, where small MBL lim-its number of beacons message. In this work, authors setMBL to a fix value which is a half of available bandwidth.Possible extension of the paper is to adaptively adjustMBL to control the load of the beacon in the system.

The papers that discussed above tried to adjust thetransmission power based on omnidirectional antenna.Chigan et al. introduced a solution that use multiple anten-nas for point-to-point communication called a Relative-Position-Based MAC Nucleus (RPB-MACn) [10]. Due to theperformance degradation in 802.11 multi-hop networksis often result of packet collision and interference whichare mainly caused by the hidden terminal and exposed ter-minal problems. Authors argued that to avoid such a prob-lem, vehicles must have a knowledge of neighbors’positions, and they should dynamicaly adjust the transmis-sion power to illiminate interference.

Authors proposed the run-time static relative positionrelation using eight statistically configured directional an-tenna over a single channel. Each antenna is configuredto one relative position within tagged vehicle one-hopvicinity. In the run-time, the relative position of the neigh-bors is based on overhearing of communication. For in-stance, a tagged vehicle hears a neighbor B from the rightantenna, it interprets the location of B as on the right. Sucha communication allows the tagged vehicle to communica-tion with each neighbor simultaneously. In addition, it pro-motes the spatial reuse capacity and collision-freecommunication. Essentially, RPB-MACn can also be usedfor collision-free multi-hop communication.

Since RPB-MACn depends on perfect channel separationwhich is hard to accomplished in real situation, authorsproposed the channel assignment scheme which assignsdifferent wireless channel pairs to different antenna trans-ceivers. Each directional antenna transmits and receivesmessages over its own dedicated channels based on well-

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

known channel allocation techniques such as CDMA orOFDM. In addition, authors proposed solutions to deal withother realistic situations such as non-standard surroundingpositions of neighbors where vehicles are overlapped inthe antenna vicinity as well as vehicles with differentsize and orientations. In comparison to other protocols,RPB-MACn solves the collision issue in multi-hop environ-ment. However, the main challenges remains on theimplementation cost where vehicles are required to havemultiple antennas.

5. Cross-layer design of PHY-MAC-network layers

Due to high mobility of VANETs, the wireless link be-tween two vehicles is short-lived. The channel qualityinformation from physical layer helps the sender in pre-dicting the link connection time, subsequently the sendercan find a new receiver before the current link is discon-nected. Thus cross-layer interaction between physicallayer and higher layers is desirable to maintain link con-nectivity and improve system performance.

Sofra et al. proposed a cross-layer design that uses ametric known as Link Residual Time (LRT) [11] that is com-puted based on the received power that is observed at thephysical layer. The value of LRT can be used to estimate thelongevity of the link, and it denotes the remaining time forwhich the link can be used for packet transmission. LRTvalues can be used in higher layers to make better deci-sions for hand-off, scheduling, and routing packets. Eachvehicle monitors and records the arrival time and the re-ceived power level for each packet that is received on thelink. This time series of values is then used to estimatethe value of LRT.

The process of LRT estimation has three main steps: (i)remove the noise from the data, and check if the link qual-ity is deteriorating, (ii) estimating the model parametersthat are required to compute a value for LRT, and (iii)renewing LRT estimate. The first step in the estimationprocess is to remove the noise in the data that may arisedue to shadowing and multi-path fading. The denoisingprocess uses a signal processing method called EmpiricalMode Decomposition (EMD). Once the noise is removed,the change in link quality is observed to see if it is deteri-orating. The link quality deteriorates when the sender andreceiver vehicles move away from each other. On the otherhand, the link quality improves when the vehicles traveltowards each other. Link quality is observed via robustregression method, a modified version of the simpleregression. Whenever a new packet is received, the meansquared error between the observed received power andthe value estimated form the regression is computed. Apossible change in the link quality is detected by compar-ing the error value with the error values computed in pre-vious iterations. When the link quality is found to bedeteriorating, a new estimate for LRT is computed in sec-ond and third steps. This process involves estimatingparameters related to distance between the sender andthe receiver and the received power values. This methodis shown to predict the residual life of wireless links well

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 9: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 9

before the communication failure occurs, which is valuablefor higher layers to maintain path connectivity.

While Sofra et al. focused on individual nodes, Singhet al. explored the use of link connectivity informationamong neighbors to help in addressing the challenges indesigning routing protocols for VANET environments. Theyproposed a cross-layer protocol called Signal StrengthAssessment Based Route Selection for OLSR (SBRS-OLSR)[12]. In this framework, the link connectivity is based onSNR measurement, and the routing protocol is based onexisting Optimized Link State Routing (OLSR).

In existing OLSR, a link-state table-driven method isused to create a routing table between any source and des-tination pair. Due to constant vehicular movement, routinginformation in OLSR table can become stale over a periodof time. SBRS-OLSR therefore uses MultiPoint Relays (MPRs)links to help maintain the routing information. MPRs linksconsists of multiple MPR nodes. These links are for fastbroadcast topology information. In SBRS-OLSR protocol,only MPR nodes are able to broadcast topology informa-tion. While in existing OLSR protocol, all nodes broadcastthe update topology information.

To improve link connectivity, MPRs node is selectedbased on highest SNR values among neighbors. The deter-mined SNR values are passed during neighbor discoveryprocess. By capturing SNR information from the physicallayer, the network layer can provide a better route that im-proves throughput and delay performance. Unlike cross-layer solutions in Section 4, the cross-layer design of LRTand SBR-OLSR are based on the information flow fromthe physical layer to the network layer.

6. Cross-layer design of network-MAC layers

One of the foremost challenges in vehicular networks isto design protocols that can handle the high mobility ofvehicles and constant changes in the underlying topology.The routing protocols must deal with frequent changes inthe routing topology and maintain link stability betweenvehicles. If the route is disconnected, a new route mustbe discovered instantly. In order to effectively maintainthe route information in such dynamic networks, mostrouting protocols rely on geographic information as op-posed to address-based identification that is typically usedin MANETs. These techniques can be complemented withcross-layer designs that exploit the relation betweenMAC and network layers. For example, the routing functioncan leverage the information shared by the MAC functionin predicting the life-time of various links, and subse-quently adjust the routes, if necessary. We now presentvarious cross-layer approaches that make use of connec-tions between MAC and network layers.

6.1. Route selection

In multi-hop wireless communication, the shortest pathor the minimum hop path is not guaranteed to be the min-imum delay path between a given pair of source and des-tination nodes. This is mainly due to the condition of thelinks within the selected path. For instance in the areas

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

that are dense with a lot of vehicles, the links are likelyto experience high contention delay thereby causing highend-to-end delay. Therefore, effective routing functionsmust consider the quality of entire path as well as the indi-vidual link quality while routing the packets. However,information on the quality of individual links is typicallyknown at the level of MAC layer. This information can bepassed onto the network layer to select better paths thatcapture the current topological and communication con-straints in the network.

6.1.1. Route selection through link predictionMovement Prediction-based Routing (MOPR) [13] is an

example for one of the earliest approaches that propose amovement prediction based routing protocol for V2V com-munication in VANETs. It improves the routing process bytaking the vehicle movement information that is typicallyavailable in MAC layer such as position, direction, speed,and network topology into consideration. Based on suchvehicular information, MOPR predicts the future locationof intermediate relay nodes, which can subsequently beused to estimate the life-time of point-to-point links. Asa result, MOPR is capable of dynamically select the moststable routes containing stable nodes that are traveling inthe same direction or with the similar speed or on thesame road as of the destination/source nodes. To facilitatethe routing process, the vehicular information such as po-sition and speed are explicitly maintained in the routingtable. Such position prediction techniques can further beimproved by making use of digital maps and navigationsystems.

Similar to MOPR, Chen et al. argues that the informationon intermediate nodes is critical to adjust the routesdynamically. However, unlike MOPR, Chen et al. purposeda multi-path routing protocol to reduce the frequency ofroute rediscovery and hence to alleviate the overheadincurred. They proposed a cross-layer Ad-hoc On-demandMultipath Distance Vector (R-AOMDV) [14] protocol that isbased on AOMDV [15] protocol. This method makes use ofa routing metric that combines hop count and transmissioncounts at MAC layer by taking quality of intermediate linksand delay reduction into consideration. This protocol hasbeen shown to deliver better performance than AOMDV,especially in sparse and dense urban vehicular networks.

The route discovery process employed in R-AOMDV issimilar to that of AOMDV. It relies on two control packets:route request (RREQ) and route reply (RREP). The interme-diate first hop nodes in RREQ and RREP packets are used todistinguish between multiple paths from source to desti-nation. To measure quality of entire path, it adds twoadditional fields to RREP packets – the maximum retrans-mission count (MRC) that is measured in MAC layer andthe total hop count that is measured in network layer.When RREP is passed back to the source, each intermediatenode compares its retransmission count with the MRC andreplaces it if its retransmission count value is greater thanthe current MRC. Thus, when RREP packet arrives at thesource, the source can identify which path contains maxi-mum MRC. As in AOMDV, a source node in R-AOMDVinitiates the route discovery process whenever it can notfind a path to the required destination in its route table.

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 10: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

10 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

Although MOPR and R-AOMDV improve the routingprocess by taking the link quality information into account,their rely on IP-address based neighbor information. Such amechanism however is not suitable for VANETs and it islikely to experience high packet delays and packet losssince messages are forwarded to selected IP nodes only,even if they had moved away from the point at whichthe route was established. On the contrary, one must beable to find new forwarding node on-demand if the nodeselected by the route moves away. Such problems are morepredominant in urban networks with multiple paths be-tween source and destination, diverse node density, multi-ple intersections, and high packet congestion.

6.1.2. Route selection based on neighbor information androute quality

To avoid these problems due to vehicle mobility, cross-layer designs must be able to refrain the MAC functionfrom using IP-address based methods for selecting inter-mediate relay nodes. Most existing routing protocols arebased on location-based routing where vehicles are as-sumed to have knowledge of their positions via GPS.Mostly, the forwarding decision is based on vehicles’ posi-tions or distance between vehicles. Vehicles that are closerto the destination are given higher chance to become thenext relay node. Such a strategy decreases the overhead in-cured in route discovery, and it is able to deal with theproblems caused by node mobility. However, geographicprotocols that follow a greedy forwarding mechanism donot have any knowledge of the path. A packet may get rou-ted on a congested path that causes additional packet de-lay, or it may ultimately get dropped. To be able totransmit the packets along small delay paths, the sourcesnode should have high-level knowledge about the possibledelay that will be incured at various intermediate loca-tions, and on various paths to the destination.

A recent delay-aware protocol called PROMPT [16] is across-layer design that aims to provide quick adaptabilityto frequent changes in the network topology, and also de-lay awareness in data delivery. It is designed for V2I com-munication in urban environments where packets are

Fig. 4. PROMPT

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

relayed via geographic-based intermediate nodes as shownin Fig. 4.

PROMPT adopts a position-based routing approach toalleviate the problems resulting from high node mobility.It is inexpensive as it does not rely on any explicit neighbormaintenance strategies, which are common to deal withnode mobility. The roadside infrastructure known as basestation broadcasts periodic beacon messages. These bea-cons are propagated outside the base station communica-tion range via directional multi-hop broadcastingprotocol. During beacon propagation process, each nodecollects route information into a path table. The routeinformation in beacons contains locations of previous for-warding nodes and communication characteristics. A vehi-cle communicates to base station using the minimumdelay path estimated from the path table.

Unlike IP-address based paths in MOPR and R-AOMDV,source routes in PROMPT are physical paths on the roadnetwork – they are expressed as a sequence of(street,direction) pairs. While packets is forwarded backto the base station, the MAC functions obtains such asource route information from the packets. The next for-warding node is chosen based on a receiver-based MACchannel contention methodology. Upon receiving a for-warding request from the transmitting vehicle, each relaycontender determines its privilege and sets the contentiontime based on its privilege. The exact value of privilege canbe based on several factors – for example, distance anddirection of the relay nodes with respect to the selectedsource path and the transmitter. The relay that is in thesame (street, direction) of the selected path and that is far-thest from the transmitter has the highest privilege andtherefore has the smallest contention time to reply the for-warding request. All other contenders drop their repliesupon hearing a reply from the highest privileged node.Such a relay selection method can forward the packets to-wards the destination efficiently without using IP addressor ID information of vehicles.

Furthermore, PROMPT does not require any explicit andexpensive neighbor management strategies. To improvethe bandwidth usage and to reduce contention time,

system.

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 11: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 11

PROMPT uses a packet train technique where the transmit-ter can bundle multiple packets to the same destinationinto one packet train, and transmit it within a single con-tention period. The overall cross-layer design philosophyof PROMPT can be summarized as follows – local packettraffic statistics collected in MAC layer are used in networklayer to route packets in a delay-aware manner; and min-imum delay source route (street,direction) pairs found innetwork layer are used by the MAC layer to determinethe next relay node in a manner that is not adversely af-fected by vehicle mobility.

Similarly, Barghi et al. proposed a protocol that predictsthe life-time of communication links to select the most sta-ble route between source and destination [17]. The objec-tive of this paper is to overcome the overhead duringgateway discovery and routing selection. Gateways adver-tise their service by broadcasting its location and servicearea. Vehicles within its service area relay the message far-ther into the extended transmission range of the gateway.Unlike PROMPT that uses local statistics of each hop todetermine the best route, Barghi et al. uses stability met-rics to predict the route life-time and selects the most sta-ble path. Within each hop, the forwarding nodes includestheir stability metrics such as positions, speed, direction.It also leverages smart broadcasting techniques like CBF[18] to reduce the overhead due to broadcast storms.

6.2. Packet collision avoidance using segment-based orcluster-based routing

The hidden terminal problem is the main performanceissue in multi-hop networks. Section 7 discussed moreabout MAC interactions and performance degradationdue to self-interference of multi-hop networks. Manyexisting routing protocols are awarded for these issues.In the segment-based solution, the routing protocols takesadvantage of limited road structure to control hop by hoptransmission. The road are divided into segments whereeach segment response for one-hop communication.Example of such a segment-based framework is CVIA pro-tocol [19]. In CVIA, Korkmaz et al. aimed to develop across-layer protocol for highways that solves hidden termi-nal problem and avoid packet collision. The packet can for-ward through the relay nodes toward the gateway or basestation. Vehicles are equipped with GPS for position infor-mation and time synchronization.

To avoid hidden terminal and interference problem,each road segment communication is alternatively switchbetween active and inactive phase. This phase sequenceis also synchronous between adjacent segments whereadjacent segments are in opposite phase. When the seg-ments are in active communication phase, the vehicles lo-cate inside the segments are allowed to communicate witheach other. Vehicles within the same segment are within asingle hop transmission, and they can exchange their loca-tions information. Note that since adjacent segments haveopposite phase, the hidden terminal problem is avoid.

Based on the phase sequences, CVIA has three mainpacket movement schemes for communication: intra-seg-ment packet train movement phase, local packet gathering(LPG) phase, and inter-segment packet train movement

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

phase. To insist the packet movements between eachsegment, two vehicles at the border of the segmentsare selected as the temporary edge routers. In theintra-segment packet train movement phase, packets aredelivered from one edge router to another edge router.The flow of the packets are based on the direction of thebase station. In the local packet gathering (LPG) phase,local packets of the each segments are delivered to theedge router that is closer to the base station. Each vehiclesaccess channel randomly to avoid the collision. In theinter-segment packet train movement phase, the edgerouter sents the packets to another edge router that isbelong to next segment. Although the CVIA solves thehidden terminal and interference effectively, the mainchallenges are the temporary router selection processand the segment-based synchronization.

Another solution to avoid hidden terminal problem isthe cluster-based forwarding. CCBF [20] is an example ofcross-layer protocols based on cluster-based forwarding.Similar to CVIA, CCBF packet forwarding scheme has twophases: inter-cluster forwarding and intra-cluster forward-ing. First, CCBF selects the cluster head. During intra-cluster forwarding, cluster head assigns the channels forits neighbors. Each neighbors is allowed to transmit thepackets based on assigned channel to avoid hidden termi-nal problem and packet lost due to collisions. The numberof slots for each vehicle in CCBF can be varied and priori-tized. During intra-cluster forwarding, the packets aretransferred between the clusters.

Although the segment-based or cluster-based designsolves packet collision issue, the main drawback of suchprotocols is the time synchronization among the clustersand the overhead of cluster forming process. Such strate-gies which divide the road into segments or organize vehi-cles into clusters are more suitable for highways, and theyare not readily applicable for urban road structures.Mainly, urban road structures are more complex whichcontain multiple intersections and vehicles can have vari-ous speeds and directions.

Bononi and Di Felice introduce Dynamic Backbone-Assisted MAC (DBAMAC) scheme [21]. DBAMAC aims to solvethe latency and overhead problems in broadcasting emer-gency message. In the paper, a back-bone member (BM)selection is similar to cluster head selection which is basedon stability criteria such as speed, direction, and location.The communication among BM’s is formed as a back-bonelinks to reduce transmission and contention delay. Theselinks are mainly used to relay emergency messages. If theback-bone link is broken, DBAMAC allows other vehicleto dynamically join the connection and help relay the mes-sage. Although DBAMAC is an application-specific protocol,DBAMAC suffers from back-bone link forming similar toCVIA [19] and CCBF [20] cluster forming.

6.3. QoS support – prioritization-based solutions

There exist a number of applications that have stringentQuality of Service (QoS) requirements. For instance, it isimportant for all safety applications to have fast and reli-able message propagation to convey traffic-related warn-ings to nearby vehicles as soon as possible. Similarly,

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 12: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

12 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

multimedia applications require high bandwidth andshorter transmission delay. IEEE 802.11e standard wasintroduced to support packet prioritization so that serviceswith diverse QoS requirements can be differentiated.According to this standard, the flow of different priorityclasses have different back-off times and channel accesstimes. For instance, emergency messages in safety applica-tions are transmitted with highest priority than otherpackets so that they experience shortest channel accesstime and smallest contention window compared to otherpackets like periodic beacon messages. Cross-layer solu-tions can be developed to exploit the priority classes from802.11e at other layers for better treatment of QoSrequirements.

There are number of existing solutions that are basedon 802.11e standard. In [22], authors studied the QoS per-formance in multi-hop vehicular networks using 802.11e.They found that 802.11e protocol alone is not sufficientto meet QoS requirements because it does not take thekey characteristics of VANETs like link quality, node mobil-ity, and multi-hop interference into consideration. Theyhave proposed a triple-constraint QoS routing protocolcalled Delay-Reliability-Hop (DeReHQ) that is an extensionof the popular AODV routing mechanism. DeReHQ protocolconsiders the following QoS measures – link reliability,end-to-end delay, and hop count.

In DeReHQ, the optimal policy for the path selection iscomputed based on the above three QoS parameters.Authors argued that the quality of the path is more impor-tant than the shortest path. Thus, the link reliability shouldhave higher priority than link delay and hop count in pathselection process. These parameters are estimated basedon the vehicular traffic theory which includes traffic den-sity, vehicle speed, and distance between source and desti-nation. In addition to path selection policy, authorssuggested that priority issues of different class of applica-tion should also be implemented in routing algorithm bytaking into account of the cross-layer interaction. AlthoughDeReHQ does not offer the service differentiation, theenhancement of 802.11e can be implemented in the futurework.

It is well-known that broadcast messages can easily sat-urate a system’s performance as they consume a lot of net-work bandwidth. Eichler et al. [23] suggested that one cancarefully design cross-layer strategies so that broadcastmessages can be routed only to the interested drivers.For instance, traffic warnings in the city are not importantto those drivers who are driving on the highway, or theones that are moving away from the city. In this paper,authors proposed two strategies to emphasis the benefitvalues of the message. First, sender nodes quantify thebenefit that their respective data packets provide to poten-tial recipients within their neighborhood. Second, broad-cast messages are prioritized according to the resultingbenefit values so that the global benefit received by allthe vehicles participating in the network is maximized.

To implement such a benefit-oriented approach,authors have proposed a cross-layer protocol that allowsmost beneficial message to get transmitted first. The appli-cation layer evaluates the benefit value for each packet be-fore it gets to the MAC layer. The computer benefit value is

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

included in the packet header. The benefit-based extension(BBE) is implemented in the link layer to modify the packetqueueing process to account for the benefit values. Thehighest benefit packets are placed at the head of queueso that they spend less amount of time in the system.Existing 802.11e protocol is modified to allow highest ben-efit packet to have higher priority during the channel ac-cess. Here, the contention window (CWmin, CWmax),channel access timers (AIFS), persistence factor of packetsare set based on their benefit levels. Persistence factor pro-vides packets with a higher chance to win contention pro-cesses and to access the medium quicker.

The benefit calculations are based on three compo-nents: message context, vehicle context, and informationcontext. The message context is characterized by the ageof the message. The vehicle context is described by vehicledirection, distance to the last forwarder, number of reach-able neighbors, vehicle speed, etc. The information contextis based on time of the day, the purpose of traveling, infor-mation category, etc. With these three contexts, the benefitvalues of messages are derived with the assigned weightbased on the class of the messages. For instance, a collisionwarning has higher weight for the message age parameterthan other contexts.

In [22] and [23], the real-time traffic that requires higherpriority channel access is supported by 802.11e-like MACprotocol. Korkmaz et al. studied the QoS support based onCVIA [19] forwarding protocol which is called ControlledVehicular Internet Access protocol with QoS support(CVIA–QoS) [24]. CVIA–QoS aims to provide delay boundedthroughput guarantees for soft real-time traffic in multi-hop VANETs. Authors found that 802.11e MAC protocol doesnot efficiently support the service guarantees to the best-ef-fort traffic due to its randomness in channel access timingassignment. They proposed additional admission controland communication scheduling mechanisms during thecontention period to provide efficient services for packetprioritization. The contention period is classified into twophases: high priority period and low priority period. Areal-time packet that has high priority accesses the channelduring the high priority period. In this period, the packets gothrough register process. Then the packets are scheduledduring the transmission period to avoid packet collision.In contrast, packets in low priority period access the channelrandomly using the traditional 802.11 protocol. This mech-anism, as a result, can provide guarantees on the delay fortime-critical real-time traffic.

6.4. Multi-hop broadcasting

The most important class of applications in the contextof vehicular networks is safety-related applications, inwhich emergency messages that are broadcasted to sur-rounding vehicles must experience minimum possible de-lay and high reliability. Traditional techniques like floodingseriously suffer from broadcast storm problem where alarge amount of bandwidth is consumed by excess numberof retransmissions. When the vehicle density is high, suchtechniques lead to a large number of collisions and highchannel contention overhead. Cross-layer protocols havebeen designed to alleviate this overhead by jointly

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 13: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 13

optimizing the packet forwarding mechanism from net-work layer and the contention scheme in MAC layer.

Korkmaz et al. developed an urban multi-hop broadcastprotocol for inter-vehicle communication systems [25].UMB is designed to reduce the effects of problems relatedto broadcast storm, hidden terminals, and reliability prob-lems in multi-hop broadcasting. The UMB protocol has twophases: directional broadcast and intersection broadcast.In the directional broadcast, the furthest vehicle from thetransmitter is selected to rebroadcast the packet. It deter-mines the farthest nodes by employing a distance-basedcontention approach without any knowledge about nodeIDs or positions of neighboring nodes.

This UMB protocol uses a 802.11-based RTS/CTS hand-shake to avoid hidden terminal problem by dividing theroad into several segments. When the channel is available,the source vehicle sends a request-to-broadcast (RTB) pack-et. Once the nodes in the direction of the dissemination re-ceive this RTB, they compute their distance to the sourcenode. Based on this distance, they send a black-burst (chan-nel jamming signal) so that the farthest node has the lon-gest burst. As the nodes finish their black-burst, theylisten to the channel. If a node finds that the channel tobe empty, it implies that its black-burst was the longest,and subsequently it replies a clear-to-broadcast (CTB) pack-et. If there are multiple nodes that respond with a CTB, theycollide and the source node retransmits the RTB packet. Inthis next contention period, only the receivers who hadsent the CTB in the previous round are allowed to sendthe black-burst signal. To avoid further collisions, especiallysince the relay vehicles are located within same distance,the nodes select a random black-burst size.

On the other hand, for broadcasting packets around theintersections, Korkmaz et al. proposed to install the repeat-ers that can forward the packet to all road segmentsaround the intersection. When a node reaches the intersec-tion within the repeater communication range, it sends thepacket to the repeater using the point-to-point IEEE 802.11protocol. The repeater then forwards the packet to all otherdirections except in the direction in which the packet hasbeen received. To optimize the channel utilization aroundthe repeater nodes, vehicles around that intersection thatoverhears the packet can rebroadcast it directly withoutwaiting for the repeater to retransmit. This protocol is laterextended to AMB [26] in order to handle intersection sce-narios more efficiently without repeaters. Unlike in UMB,AMB protocol makes the vehicles to disseminate the pack-ets into different directions when passing by theintersections.

Nasri et al. proposed a cross-layer scheme for broad-casting at intersections in VANETs [27]. Authors argue thatabout 30% accidents happen in the intersection area. Thusa reliable broadcasting mechanism is very important. Thekey problem around an intersection is that the overlappedtransmission range from one direction can block the mes-sage propagation in some other directions. To avoid flood-ing problem, the number of rebroadcast can be reducedbased on the location of the receivers. Once vehicles re-ceive the broadcast message, they compute the defer timebased on the distance of sender and receiver before re-broadcast the message. Upon overhearing the same broad-

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

cast message, the receivers cancel the rebroadcast process.However, it is necessary that vehicles at the intersectionshould rebroadcast the message to different directions.To guarantee reliability in such scenarios, authors pro-posed a method that classifies vehicles based on their rel-ative location and angle to the last forwarding node. Toprovide fast broadcasting, the routing function is mergedwith MAC function. The messages from network layer is di-rectly sent to physical layer.

7. Cross-layer design for transport-MAC layers

The cross-layer design between transport and MAC lay-ers helps in distinguishing between route interruption andchannel congestion. The link disconnection problems thatoccur at the level of individual hops must be dealt atMAC layer. MAC protocols such as 802.11 handle link dis-connection via packet retransmissions. If the sender doesnot receive the acknowledgements within a fixed numberof retransmissions then the packet is dropped. In multi-hop vehicular networks, the issue of link disconnection islikely to be severe since the underlying network topologychanges dynamically, thereby resulting in frequent packetretransmissions.

In multi-hop VANETs, the sequence of relay nodes be-tween the source and destination nodes can be treated asa chain. Different links in such a chain experience differentlevels of interference. In [28], Majeed et al. studied the im-pact of these different MAC-level interference on the per-formance of TCP in multi-hop networks. Through anextensive simulation, they rank ordered chains with differ-ent MAC interactions based on the position of senders andreceivers. For instance, sender-connected interaction, alsoknown as exposed node terminal problem, occurs whentwo senders interfere each other transmissions. Authorsfound that sender-connected chains provide best perfor-mance in term of throughput and retransmission overhead.The difference in levels of interference among these chainscontribute up to 25% difference in system throughput.Generally, the multi-hop chain requires high number ofretransmissions. This retransmission wastes the band-width usage and potentially increase the delay and de-grades throughput of the system.

The findings of MAC interactions and TCP connectionsin multi-hop communication are further investigated byHamadani et al. [29]. They classified the problem intotwo TCP flow instabilities – intra-flow and inter-flow insta-bility. The intra-flow instability is caused by the nodeswithin the same TCP connection whereas the inter-flowinstability is caused by the nodes from multiple differentTCP connections. They performed a detailed analysis of in-tra-flow instability where successive transmissions from asingle TCP flow interfere with each other at the level of linklayer. Such self-interference results from contentionamong a variety of packets – among different TCP datapackets; between TCP data packets and MAC control pack-ets; and among MAC control packets. Self interference evi-dently reduces the channel bandwidth utilization andcauses network overload. Many packets get dropped, espe-cially at intermediate nodes. As a result, TCP responds withfast retransmissions by reducing the congestion window

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 14: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

Fig. 5. TCTC cross-layer interaction [29].

14 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

size. Also, the packet generation rate at the sender is alsoreduced. These methods essentially control the numberof packets in the system, and they help in addressing theproblem of TCP intra-flow instability.

Hamadani et al. [29] have also explored the use ofcross-layer design to dynamically adjust the traffic loadsuch that the system throughput is maximized and theend-to-end delay is minimized. They have proposed TCPConTention Control (TCTC) that adjusts the amount of datain the system based on the level of contention andthroughput experienced by packets in each flow as shownin Fig. 5. To estimate the end-to-end contention delay,TCTC makes each packet record the amount of time spentin contending for the channel in MAC layer. This per-hopcontention delay is cumulatively maintained in the pack-ets. At the end of packet transmission, TCP receiver canestimate the average per-hop contention delay by dividingcumulative delay obtained from the packet by the totalnumber of hops. TCP receiver also estimates the achievedthroughput of the flow for each transmission. The esti-mated quantities are used to compute the optimumamount of traffic to achieve the maximum throughput,and lowest contention delay for each connection. Suchcomputations are done by collecting the information frompackets received over a fixed observation interval. Thecomputed flow information is then sent back to the senderso that it can adjust the amount of traffic rate for each flow.It is also important to carefully select the duration ofobservation interval. If the interval is too long then the re-sponse from TCTC will be too slow to adjust to the conten-tion level in the network. On the other hand, if the intervalis too small then TCTC may become too sensitive, there byresulting in system load fluctuation. In general, the adjust-ment of transmission rate at TCP layer may not directlysolve the channel contention problem at MAC layer. How-ever, transmission rate adaptation does help in reducingthe number of packet drops at MAC layer.

8. Cross-layer design for transport-network layers

There exist several cross-layer protocols that operate be-tween the transport layer and lower layers. Most of theseprotocols are aimed at supporting real-time and multimediaapplications that require a reliable end-to-end connectivity

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

with critical QoS requirements. Cross-layer protocols aredeveloped to assist in dealing with issues that emerge invehicular networks. In this section, we first review the func-tionality of transport layer protocols, and discuss challengesthat these protocols must address in the context of vehicularnetworks. We then explore existing cross-layer solutionsbetween transport and routing functions.

In a traditional layered design, the transport layer isresponsible for delivering data between application layersof host computers. Transport Control Protocol (TCP) is awell-known transport layer protocols that provides end-to-end reliable communication among systems. TCP in-cludes several mechanisms like flow rate control, errorrecovery, and congestion avoidance. In traditional wirednetworks, the transmission errors or packet losses are as-sumed to be a result of network channel congestion sincethe problems due to route disconnection and channel er-rors are minimal. In such scenarios, the TCP sender oftenreduces the sending rate, and it may also adjust the con-gestion window size to decrease the system load. Anotherrelated and popular transport layer protocol is the UserDatagram Protocol (UDP) that does not provide any explicitmechanism for delivery assurance. For safety-related andInternet access applications in VANETs, the reliable TCPprotocol is more suitable than UDP protocol. We confineour discussion to TCP-based approaches.

Existing TCP-based protocols are primarily developedfor wired networks where the network conditions aretransparent to the transport layer. However in wirelessnetworks, the quality of shared channel is highly dynamic,and it changes with time and system load. Packets may getdropped due to channel contention or high-level of inter-ference. The effect of these factors is prominent in vehicu-lar networks where the high mobility of vehicles causefrequent path disconnection. Thus in wireless networks,it is important for transport layer protocols to have someknowledge about the channel condition so that they canoperate adaptively according to observed situation. Simplyreducing the transmission rate when a packet transmissionfails can lead to suboptimal performance, especially in crit-ical safety applications. In addition, it can result in reducedconnection throughput, under-utilized bandwidth, andfluctuations in performance.

Cross-layer protocols can be developed so that thetransport layer can distinguish between errors due to net-work congestion and path disconnection. In multi-hop net-works, packets may get dropped at intermediate relaynodes triggering the expensive route recovery process,and thereby affects the system performance significantly.Holland and Vaidya investigated the effect of mobility onTCP performance over multi-hop networks [30]. First,authors showed that TCP throughput drops significantlywhen node movement causes link breakage. They showedthat traditional protocols such as DSR must not only pro-vide an optimal route but they must also be able to recog-nize the disconnected route and quickly purge stale routes.Failure to remove the stale route results in repeated rout-ing failures and poor performance.

The vehicular mobility can also cause significant trans-mission delays when TCP can not recognize the differencebetween a link failure and network congestion. To deal

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 15: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 15

with this problem, packet congestion information due tothe link failure should be notified to the sender. In the pa-per, authors proposed the use of Explicit Link Failure Noti-fication (ELFN) to notify the sender in case of the link androute failure. The sender uses this information to avoidresponding to the link failure as if congestion has occurred,and thereby it avoids corrective actions such as reductionin the size of congestion window. Whenever the destina-tion is not reachable, there are two ways in which the ELFNnotification can be passed to the sender – directly send anICMP destination unreachable message to the sender; oruse the route failure mechanism available in routing proto-cols such as DSR where ELFN notification can be piggy-backed with the route failure messages. Once the senderreceives a route failure message, it can disable congestioncontrol mechanism, and continue to find a new route.However, this work is limited to DSR routing protocol.

Liu and Singh studied the effect of route disconnectionand network partition problems that are caused by nodemobility on the performance of TCP. They have proposedAd-hoc TCP ATCP [31], an end-to-end solution to improvethe throughput of TCP. This is a cross-layer mechanism thatdeals with a variety of routing issues such as packet loss dueto high BER, changes in the route, network partitions, packetreordering, multi-path routing, and network congestion.

ATCP allows the network layer to obtain feedback fromthe intermediate nodes about the route status. During itsnormal operation, ATCP sender transmits the packets andstays in the ‘‘normal’’ state. When packets are lost due tothe high bit-errors, ATCP sender moves to a state of‘‘retransmission’’. In this state, the lost packets are retrans-mitted without adjusting the contention window. There-fore, bit-error events does not effect the overall systemthroughput. However when the route is disconnected dueto node mobility, ATCP sender moves to a state called ‘‘per-sist state’’. In this state, the sender waits for a new route tobe discovered before sending any other packets. Since thenew route may have different congestion level, the sizeof contention window is reset as soon as a new route is dis-covered. When the network is truly congested, ATCP sen-der moves to the state of ‘‘congestion control’’, andcontention window size is adjusted accordingly. Unlikethe solution proposed by Holland and Vaidya [30], ATCPuses Explicit Congestion Notifications (ECN) to notify thesender node about network congestion, and ICMP mes-sages to notify the events where the receiver node isunreachable. The sender moves either to ‘‘congestion con-trol’’ state or ‘‘persist state’’ depending on whether an ECNor an ICMP message is received.

Vehicular Transport Protocol (VTP) [32] is another cross-layer design that exploits the relation between transportand routing function by making use of feedback informationto identify the packet loss. Instead of using topology-basedrouting protocols, VTP relies on position-based routingschemes such as PBR [33] in which packets are forwardedbased on a highway mobility model. In each transmission,the next reachable forwarder is selected based on its dis-tance and position with respect to the sender vehicle.

To deal with frequent route disconnections, VTP main-tains in two states – connected or disrupted. As long asACK packets are received for each packet transmission,

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

VTP remains in the ‘‘connected’’ state. When an ACK isnot received, the sender calculates the expected durationfor connectivity using the distance between source and re-ceiver, and statistical information that is observed duringprevious packet transmissions. If the expected duration islower than a threshold, the state of VTP is changed to dis-rupted. To acquire the state status, the VTP sender uses theper-packet feedback along intermediate nodes to deter-mine data rate of the path during the connected state. Inthe disrupted state, the sender periodically probes to checkif the path has been restored. Whenever an ACK is received,the status is moved from ‘‘disrupted’’ to ‘‘connected’’.

To further provide congestion control mechanisms, VTPmakes use of information collected from intermediatenodes. Each intermediate node computes the minimumbandwidth that is locally available, and it feeds this infor-mation back to the sender by piggybacking the ACKs. Sen-der uses this information to calculate the product ofbandwidth and packet delay. Such a packet-based band-width distribution provides fairness among the contendingflows without additional maintenance of flow information.

Reliable packet transmission of TCP is of great impor-tance in file sharing and content distribution applications.Chen et al. studied the impact of critical system parameterssuch as hello message exchange rate and delay timer inTCP for out-of-order delivery on the performance of bothUDP and TCP [34]. They highlighted that robust routingprotocols must be designed to address the problems ofTCP while handling the route breakage in VANETs. Theystudied the joint optimization of TCP and Geo-routing(e.g., GPSR [35]) parameters to efficiently handle issuesdue to vehicle mobility. They then proposed an adaptivescheme where the duration of interval between consecu-tive HELLO messages is determined based on vehiclespeeds. The out-of-order problem in TCP can be fixed byusing a receiver-side out-of-order detection methodologythat delays the transmission of ACK messages.

In conclusion, the ability to detect packet loss due toroute disconnection, channel errors and flow congestionis of significant challenge TCP senders in wireless net-works. Most existing transport and routing cross-layer pro-tocols aimed to assist transport protocol to classifybetween route disconnection and route congestion prob-lems. To do so, they implemented feedback notificationmessage either by explicitly sending message such as ICMPor by implicitly piggybacking the information. The sourcenode can take an appropriate action upon the receipt ofthe notification. If there is a route disruption, the sourcecan wait until either a new route is discovered or until anext forwarding node is found. In case of true network con-gestion, the source can reduce the transmission rate to re-duce the load in the system.

9. Cross-layer design for transport-network-MAC layers

The packet flow rate control is one of most importantand challenging issue in transport layers designed forInternet-based communication. Several cross-layer designsthat jointly optimize the transport, routing, and MAC func-tions to efficiently handle the issues pertaining to vehicularnetworks. Zhou et al. [36] jointly formulated a cross-layer

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 16: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

16 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

design for cooperative VANETs where every node acts as apartner for other nodes to carry out multi-hop communi-cation. The main strategy in this design is to decomposethe problem into two sub problems – a flow control prob-lem that determines the total rate at which the sourcenode must send the packets; and a division problem thatdescribes how to split the total rate among a set of leastcongested paths according to the link persistence probabil-ity that is observed in MAC layer. They have proposed twosolutions: Opportunistic Cooperation MAC (OC-MAC) proto-col and Joint Optimal Control (JOC) algorithm.

OC-MAC chooses the route locally in which each inter-mediate destination node decides whether or not to relaythe packet any further. The JOC algorithm, on the otherhand, jointly optimizes different layers. JOC consists ofthree main functions: link capacity detection at MAC layer,flow control at transport layer, and the routing design atthe network layer. The objective is to maximize the pathutility function by adjusting the flow rate at the transportlayer. Each link adjusts its persistence probability (i.e.,the probability to transmit the data) based on the flowrates for all paths in which that link is involved. Updatedprobabilities are transmitted to all source nodes pertainingto the current link. Each source vehicle then computes thebest possible flow rate for all its paths based on the re-ceived probability information. Routing component is thenresponsible for sending the amount of data for destinationaccording to the rate that is computed for that path. Thissequence of steps is repeated until the system is con-verged. Such a joint optimization strategy is shown, via asimulation study, to provide better performance than tra-ditional alternatives.

Instead of system optimization, Drigo et al. focused onan application-oriented protocol [37]. They worked on dis-tributed cross-layer transmission rate control algorithmtailored for applications that require safety messages.Authors proposed a method called Distributed Rate Controlfor VANETs (DRCV) which helps in delivering packets withhigh reliability and with low latency. DRCV employs across-layer design that leverages interactions betweentransport layer and lower layers. The lower layer monitorsthe channel and acquires information such as the numberof neighbors, channel busy time, and the number of re-ceived periodic messages such as beacons.

The channel monitoring is performed in a distributedfashion where each node monitors the channel locallyand estimates the packet load for the next interval basedon the information observed in the previous time interval.Based on the acquired information, DRCV controls thesending rate and sends it to the transport layer which isresponsible for generating and adjusting the rate of peri-odic messages. The sending rate control mechanism con-sists of two main steps. First, each node dynamically setthe aggregate target channel load of periodic messagesgenerated by itself and by all its neighbors. Second, eachnode controls its sending rate of periodic messages in orderto reach the aggregate target channel load. In the case ofnormal operation, the channel capacity of periodic mes-sage is set to a value that is between maximum and mini-mum threshold. Upon detecting of emergency message,the channel capacity of periodic messages is set to mini-

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

mum threshold. This helps in reducing the transmissionrate for periodic messages, and thereby giving priority toemergency messages. Although DRCV can provide efficientservice to emergency messages, the approach is limited tosingle hop networks.

Unlike other contention control TCP, Chen et al. studiesthe dynamics of TCP with respect to transmission power invehicular networks [38]. In particular, they studies the ef-fect of tuning transmission power in various traffic densityand road scenarios on the TCP throughput and latency.They found that the throughput decreases and number ofhops increases as vehicle traffic density is decreased. Thusincreasing the transmission power reduces number of hopsresulting in improved throughput. However higher trans-mission power results in increasing the interference levelto source neighbors and causing higher packet collisionrate. Similar effects also occur for end-to-end delay perfor-mance. The throughput results, however, are differentaround the base station area. The throughput around basestation area is increased when transmission range is de-creased due to high contention. The authors showed thatdynamically tuning transmission power based on vehiclepositions could be used to maximize throughput and de-crease global system collisions. Similar study in the con-text of UDP has been conducted by Khorashadi et al. [39].

10. Transport layer for wired-wireless networks

Transport layer for the wired-wireless networks such asvehicle to infrastructure (V2I) requires the interconnectionbetween a fast fixed network and a slow mobile network.During the data transfer in wireless communication, vehi-cles can suffer from high packet loss rates due to high vehi-cle mobility, service disconnection, and lossy channel. Thusthe cross-layer design solution is necessary to improve thesystem performance. In [40], authors introduced Carbernetwhich is a V2I protocol that delivers the data from vehicleto fixed Internet access points. Cabernet incorporates threetechniques to mitigate the short connection and error-prone channel problems. First, to reduce connection time,it introduces QuickWiFi that combines connection pro-cesses of all layers in to a single process. Second, it avoidsconfusion between the lost of packets due to lossy linkwith packet congestion by developing Cabernet TransportProtocol (CTP). CTP uses a lightweight probing scheme todetermine the loss rate from Internet hosts to an AP. Third,authors studied bit-rate selection mechanism and con-cluded that the static transmission rate at 11 Mbits/s givesoptimal performance.

In Carbernet, QuickWiFi incorporates channel scanningfor AP selection and connection into a single state machinerunning in one process. It also implements the connectionloss detection by monitoring the ongoing transmission. Ifno transmission including beacon from AP within 500ms., vehicle concludes that it moves away from the APtransmission range. The scanning process is resumed andrunning applications are notified. To further improve con-nection time, authors implemented an optimized scanningstrategy and AP selection.

To hide intermittent connectivity and change of IP ad-dress, CTP uses a proxy to mediate between Internet hosts

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 17: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx 17

(server) and vehicle. Mainly the difference between normalTCP and CTP is that CTP session does not break when the IPaddress changes or path is disconnected. CTP end hostsmaintain unique network-independent identifiers that al-lows CTP sessions to migrate seamlessly across APs andchanging IP addresses. CTP exposes a reliable socket APIto the application which provides notification feedbackwhen connection appears or reappears. This feedback al-lows the node to continue transmission without an elabo-rate connection determination technique.

Bechler et al. introduced MCTP [41] a proxy based com-munication architecture for Internet access. Unlike Carber-net, MCTP allows multi-hop communication to increasethe base station service area. Similar to ATCP, MCTP is lo-cated between TCP and network layers. The basic principleof MCTP is that it observes the feedback obtained fromintermediate relay nodes about the IP packet flow betweensender and receiver. It uses this feedback to improve theperformance of TCP. ECN notification is used to indicatecongestions detected by intermediate systems. The parti-tion of the network is indicated by ICMP destinationunreachable messages. This information is relevant for lo-cal communication between vehicles and vehicle to proxy.The communication between proxy and Internet server isbased on standard TCP. Thus the difference between con-gestion and disconnection in wireless system is transpar-ent to Internet host.

11. Open research problems

While several research and engineering efforts aremade towards effective cross-layer solutions, there areseveral avenues that need more attention. We now de-scribe some of those open research problems in the contextof cross-layer protocols for VANETs.

� Striking the balance between modularity and cross-layerdesign: The main advantage of traditional layered proto-col design is its ability to provide modularity and trans-parency, the implementation of protocols in individuallayers can be changed and evolved in more or less inde-pendent manner. Cross-layer designs blur the gapbetween layers in order to facilitate fine-grain informa-tion exchange and to efficiently support wireless ser-vices. However, such a tighter integration maypotentially defeat the benefits of modularity and mayresult in a fragile system. In the context of vehicularnetworks, effective message distribution via multi-hopcommunication often requires cooperation among thevehicles. Facilitating this cooperation among vehiclesrequire information exchange across different protocollayers on each individual vehicle. Therefore, strikingthe balance between modularity and cross-layer designis even more important for vehicular networks. It mayrequire application-specific solutions that are carefullydesigned by understanding the exact requirementsand the nature of cross-layer design for vehicular net-works in hand.� System stability: Cross-layer design introduce interac-

tions between layers that are not seen in traditional lay-

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

ered methods. Therefore, improper designs may resultin unintended functional dependencies and they maylead the system into a state of instability [42]. The sys-tem stability is an important measure in VANETs due tothe large-scale nature of the network with multiplesource and destination pairs. In addition, the distribu-tion of the vehicles in the network is often non-uniform,different road segments have sparse traffic and someother sections may have very dense vehicle traffic.Therefore, how messages are handled based on cross-layer interaction and how cross-layer implementationhelps in improving such system performances must becarefully analyzed in VANETs.� Realistic physical layer and mobility modeling: As evident

from existing research described in earlier sections,many cross-layer designs, in one way or the other,aim to deal with the connectivity issues encounteredin vehicular networks. In order to identify unintendedinteractions resulting from a cross-layer design, onemust perform a thorough analysis of the design by con-sidering several possible systematic and physical sce-narios. Such an analysis demand strong theoreticalmodels that capture realistic communication character-istics in the physical layer. Equally important are themobility models that represent the movement ofmobile nodes where their location, velocity, and accel-eration change over time. Since the vehicle movementin VANETs is restricted to road segments, mobility mod-els that incorporate road network topological con-straints are very important in analyzing theperformance of cross-layer designs.� Standardization of cross-layer designs: Standardization of

protocol design is required to facilitate compatibility,interoperability, and to be independent of single solu-tions. Existing communication standards such as IPv6or WI–FI are not directly suitable for vehicular net-works. This is because the underlying highly dynamictopological changes are unique and they severely affectthe performance when we simply rely on existing pro-tocol standards. However, cross-layer designs presentedthus far are mainly application-specific, and they lackgenerality. As Kawadia and Kumar [42] pointed out,lack of standardized solutions leads several drawbacks,including the reduced performance. It is still unclear asto when and where different cross-layer approaches arebeneficial in VANETs. While it is a significant challengeto standardize cross-layer designs, it can help in deeperunderstanding of potential issues, and in quick and effi-cient way to develop new protocols that target jointoptimization of multiple layers in the stack.

References

[1] RITA Intelligent Transportation Systems (ITS), <http://www.its.dot.gov/index.htm/>.

[2] V. Srivastava, M. Motani, Cross-layer design: a survey and the roadahead, IEEE Communications Magazine 43 (12) (2005) 112–119.

[3] J. Camp, E. Knightly, Modulation rate adaptation in urban andvehicular environments: cross-layer implementation andexperimental evaluation, in: J. Sangeetha (Ed.), Proceedings of the14th ACM International Conference on Mobile Computing andNetworking, ACM, 2008, pp. 315–326.

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/

Page 18: Ad Hoc Networks - Electrical and Computer Engineeringekici/papers/vanet_survey_adhoc.pdf · network is referred to as Vehicular Ad Hoc Networks (VANETs). VANETs support two types

18 B. Jarupan, E. Ekici / Ad Hoc Networks xxx (2011) xxx–xxx

[4] M. Vutukuru, H. Balakrishnan, K. Jamieson, Cross-layer wireless bitrate adaptation, ACM SIGCOMM Computer Communication Review39 (4) (2009) 3–14.

[5] K. Chiu, R. Hwang, Y. Chen, Cross-layer design vehicle-aidedhandover scheme in VANETs, Wireless Communications andMobile Computing (2009), doi:10.1002/wcm.861.

[6] D. Rawat, G. Yan, D. Popescu, M. Weigle, S. Olariu, DynamicAdaptation of Joint Transmission Power and Contention Window inVANET, 2009, pp. 1–5.

[7] M. Artimy, W. Robertson, W. Phillips, Assignment of dynamictransmission range based on estimation of vehicle density, in:Proceedings of the 2nd ACM International Workshop on VehicularAd Hoc Networks, ACM, 2005, p. 48.

[8] G. Caizzone, P. Giacomazzi, L. Musumeci, G. Verticale, A powercontrol algorithm with high channel availability for vehicular ad hocnetworks, IEEE International Journal on Communications (ICC’05) 5(2005) 3171–3176.

[9] M. Torrent-Moreno, P. Santi, H. Hartenstein, Distributed fair transmitpower adjustment for vehicular ad hoc networks, 3rd Annual IEEECommunications Society on Sensor and Ad Hoc Communications andNetworks (SECON ’06) 2 (2006) 479–488.

[10] C. Chigan, V. Oberoi, J. Li, Z. Wang, Rpb-macn: a relative positionbased collision-free mac nucleus for vehicular ad hoc networks, in:IEEE Globecom, 2006.

[11] N. Sofra, A. Gkelias, K. Leung, Link residual-time estimation forVANET cross-layer design, 2009, pp. 1–5.

[12] J. Singh, N. Bambos, B. Srinivasan, D. Clawin, Cross-layer multi-hopwireless routing for inter-vehicle communication, 2006, pp. 92–101.

[13] M. MENOUAR, M. Lenardi, F. Filali, A movement prediction basedrouting protocol for vehicle-to-vehicle communications,Communications, 2005.

[14] Y. Chen, Z. Xiang, W. Jian, W. Jiang, A Cross-layer AOMDV RoutingProtocol for V2V Communication in Urban VANET, 2009, pp. 353–359.

[15] M. Marina, S. Das, Ad hoc on-demand multipath distance vectorrouting, ACM SIGMOBILE Mobile Computing and CommunicationsReview 6 (3) (2002) 92–93.

[16] B. Jarupan, E. Ekici, PROMPT: a cross layer position-basedcommunication protocol for delay-aware vehicular accessnetworks, Ad Hoc Neworks (Elsevier) Journal Special Issue onVehicular Networks, 2010.

[17] S. Barghi, A. Benslimane, C. Assi, A lifetime-based routing protocolfor connecting VANETs to the Internet, 2009, pp. 1–9.

[18] H. Füßler, J. Widmer, M. Käsemann, M. Mauve, H. Hartenstein,Contention-based forwarding for mobile ad hoc networks, Ad HocNetworks 1 (4) (2003) 351–369.

[19] G. Korkmaz, E. Ekici, F. Ozguner, A cross-layer multihop data deliveryprotocol with fairness guarantees for vehicular networks, IEEETransactions on Vehicular Technology 55 (3) (2006) 865–875.

[20] B. Wiegel, Y. Gunter, H. Grossmann, Cross-Layer Design for PacketRouting in Vehicular Ad Hoc Networks, 2007, pp. 2169–2173.

[21] L. Bononi, M. Di Felice, A Cross Layered MAC and ClusteringScheme for Efficient Broadcast in VANETs, 2007, pp. 1–8.

[22] Z. Niu, W. Yao, Q. Ni, Y. Song, Study on QoS Support in 802.11e-basedMulti-hop Vehicular Wireless Ad Hoc Networks, 2007, pp. 705–710.

[23] S. Eichler, C. Schroth, T. Kosch, M. Strassberger, Strategies forcontext-adaptive message dissemination in vehicular ad hocnetworks, in: Proceedings of the 2nd International Workshop onVehicle-to-Vehicle Communications (V2VCOM), Citeseer, 2006.

[24] G. Korkmaz, E. Ekici, F. Özgüner, Supporting real-time traffic inmultihop vehicle-to-infrastructure networks, TransportationResearch Part C (2010).

[25] G. Korkmaz, E. Ekici, F. Özgüner, Ü. Özgüner, Urban multi-hopbroadcast protocol for inter-vehicle communication systems, in:Proceedings of the 1st ACM International Workshop on Vehicular AdHoc Networks, 2004, pp. 76–85.

[26] G. Korkmaz, E. Ekici, F. Ozguner, Black-burst-based multihopbroadcast protocols for vehicular networks, IEEE Transactions onVehicular Technology 56 (5 Part 2) (2007) 3159–3167.

[27] A. Nasri, M. Fathy, R. Hajisheykhi, A Cross Layered Scheme forBroadcasting at Intersections in Vehicular Ad Hoc Networks, 2009,pp. 13–17.

[28] A. Majeed, S. Razak, N. Abu-Ghazaleh, K. Harras, TCP over multi-hopwireless networks: the impact of MAC level interactions, in:Proceedings of the 8th International Conference on Ad-Hoc, Mobileand Wireless Networks, Springer, 2009, p. 15.

[29] E. Hamadani, V. Rakocevic, A cross layer solution to address tcpintra-flow performance degradation in multihop ad hoc networks,Journal of Internet Engineering 2 (1) (2008).

Please cite this article in press as: B. Jarupan, E. Ekici, A survey of croj.adhoc.2010.11.007

[30] G. Holland, N. Vaidya, Analysis of TCP performance over mobile adhoc networks, Wireless Networks 8 (2) (2002) 275–288.

[31] J. Liu, S. Singh, ATCP: TCP for mobile ad hoc networks, IEEEJournal on Selected Areas in Communications 19 (7) (2001) 1300–1315.

[32] R. Schmilz, A. Leiggener, A. Festag, L. Eggert, W. Effelsberg, Analysisof path characteristics and transport protocol design in vehicular adhoc networks, in: IEEE 63rd Vehicular Technology Conference, 2006(VTC 2006-Spring), vol. 2, 2006.

[33] V. Namboodiri, L. Gao, Prediction-based routing for vehicular ad hocnetworks, IEEE Transactions on Vehicular Technology 56 (4 Part 2)(2007) 2332–2345.

[34] X. Chen, H. Zhai, J. Wang, Y. Fang, TCP performance over mobile adhoc networks, Electrical and Computer Engineering, CanadianJournal of 29 (1) (2004) 129–134.

[35] B. Karp, H. Kung, GPSR: greedy perimeter stateless routing forwireless networks, in: Proceedings of the 6th Annual InternationalConference on Mobile Computing and Networking, 2000, pp. 243–254.

[36] L. Zhou, B. Zheng, B. Geller, A. Wei, S. Xu, Y. Li, Cross-layer ratecontrol, medium access control and routing design in cooperativeVANET, Computer Communications 31 (12) (2008) 2870–2882.

[37] M. Drigo, W. Zhang, R. Baldessari, L. Le, A. Festag, M. Zorzi, Distributedrate control algorithm for VANETs (DRCV), in: VANET ’09:Proceedings of the sixth ACM international workshop on VehiculArInterNETworking, ACM, New York, NY, USA, 2009, pp. 119–120.

[38] A. Chen, B. Khorashadi, D. Ghosal, C. Chuah, Impact of transmissionpower on TCP performance in vehicular ad hoc networks, in:Proceedings of the 4th IEEE/IFIP Wireless On-demand Networksand Services, 2007, pp. 65–71.

[39] B. Khorashadi, A. Chen, D. Ghosal, C. Chuah, M. Zhang, Impact oftransmission power on the performance of UDP in vehicular ad hocnetworks, in: IEEE International Conference on Communications(ICC), 2007.

[40] J. Eriksson, H. Balakrishnan, S. Madden, Cabernet: vehicular contentdelivery using WiFi, in: MobiCom ’08: Proceedings of the 14th ACMInternational Conference on Mobile Computing and Networking,ACM, New York, NY, USA, 2008, pp. 199–210.

[41] M. Bechler, S. Jaap, L. Wolf, An optimized tcp for Internet access ofvehicular ad hoc networks, Lecture Notes in Computer Science 3462(2005) 869–880.

[42] V. Kawadia, P. Kumar, A cautionary perspective on cross-layerdesign, IEEE Wireless Communications 12 (1) (2005) 3–11.

Boangoat Jarupan received her B.S. and M.S.degrees in Electrical and Computer Engineer-ing from The Ohio State University in 1997 and2000, respectively. She is pursuing her Ph.D. inthe same university. Her research interestsinclude mobile ad hoc communication sys-tems with an emphasis on vehicular networks.She is currently working on cross-layer pro-tocol design and multi-hop communicationmodels for delay sensitive applications andintersection collision warning systems.

Eylem Ekici received his B.S. and M.S. degreesin computer engineering from Bogazici� Uni-versity, Istanbul, Turkey, in 1997 and 1998,respectively, and his Ph.D. degree in electricaland computer engineering from the GeorgiaInstitute of Technology, Atlanta, GA, in 2002.Currently, he is an Associate Professor with theDepartment of Electrical and Computer Engi-neering, The Ohio State University. His currentresearch interests include cognitive radio net-works, wireless sensor networks, vehicularcommunication systems, and nano communi-

cation systems with a focus on modeling, optimization, resource manage-ment, and analysis of network architectures and protocols. He is an AssociateEditor of IEEE/ACM Transactions on Networking, Computer Networks Jour-

nal (Elsevier), and ACM Mobile Computing and Communications Review.

ss-layer design for VANETs, Ad Hoc Netw. (2011), doi:10.1016/