5596 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Performance Analysis of Connectivity Probability and Connectivity-Aware MAC Protocol Design for Platoon-Based VANETs Caixing Shao, Supeng Leng, Member, IEEE, Yan Zhang, Senior Member, IEEE, Alexey Vinel, Senior Member, IEEE, and Magnus Jonsson, Senior Member, IEEE Abstract—Vehicular ad hoc networks (VANETs) can provide safety and nonsafety applications to improve passenger safety and comfort. Grouping vehicles into platoons in VANETs can improve road safety and reduce fuel consumption. It is critical to design an efficient medium access control (MAC) protocol for platoon-based VANETs. Moreover, because of the space and time dynamics of moving vehicles, network connectivity is an important performance metric to indicate the quality of the network communications and the satisfaction of users. Unfortunately, network connectivity is often ignored in the design of existing MAC protocols for VANETs. In this paper, we study the connectivity characteristics and present a connectivity-aware MAC protocol for platoon-based VANETs. The connectivity probabilities are analyzed for vehicle-to-vehicle and vehicle-to-infrastructure communication scenarios in one- and two-way VANETs, respectively. A multipriority Markov model is presented to derive the relationship between connectivity probability and system throughput. Based on variable traffic status and network connectivity, a multichannel reservation scheme is adopted to dynamically adjust the length of the control channel interval and the service channel interval for the improvement of the system throughput. Analysis and simulation results show that the throughput increases with connectivity probability. However, with a further increase in connectivity probability, the throughput will decrease due to numerous channel contentions. Manuscript received April 15, 2015; revised July 14, 2015; accepted August 19, 2015. Date of publication September 17, 2015; date of current version December 14, 2015. This work was supported in part by the National Natural Science Foundation of China under Grant 61374189, by the Information Technology Research Projects of the Ministry of Transport of China under Grant 2014364X14040, by the Fundamental Research Funds for the Central Universities under Grant ZYGX2013J009, by the EU FP7 Project CLIMBER under Grant PIRSES-GA-2012-318939, by project 240079/F20 funded by the Research Council of Norway, by the EU FP7 Project CROWN under Grant PIRSES-GA-2013-627490, and by the ACDC project funded by the Knowledge Foundation in Sweden. The review of this paper was coordinated by Prof. Y. Fang. (Corresponding author: Supeng Leng.) C. Shao is with the School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China, and also with the College of Computer Science and Technology, Southwest University for Nationalities, Chengdu 610041, China (e-mail: caixingshao@gmail.com). S. Leng is with the School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China (e-mail: spleng@uestc.edu.cn). Y. Zhang is with the Simula Research Laboratory, 1364 Fornebu, Norway, and also with the University of Oslo, 0316 Oslo, Norway (e-mail: yanzhang@ simula.no). A. Vinel and M. Jonsson are with Halmstad University, 301 18 Halmstad, Sweden (e-mail: alexey.vinel@hh.se; magnus.jonsson@hh.se). Digital Object Identifier 10.1109/TVT.2015.2479942 Index Terms—Connectivity probability, medium access control (MAC), one-way, platoon, two-way, vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicular ad hoc networks (VANETs). I. I NTRODUCTION V EHICULAR Ad Hoc Networks (VANETs) have received significant interest from both academia and industry. In particular, VANETs have been studied with some popular technology in recent years. For example, data security and integrity have been studied in vehicular cloud networks [1]. Moreover, the multikeyword-ranked search schemes over cloud data were presented in [2] and [3] to achieve efficient cloud search services. However, communications is also an important research topic in VANETs. Through vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, VANETs can support safety- and nonsafety-related applications among vehicles. Specifically, vehicles on the road can communicate with each other through a multihop ad hoc connection. They can also access the Internet and other broadband services through the roadside infrastructure, i.e., roadside units (RSUs) or access points along the road [4]. When a vehicle moves out of radio coverage area of an RSU, it may be located in the coverage gap between two adjacent RSUs and will use its neighboring vehicles (if any) as relays to access the RSU [5]. Due to the dynamic topology character, the medium access control (MAC) protocols, which are used in other wireless networks [6], [7], are not suitable for VANETs. The IEEE 802.11p standard [8] and the IEEE 1609.4 standard [9] have defined the wireless access in vehicular environments (WAVE) architecture in the United States to be used in VANET communications. In the standards, one control channel (CCH) and six service channels (SCHs) are allocated for VANET communications. However, with a contention-based medium access mechanism and constant length of the CCH interval (CCHI) and the SCH interval (SCHI), the current WAVE MAC framework is not efficient to support either delay-sensitive applications or throughput-sensitive applications [10]. In this case, it is essential to design an effective MAC protocol to ensure reliable and efficient packet delivery in VANETs. Network connectivity is very important for the VANET communication and applications since it might be difficult to transfer messages to other vehicles in the case of disconnections [11]. Particularly in a VANET with a highly dynamically changing topology, connectivity has direct influence on 0018-9545 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS channel contention and vehicle communications. Moreover, the efficiency of channel access is also affected by the connectivity. A connectivity-aware (CA) MAC protocol considering the connectivity and the corresponding number of active nodes can optimize the system performance in a VANET. In recent years, platooning has turned into an important topic in the research area of VANETs. A platoon is a train of vehicles composed of a leading vehicle and a number of followers traveling at highway speeds with only a few meters between them [12]. From the viewpoint of moving behavior and packet delivery, a platoon can be regarded as a special vehicle in VANETs rather than an ordinary vehicle or a simple combination of vehicles. Furthermore, the connectivity probability will change when there are platoons in the network. Hence, the influence of connectivity on wireless channel access becomes more complex and interesting when there are platoons in the VANET. This paper focuses on the analysis of the connectivity probability and the CA MAC protocol design in platoon-based VANETs. Our major contributions are listed as follows. • We investigate the connectivity probability for V2V and V2I communication scenarios in one- and two-way platoon-based VANETs. The relationships between the connectivity probability and some important parameters are studied, including the traffic density, the coverage of vehicles, the coverage of the RSU, the distance between two adjacent RSUs, and the platoon ratio in the VANET. • A CA MAC protocol is designed for platoon-based VANETs. Based on the traffic status and network connectivity, the MAC protocol is enhanced by a multichannel reservation scheme with the CCHI and the SCHI being dynamically adjusted toward the improvement of the system throughput. • Packets from the platoons are classified with high priority to ensure the large bandwidth requirement of multiple platoon members. In this case, a multipriority Markov model is derived to analyze the performance of the proposed CA MAC protocol as well as the relationship between the connectivity probability and the system-saturated throughput. The rest of this paper is organized as follows. Section II overviews the related work. A platoon-based VANET model is derived in Section III. Section IV analyzes the connectivity probabilities in one-way VANETs and two-way VANETs, respectively. The details of the CA MAC protocol and theoretical analysis are presented in Section V. Performance evaluation is presented in Section VI. Finally, Section VII concludes this paper. II. R ELATED W ORK Network connectivity has been studied a lot for conventional VANETs. In [13], a distributed connectivity improvement strategy has been developed to improve the connectivity of VANETs to a desired level while minimizing the energy consumption and signal confliction. In [14], Panichpapiboon and Pattara-atikom presented a new framework for determining the connectivity requirements such as the minimum spatial node density and 5597 the minimum required transmission range for distributing traffic information in VANETs. The effect of the RSU placement on the connectivity of VANETs and determining the minimum number of RSUs required to cover a straight road were studied in [15]. Abdrabou and Zhuang found the lower bound and the upper bound based on the mobility patterns of the network. In [16], an analysis model for multihop connectivity of intervehicle communication in both uniform and nonuniform traffic is presented. It is observed that most of the studies focused on the connectivity of the VANETs. All of them have considered neither the influence of the platoon on the connectivity analysis nor the relationship between the connectivity and the MAC efficiency in platoon-based VANETs. A report from the Department of Transportation in America has indicated that the platooning probability for vehicles on the highway can be higher than 70% [17]. Particularly in the free-flow state, vehicles are more likely to form platoons when they travel in the same direction. Grouping vehicles into platoons can increase road capacity, reduce traffic congestion, and improve road safety and energy efficiency [18]. In a platoon, the leading vehicle (normally a truck) is driven by a human, whereas the followers either automatically maintain the velocity of the leading vehicle, but their direction is still controlled by the driver, or follow the leading vehicle in a fully automatic manner [19]. These special features challenge the MAC protocol design for platoon-based VANETs. There are some studies on data access schemes for the platoon-based VANETs. In [20], Zhang et al. proposed a novel vehicle-platoon-aware data access scheme to improve the data access performance in VANETs. Simulation results showed that through cooperation between the platoon members, data availability can be improved, and data access delay can be reduced. However, too many data replicates will exhaust the storage buffers of the platoon members. In [21], a cooperative retransmission scheme that exploits platoons to improve the uplink performance of VANETs is proposed. Jia et al. regarded a platoon as a cooperative group unit, within which a vehicle can retransmit the frame for neighbors if the delivery of the frame failed in the previous transmission due to the error-prone WAVE channels. Nevertheless, this scheme ignores the impact of the platoon leader for the data retransmission. None of these studies explore the relationship between the connectivity and the system performance of the platoonbased VANETs. III. P LATOON -BASED V EHICULAR A D H OC N ETWORK M ODEL In the free-flow state, connectivity becomes the main performance metric for intervehicle communications since a vehicle may have difficulties delivering messages to other vehicles at a light load. In our model, we consider a unidirectional and uninterrupted one-way traffic road in the free-flow state. As shown in Fig. 1, the VANET consists of N vehicles, which are randomly distributed along the road segment. It is assumed that there are K ordinary vehicles and M platoons. Each platoon is seen as a single vehicle in this context, and platoon members in each platoon are assumed to be connected with each other and 5598 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Fig. 1. Platoon based VANET system model (One-way case without RSUs). can connect with their platoon leader directly. Let p denote the platoon ratio in the network, which means the probability that a vehicle on the road segment is a platoon. We have M M p= = . N (K + M ) (ρx)k e−ρx , k ≥ 0. k! (4) Since Xi is an i.i.d. random variable, we have (2) Let X represent the intervehicle distance between two consecutive vehicles. We can obtain the probability that the distance between two vehicles is smaller than x, which also means the probability that there is at least one vehicle in an interval with length x. The probability is given by Pr{X ≤ x} = h(x) = 1 − e−ρx . Pc = Pr{X1 ≤ R, X2 ≤ R, . . . , XN −1 ≤ R}. (1) Let R1 and R2 (R1 < R2 ) denote the transmission ranges of the ordinary vehicles and the platoon leaders, respectively. Platoon leaders are trucks with higher-placed antennas. Moreover, it is assumed that R2 is large enough to cover all the platoon members in a platoon and the length of the platoon is smaller than R2 − R1 . In our model, it is assumed that vehicles are distributed on the road following a Poisson distribution. Let ρ be the traffic density in terms of vehicles per meter. Hence, the probability that k vehicles are found in a distance of x meters is given by f (k, x) = R, i.e., Xi ≤ R. Let Pc be the connectivity probability of the VANET. Then, we have (3) Then, we can find that X is independent and identically distributed (i.i.d.) and obeys an exponential distribution. IV. A NALYSIS OF THE C ONNECTIVITY P ROBABILITY Here, the connectivity probability in platoon-based VANETs is studied. Two network scenarios are considered. One is a V2V communication scenario where the VANET only consists of vehicles. The other network scenario is a V2I communication scenario in which we consider both vehicles and RSUs. Moreover, we study the network connectivity probability in one- and two-way VANETs, respectively. A. Connectivity Analysis in the One-Way V2V Scenario Fig. 1 shows the platoon-based VANET communication scenario without RSUs, where Xi (i = 1, 2, . . . , N − 1) represents the random variable denoting the intervehicle distance between two consecutive vehicles. In this scenario, the VANET will be connected if there is a path connecting any pair of vehicles. This shows that the distance between any two consecutive vehicles should be smaller than the transmission range of the vehicles Pc = = N −1 i=1 N −1 Pr {Xi ≤ R} [(1 − p) ∗ Pr {Xi ≤ R1 } + p ∗ Pr {Xi ≤ R2 }] . (5) i=1 Equation (5) describes the relationship among the key parameters, i.e., the connectivity probability, the transmission range of the vehicles, and the platoon ratio in the network. According to (3), the connectivity probability of the VANET can be given by N −1 . (6) Pc = (1 − p)(1 − e−ρR1 ) + p(1 − e−ρR2 ) B. Connectivity Analysis in the One-Way V2I Scenario In the V2I communication scenario, vehicles can access the Internet and communicate with other vehicles through RSUs. Hence, we mainly have interest in the connection between the vehicles and the RSUs. We consider the communication between the vehicles and an RSU within two hops. We study one-hop direct access and two-hop access via a relay situation, where an arbitrary vehicle can use a neighboring vehicle located in the coverage as its relay to access the RSU. Fig. 2 shows a platoon-based VANET bounded by two adjacent RSUs. The distance between the two adjacent RSUs is denoted as L. Let RRSU denote the transmission range of the RSU. Vehicles within the coverage range of their neighboring RSU can directly access the RSU in one hop, whereas other vehicles can use a neighboring vehicle located in the coverage of an RSU as their relay to access the RSU. For instance, Vj is a vehicle located in the coverage gap between RSU1 and RSU2 , and it cannot directly communicate with any of the RSUs. However, it can use a neighboring vehicle (Vj−1 or Vj+1 ) as its relay to access the RSUs. Let Pc denote the connectivity probability that an arbitrary vehicle can connect with an RSU within two hops. Due to the different values of the distance of the two RSUs and the coverage of vehicles and RSUs, the overlapping area between them will have different situations. Without loss of generality, we discuss the following five scenarios. 1) 0 < L ≤ 2RRSU : In this case, all the vehicles are under coverage of two adjacent RSUs and can directly communicate SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS 5599 Fig. 2. One-way platoon-based VANET with RSUs. with their neighboring RSU. Consequently, the connectivity probability of the network is 1, i.e., Pc = 1. 2) 2RRSU < L ≤ 2RRSU + R2 : In this case, Fig. 2 shows that there is a coverage gap between the two RSUs. The probability that a vehicle is located in the coverage of either RSU and can connect to either RSU with one hop is 2RRSU /L. Moreover, the coverage gap is smaller than the transmission range of the platoon leader. If the vehicle located in the coverage gap is an ordinary vehicle, when L ≤ (2RRSU + R1 ), the radio coverage of the ordinary vehicle overlaps with the two RSUs. According to (3), the probability that the ordinary vehicle can find at least one vehicle in its vicinity as a relay and connect with either RSU via the relay is p10 L − 2RRSU (1 − p) 1 − e−ρ(2RRSU +2R1 −L) . = L (7) Similarly, when L ≤ (2RRSU + R2 ), if the vehicle located in the coverage gap is a platoon, its radio coverage overlaps with the two RSUs. In this case, the probability that the platoon can connect with either RSU via a relay is p20 L − 2RRSU p 1 − e−ρ(2RRSU +2R2 −L) . = L (8) The connectivity probability Pc can be expressed as Pc = 2RRSU + p10 + p20 . L p12 2 = (1 − p) L 2RRSU + 2R1 − L 1 − e−ρ(2RRSU +2R1 −L) . = (1 − p) L (10) In addition, with the probability (2L − 4RRSU − 2R1 )/L, the ordinary vehicle can overlap with one RSU. The connectiv- R1 (1 − e−ρx )dx. (11) 2RRSU +2R1 −L If the vehicle located in the gap is a platoon, the connectivity probability between the platoon and both RSUs is given as 2RRSU + 2R2 − L 1 − e−ρ(2RRSU +2R2 −L) . (12) p21 = p L Moreover, the connectivity probability between the platoon and one RSU is given by p22 2 =p L R2 (1 − e−ρx )dx. (13) 2RRSU +2R2 −L As a result, the overall connectivity probability that the vehicles can connect with the RSUs can be expressed by Pc = 2RRSU + p11 + p12 + p21 + p22 . L (14) 4) 2RRSU + 2R1 < L ≤ 2RRSU + 2R2 : In this case, when the vehicle located in the coverage gap is an ordinary vehicle, it can only overlap with one RSU and p11 = 0. The ordinary vehicle has an overlapping area with one RSU with the probability of 2R1 /L, and the connectivity probability between the ordinary vehicle and one RSU is given by (9) 3) 2RRSU + R2 < L ≤ 2RRSU + 2R1 : In this case, if the vehicle located in the coverage gap is an ordinary vehicle, the ordinary vehicle has an overlapping area with both RSUs with the probability (2RRSU + 2R1 − L)/L. If the ordinary vehicle can find at least one vehicle in its vicinity as a relay, it can connect with the RSUs. The connectivity probability between the ordinary vehicle and the RSUs is given by p11 ity probability between the ordinary vehicle and one RSU is p∗12 2 = (1 − p) L R1 (1 − e−ρx )dx. (15) 0 If the vehicle located in the gap is a platoon, the platoon can have an overlapping area with either both RSUs or one RSU. The connectivity probability between the platoon and the RSUs will be the same as (12) and (13). The overall connectivity probability can be given by Pc = 2RRSU + p∗12 + p21 + p22 . L (16) 5) L > 2RRSU + 2R2 : In this case, the vehicles located in the coverage gap can only overlap with one RSU. Hence, p11 = 0, and p21 = 0. Similarly, we consider the vehicle either as an ordinary vehicle or as a platoon. If the vehicle located 5600 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Fig. 3. Two-way platoon-based VANET without RSUs. in the gap is an ordinary vehicle, the ordinary vehicle has an overlapping area with one RSU with the probability of 2R1 /L. The connectivity probability between the ordinary vehicle and one RSU will be equal to p∗12 . If the vehicle located in the gap is a platoon, the platoon has an overlapping area with one RSU with the probability of 2R2 /L. We have the connectivity probability between the platoon and one RSU as p∗22 = p 2 L R2 (1 − e−ρx )dx. (17) 0 The overall connectivity probability is given by Pc = 2RRSU + p∗12 + p∗22 . L (18) between VA and VB . The probability that VC is located in the coverage range of VA and the probability that VD is located in the coverage range of VB are PAC = Pr{X ≤ R} = 1 − e−ρR (21) PDB = Pr{X ≤ R} = 1 − e−ρR . Let PCD denote the probability that VC is connected with VD . Since the distance between VA and VB is X, the probability that there are k vehicles located in X is given as (2). Then, we consider that VA can connect with VB via multiple-hop relaying on the opposite road. It is assumed that there are k vehicles located in the coverage gap of VA and VB and connected with each other on the opposite road. According to (3) and (6), the probability that k vehicles can connect with each other is k−1 Pkc = (1 − e−ρR ) . (22) Pkc dx. (23) C. Connectivity Analysis in the Two-Way V2V Scenario In the two-way V2V communication scenario, it is assumed that the vehicle densities in the two ways are the same as ρ. Let Xi (i = 1, 2, . . . , N − 1) represent the intervehicle distance between two consecutive vehicles. We define the link as broken if the distance between two consecutive vehicles on the same road is larger than the transmission range R. Let Pb be the probability that a link is broken, which is given by Pb = Pr{X > R} = e−ρR = (1 − p)e−ρR1 + pe−ρR2 . (19) If the connectivity in a one-way road is less than 1, there will be broken links on the road. Let J be the random variable denoting the number of broken links on the eastbound road. Then, the probability that J of N − 1 will be broken has a binomial distribution and can be given by N −1 Pbj (1 − Pb )N −1−j . (20) PJ (j) = j As shown in Fig. 3, the distance between VA and VB is larger than R. Hence, there is a broken link on the eastbound road between vehicles VA and VB . However, in the two-way scenario, the two vehicles can connect with each other if there are vehicles located in their coverage gap and connected with each other on the opposite road. For example, VC and VD are on the westbound road and located in the coverage gap of VA and VB , respectively. If VC is connected with VD , then the vehicles on the westbound road can forward the packets transmitted PCD can be given by PCD = ∞ F f (k, x) ∞ R k=1 y k e−ρy dy R Then, we can obtain the probability that a broken link between VA and VB is connected, which means that there are F connected vehicles located between them on the opposite road. It follows that pbc = PAC PCD PDB = (1 − e −ρR 2 ) ∞ F R k=1 xk e−ρx ∞ Pkc dx. (24) y k e−ρy dy R Let Pc|J be the conditional connectivity probability when there are J broken links on the eastbound road. Since the probability that each broken link is connected via a relay is independent of all the other broken links, we get Pc|J = pjbc , j = 0, 1, . . . , N − 1. (25) When all the J broken links are connected via relays on the opposite road, the network will be connected. Based on the condition shown in (20) and applying the law of total SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS 5601 Fig. 4. Two-way platoon-based VANET with RSUs. probability, the connectivity probability in the two-way scenario via the relay vehicles on the opposite road is Pc = = N −1 j=0 N −1 j=0 Pc|J .PJ (j) N −1 Pbj (1 − Pb )N −1−j . j pjbc . (26) When J = 0, there are no broken links on the eastbound road, which means that all the vehicles are connected on the eastbound road. Then, the connectivity probability is 0 N −1 p0bc . Pb0 (1 − Pb )N −1 Pc = 0 j=0 N −1 = 1 − (1 − p)e−ρR1 − pe−ρR2 N −1 = (1 − p)(1 − e−ρR1 ) + p(1 − e−ρR2 ) . (27) It can be found that this formula is the same as the conclusion [see (6)] illustrated in the one-way V2V scenario. D. Connectivity Analysis in the Two-Way V2I Scenario In the two-way V2I communication scenario, the connectivity research focuses on the connection between the vehicles and the RSUs. Vehicles under the coverage of the two RSUs can directly connect with the RSUs in one hop, whereas other vehicles can use a neighboring vehicle located in the coverage of an RSU as their relay to access the RSU. Moreover, apart from considering the connection on the same road, we study the connection between the vehicles and the RSU via a neighbor node on the opposite road. For instance, as shown in Fig. 4, Vj is outside the coverage of the two RSUs, and it cannot connect with both RSUs directly in one hop. In this case, Vj will first find a neighboring vehicle located in the coverage of the RSU as its relay on the same eastbound road. For example, Vj can connect with RSU2 via Vj−2 or connects with RSU1 via platoon m. Moreover, in the twoway communication scenario, if Vj cannot find a neighboring relay vehicle on the same eastbound road, it can find a neighboring relay vehicle on the opposite westbound road instead. Vj can also access RSU1 via its neighbor vehicle Vj+1 and connects with RSU2 via its neighbor vehicle Vj−1 . As shown in Fig. 4, the right two-hop links show the paths with which Vj can connect with RSU2 . Meanwhile, the left two-hop links indicate the path with which Vj connects with RSU1 . Then, according to the different relationships of the important parameters in the two-way V2I communication scenario and similar to the study in the one-way V2I communication scenario, we consider the connectivity probability in five different situations. 1) 0 < L ≤ 2RRSU : In this case, all the vehicles on the two-way road are under the coverage of two adjacent RSUs and can directly communicate with an RSU. Consequently, the connectivity probability of the network is 1, i.e., Pc = 1. 2) 2RRSU < L ≤ 2RRSU + R2 : In this case, there will be a coverage gap between the two RSUs. As shown in Fig. 4, we can find that the probability that a vehicle is located in the coverage of either RSU and can connect to either RSU with one hop is 2RRSU /L. Vehicles are located in the coverage gap of the two RSUs with the probability (L − 2RRSU )/L. We consider the vehicle located in the coverage gap of the two RSUs either as an ordinary vehicle or as a platoon. If the vehicle located in the coverage gap is an ordinary vehicle, when L ≤ (2RRSU + R1 ), the radio coverage of the ordinary vehicle overlaps with the two RSUs. According to (3), the probability that the ordinary vehicle can find at least one vehicle in its vicinity as a relay and connect with either RSU via the relay on the same road is p1 = 1 − e−ρ(2RRSU +2R1 −L) . (28) Moreover, if the ordinary vehicle located in the coverage gap cannot find a relay on the same road, it can find a neighboring vehicle on the opposite road as a relay and connect with either RSU via the relay with the probability, i.e., p∗1 = (1 − p1 ) ∗ p1 = e−ρ(2RRSU +2R1 −L) ∗ 1 − e−ρ(2RRSU +2R1 −L) . (29) 5602 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Then, it can be found that the connectivity probability that an ordinary vehicle located in the coverage gap of the two RSUs connects with the two RSUs via a neighboring vehicle as a relay within two hops in the two-way VANETs is p10 = L − 2RRSU (1 − p) (p1 + (1 − p1 ) ∗ p1 ) . L 4) 2RRSU + 2R1 < L ≤ 2RRSU + 2R2 : In this case, if the vehicle located in the coverage gap is an ordinary vehicle, the ordinary vehicle can only overlap with one RSU and p11 = 0. The probability that the ordinary vehicle can find a neighboring vehicle relay on the same road is (30) 2 p5 = L R1 (1 − e−ρx )dx. When L ≤ (2RRSU + R2 ), if the vehicle located in the coverage gap is a platoon, its radio coverage overlaps with the two RSUs. Then, the probability that the platoon can find at least one vehicle in its vicinity as a relay and connect with either RSU via the relay on the same road is The connectivity probability between the ordinary vehicle and one RSU is p2 = 1 − e−ρ(2RRSU +2R2 −L) . p∗ 12 = (1 − p) ∗ [p5 + (1 − p5 ) ∗ p5 ] . (31) The connectivity probability that the platoon can connect with the two RSUs via the neighboring vehicle is p20 = L − 2RRSU p (p2 + (1 − p2 ) ∗ p2 ) . L (32) The overall connectivity probability Pc can be expressed as Pc = 2RRSU + p10 + p20 . L (33) 3) 2RRSU + R2 < L ≤ 2RRSU + 2R1 : In this case, the connectivity probability between the ordinary vehicle and both RSUs is given by p11 = 2RRSU + 2R1 − L (1 − p) (p1 + (1 − p1 ) ∗ p1 ) . (34) L In this case, the ordinary vehicle can overlap with one RSU. The probability that the ordinary vehicle located in the coverage gap can find a neighboring relay vehicle on the same road can be given by p3 = 2 L R1 (1 − e−ρx )dx. (35) 2RRSU +2R1 −L Then, the connectivity probability between the ordinary vehicle and one RSU in this scenario is p12 = (1 − p) ∗ [p3 + (1 − p3 ) ∗ p3 ] . (36) (40) 0 (41) If the vehicle located in the gap is a platoon, the platoon can have an overlapping area with either both RSUs or one RSU. The connectivity probability between the platoon and the RSUs will be the same as (37). The overall connectivity probability that the vehicles connect with the RSUs in this scenario can be given by Pc = 2RRSU + p∗ 12 + p21 + p22 . L (42) 5) L > 2RRSU + 2R2 : In this case, the vehicles located in the coverage gap can only overlap with one RSU. The connectivity probability analysis result between the ordinary vehicle and one RSU in the two-way communication scenario will be the same as p∗ 12 . In addition, if the vehicle located in the gap is a platoon, then the connectivity probability between the platoon and one RSU in the two-way communication scenario is p∗ 22 = p ∗ [p6 + (1 − p6 ) ∗ p6 ] (43) where p6 denotes the probability that the platoon located in the coverage gap can find a neighboring relay vehicle on the same road and is given by 2 p6 = L R2 (1 − e−ρx )dx. (44) 0 Similarly, the connectivity probabilities between the platoon and both RSUs or one RSU can be given by 2 −L p21 = 2RRSU +2R p (p2 + (1 − p2 ) ∗ p2 ) L (37) p22 = p ∗ [p4 + (1 − p4 ) ∗ p4 ] The overall connectivity probability that the vehicles connect with the RSUs is given by where p4 denotes the probability that the platoon located in the coverage gap can find a neighboring relay vehicle on the same road to access one RSU and is given by According to the proposed model derived in Section III and the given formulas, the relationships between the network connectivity probability with other key parameters in the platoonbased VANETs can be derived, including the traffic density, the coverage of the vehicles, the coverage of the RSU, the distance between two adjacent RSUs, and the platoon ratio. Based on the desired connectivity and the node density, this analytical result can help the system designer determine the minimum transmission range required for network connectivity. It is also helpful in reducing the transmission power and control radio interference. The connectivity information is very useful for the design of MAC schemes, broadcast strategies for safety 2 p4 = L R2 (1 − e−ρx )dx. (38) 2RRSU +2R2 −L Then, the overall connectivity probability Pc in the two-way communication scenario can be expressed as Pc = 2RRSU + p11 + p12 + p21 + p22 . L (39) Pc = 2RRSU ∗ + p∗ 12 + p22 . L (45) SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS alert messages, and routing protocols in VANETs [17], [18]. Moreover, based on the desired connectivity probability and the transmission ranges of vehicles, the proper traffic density and the befitting platoon ratio in the network can be determined, which can be used to control the traffic condition of the highway for satisfying the connectivity requirement. In the V2I communication scenarios, the connectivity analytical results are helpful in deploying the RSUs and controlling the infrastructure cost, including the minimum number of RSUs and the minimum radio coverage range of RSUs. Although, multihop transmission is not easy due to the dynamic vehicular topology in the V2V communication scenario. However, in a platoon-based VANET, the platoon leaders can be assumed to have a strategically placed antenna with a large transmission range, which can help forward and store the messages from the platoon members or other ordinary vehicles. This will improve the multihop transmission availability in the VANET. In this case, the study of the connectivity probability is significant for the multihop transmission in the platoonbased VANETs. V. C ONNECTIVITY-AWARE M EDIUM ACCESS P ROTOCOL Based on the connectivity analysis results, a CA MAC protocol is proposed in this section. A multipriority Markov model is explored to investigate the relationship between the connectivity probability and the system throughput. Moreover, according to variable traffic status and network connectivity, a multichannel reservation scheme can be adopted to dynamically adjust the length of the CCHI and the SCHI for the improvement of the system performance. Based on (6), in a fixed-length road segment, for a given total number of vehicles, connectivity probability, and vehicle transmission ranges, the platoon ratio in the network required for the connectivity is 1 M 1 − e−ρR1 − PcN −1 . = p= e−ρR2 − e−ρR1 (M + K) (46) Then, according to (1), the number of platoons (M ) and the number of ordinary vehicles (K) in the network can be derived. These two parameters can be used in the following MAC protocol design to get the optimal system performance. The framework of the CA MAC protocol is shown in Fig. 5. In the protocol, the synchronous time interval is further divided into the adjustable CCHI and SCHI according to traffic conditions. Moreover, the CCHI is further divided into safety interval (SAFI), WSA interval (WSAI), and ACK interval (ACKI). At the beginning of the CCHI, the RSU first broadcasts a control packet called the CA packet to the vehicles under its coverage. The CA packet contains the variable lengths of different intervals and the order of the nodes sending ACK packets in the current synchronous period. Vehicles first broadcast safety packets during the SAFI. Then, during the WSAI, vehicles acting as service providers contend to access the channel for broadcasting the WSA packets. When the ACKI starts, vehicles sequentially reply with ACK packets to confirm the reception of the safety packets or to reserve the SCH channels with the 5603 Fig. 5. Framework of the CA MAC protocol. service providers. When the SCHI starts, vehicles that reserved the SCHs will tune to the specific SCHs to perform service transmission without packet collision. In particular, for the low delay requirements of the safety packets, we divided a special SAFI at the beginning of the CCHI for the transmission of safety packets. To ensure the realtime and effective delivery of the safety packets, the length of the SAFI (TSAFI ) is proportional to the total number of vehicles (N ) in the network, which can support all the vehicles in the network to send a safety packet in a synchronous period. In practice, not all the nodes will send the safety packet. Hence, the length of the SAFI is long enough to ensure the transmission of the safety packets. The delay of the safety packets will be very low. The details of the proposed MAC protocol are as follows. A. Variable CCHI and SCHI Schemes According to the IEEE 1609.4 standard [9], the CCHI and the SCHI are constant. However, when there are traffic accidents on the road, hundreds of cars will access the CCH to transmit control packets and safety packets, which will cause severe channel congestion. On the other hand, when there are only a few safety packets but a lot of service packets in the network, the limited SCH length makes it hard to provide sufficient delivery capability for service applications. In our protocol, the CCHI and the SCHI can be dynamically adjusted according to the current connectivity probability (Pc ) and the channel status. The length of ACKI (TACKI ) is proportional to the total number of vehicles in the network (N ). The optimal length of the WSAI (TWSAI ) can be got from the Markov model of the WSA packets. Then, each RSU periodically calculates the optimal durations of the CCHI (TCCHI = TSAFI + TWSAI + TACKI ) and the SCHI (TSCHI = 100 − TCCHI ) and broadcasts a CA packet to the vehicles under its radio coverage. Finally, these vehicles receiving the CA packet will adjust the CCHI and the SCHI accordingly. When there is no RSU in the network, every platoon leader can work as a temporary coordinator. It will collect the current vehicle information within its radio coverage range, including the number of nodes and the channel status. Then, each platoon leader periodically calculates and broadcasts the optimal duration of the CCHI and the SCHI. Other platoon leaders will 5604 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 receive the information and compare it with their own CCHIs. The longest CCHI will be chosen to ensure the transmission of the safety packets and channel reservations. Those platoon leaders will relay the new CCHI in the network. As a consequence, all the vehicles will adjust their CCHI and SCHI to the same values in the next synchronous period. B. Platoon-Based Multipriority Transmission Scheme In the CA protocol, the WSAI is further divided into several time slots, and service providers attempt to transmit WSA packets at the beginning of time slots if the channel is idle. In our model, it is assumed that different service applications have different bandwidth transmission requirements. When the platoon members involved in the platoons want to announce service information, they first transmit the WSA packets to their platoon leader, and then, the leader, on behalf of the platoon, combines the WSA information to a big WSA packet, contends the CCH, and broadcasts the WSA packet to other vehicles. The WSA packets delivered by the platoon leader contain the ID of every service provider, the bandwidth requirements, and the identities of SCHs to be used of every service application, as well as other information [9]. Since a platoon always contains many vehicle members, from the viewpoint of fairness, we consider the WSA packets broadcasted by platoons (WSAP) having higher priority than the WSA packets delivered by the ordinary vehicles (WSAO). This multipriority-supported transmission scheme is different from the same-priority WSA packet transmission scheme mentioned in the VCI MAC protocol [22]. Moreover, a multipriority Markov model of the WSA packets is proposed to derive the relationship between the connectivity probability and the throughput and to get the optimal system performance of the network according to the dynamic network connectivity. C. Multichannel Reservation Coordination Scheme To reduce the number of packet collisions and increase the channel utilization on the SCHs, a multichannel reservation coordination scheme is applied by the proposed MAC protocol to provide contention-free SCHs. Vehicles that have received the WSA packets and are interested in the service will respond with ACK packets to the service providers. Through this interaction, the transmission channel identities and the transmission duration of the service data on SCHs will be determined. At the end of the CCHI, the vehicles that have made successful reservations will tune to the specific SCHs to perform service transmission. With the aid of the given multichannel coordination mechanism, nodes can access SCHs without contention and transmit data packets continuously in each transmission duration so that the throughput of SCHs can be significantly increased. D. Contention-Free ACK Scheme In the WAVE MAC, vehicles broadcast safety packets to the surrounding vehicles without RTS/CTS handshake or ac- Fig. 6. Markov chain model of the WSAP transmission. knowledgement. In this case, the senders cannot ensure the successful transmission of the safety packets. Furthermore, vehicles that are interested in the same service may send several ACK packets to the same service provider so that serious packet collisions may happen on the CCH. In our protocol, vehicles having received the safety packets or being interested in the service announced by the WSA packets will respond with ACK packets sequentially during ACKI. Moreover, different from the ACK scheme in [22], to avoid duplicate acknowledgements, if the foregoing nodes have responded to a certain safety packet or service provider, the latter nodes that received the ACK packet will not repeat the same response. Moreover, the order of the nodes sending ACK packets is randomly assigned and sent to the vehicles by the RSU via the CA packet. E. Theoretical Analysis Here, based on the number of vehicles according to the current connectivity probability, analysis of the multipriority Markov model, the optimal value of the CCHI and the SCHI and the corresponding system throughput are presented. 1) Analysis of the Markov Model: From (46), it can be found that there are M platoons and K ordinary vehicles, which will transmit WSA packets in the network. Considering that AIFSN(WSAP) = 2 and AIFSN(WSAO) = 3, the model adopts the following assumptions: 1) The channels are ideal, and 2) the transmission and collision probabilities are independent. Let s(i, t), b(i, t), and v(i, t) be the random variables at time slot t that represent the backoff stage, the value of the backoff timer, and the active state of the backoff procedure for a packet of class i(i ∈ 1, 2), respectively. Let Li be the maximum backoff stage for packets of class i and Wi,m be the contention window size of the mth backoff stage. We consider that the backoff procedure is in the freezing state when v(i, t) = 0, and the backoff counter (BC) remains unchanged. The state is active and the BC is subtracted by 1 in an idle slot when v(i, t) = −1. Then, the 3-D process {s(i, t), b(i, t), v(i, t)} can be modeled as a Markov chain with different states (i, j, k). Fig. 6 shows the Markov chain of the WSAP, where v(i, t) = −1, and the BC is subtracted by 1 in each time slot. Let SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS 5605 2) Optimal Value of the CCHI and the SCHI: It is clear that the maximum system throughput can be obtained when the average duration of the idle state E[idle] is equal to the average duration of the busy state E[coll] in a virtual transmission procedure on the wireless channel [23]. That is E[idle] = E[coll] ⇒ pidle ∗ Tidle = pcoll ∗ Tcoll (50) where pidle , pcoll , Tidle , and Tcoll denote the probability that the channel is idle, the probability that a collision occurs, the duration of an idle slot, and the duration of a collision on the CCH, respectively. Let pbusy and psucc denote the probability that the channel is busy and the probability that the packets are successfully transmitted. Then, we have ⎧ M−1 ⎪ ∗ (1 − pj )K−1 ⎨pidle = (1 − pi ) (51) psucc = M ∗ pi ∗ (1 − pi )M−1 ∗ (1 − pj )K ⎪ ⎩ M K−1 +K ∗ pj ∗ (1 − pi ) ∗ (1 − pj ) . Fig. 7. Markov chain model of the WSAO transmission. p1 denote the collision probability. The one-step transition probabilities are given by ⎧ p1 ⎪ Pr {(j + 1, k, −1)|(j, −1, −1)} = (W1,j+1 ⎪ +1) , ⎪ ⎪ ⎪ ⎪ 0 ≤ j ≤ L1 − 1, 0 ≤ k ≤ W1,j+1 ⎪ ⎪ ⎪ ⎨Pr {(0, k, −1)|(j, −1, −1)} = (1−p1 ) , Let TSAF_pkt , TWSA_pkt , and TSIFS denote the time period for transmitting a safety packet, transmitting a WSA packet, and short interframe space (SIFS), respectively. Then, we have Tcoll = 2 ∗ TWSA_pkt + TSIFS (52) Tsucc = TWSA_pkt + TSIFS . (W1,0 +1) ⎪ 0 ≤ j ≤ L1 − 1, 0 ≤ k ≤ W1,0 ⎪ ⎪ ⎪ ⎪ ⎪Pr {(0, k, −1)|(L1 , −1, −1)} = (W 1 +1) , ⎪ 1,0 ⎪ ⎪ ⎩ 0 ≤ j ≤ L1 , 0 ≤ k ≤ W1,0 . Let T denote the time interval between two consecutive successful transmissions of WSA packets in WSAI. Then, the average value of T is given by (47) The Markov chain of the WSAO is shown in Fig. 7, where the backoff procedure will experience the freezing state (j, k, 0) with unchanged BC and v(i, t) = 0. Let p2 , p2,idle , and p2,0 be the probability that a WSAO was not successfully transmitted, and the probabilities that a WSAO encounters an idle slot or a busy slot, respectively. The one-step transition probabilities of WSAO are expressed as ⎧ p2 Pr {(j + 1, k, 0)|(j, −1, −1)} = (W2,j+1 ⎪ +1) , ⎪ ⎪ ⎪ ⎪ 0 ≤ j ≤ L2 − 1, 0 ≤ k ≤ W2,j+1 ⎪ ⎪ ⎪ ⎪ ⎪ Pr {(j, k, 0)|(j, k, −1)} = 1 − p2,idle , ⎪ ⎪ ⎪ ⎨ 0 ≤ j ≤ L2 , 0 ≤ k ≤ W2,j−1 (1−p2 ) ⎪Pr {(0, k, 0)|(j, −1, −1)} = (W , ⎪ 2,0 +1) ⎪ ⎪ ⎪ ⎪ 0 ≤ j ≤ L2 − 1, 0 ≤ k ≤ W2,0 ⎪ ⎪ ⎪ ⎪ ⎪ Pr {(0, k, −1)|(L , −1, −1)} = (W2,01 +1) , 2 ⎪ ⎪ ⎩ 0 ≤ j ≤ L2 , 0 ≤ k ≤ W2,0 . (48) Then, if solving the transition equations shown in (47) and (48) with the normalization condition of the two Markov chains, the steady-state transmission probabilities of WSAP and WSAO can be given by ⎧ L1 +1 ⎪ L1 +1 ⎪ 1 w1,j 1−p1 ⎪ ⎨pi = Lj=0 (1−p 1 )+2 1−p1 j 2∗p 1 (49) L +1 1−p 2 ⎪ ⎪ pj = L2 w2,j 1 L2 +1 . ⎪ ⎩ j (1−p2 )+1−p2 j=0 2∗p 2 E[T ] = Tidle /psucc + pcoll ∗ Tcoll /psucc + Tsucc . (53) Let Q and E[serv] denote the number of WSA packets that successfully reserve the SCH channels and the average successful transmission duration of a service packet on the SCHs, respectively. Then, we have ⎧ ⎪ ⎨TCCHI = TSAFI + TWSAI + TACKI (54) TSCHI = Q ∗ E[serv]/6 ⎪ ⎩ TWSAI = Q ∗ E[T ]. Based on (50)–(54), the optimal length of TWSAI can be derived, and accordingly, the optimal length of the CCHI and the SCHI is achieved. As nodes need not to compete to access the SCHs for the transmission of service packets, the saturated throughput on SCHs can be calculated. Moreover, let PWSA_pkt , PService_pkt , and NSCH denote the payload of the WSA packets, the payload of the service packets, and the number of SCH channels, respectively. Then, we can get the throughput of the system SCCH on the CCH during WSAI and the system throughput SSCH on the SCHs during the SCHI as SCCH = Q ∗ PWSA_pkt (55) SSCH = TSCH /E[serv] ∗ NSCH ∗ PService_pkt . VI. P ERFORMANCE E VALUATION Here, the network connectivity probabilities in the platoonbased VANETs are evaluated. To verify the theoretical analysis 5606 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Fig. 8. Connectivity probability with different numbers of vehicles for the oneway V2V scenario. Fig. 9. Connectivity probability with different values of L for the one-way V2I scenario. on the connectivity probabilities, simulation experiments are conducted by using MATLAB. The simulation for each scenario is repeated for a sufficiently large number of trials (Ntotal = 100 000), and the connectivity probability Pc is obtained from the ratio Nc /Ntotal , where Nc is the number of trials when the networks are connected. Furthermore, the performance of the CA MAC protocol is evaluated by both numerical analysis and simulations via the simulator NS-2.34. We present the analytical results of the optimal intervals corresponding to the dynamic network condition, as well as the analytical and simulation results of the system throughput on the CCH and the SCH. A. Numerical Results for the One-Way Scenario 1) One-Way V2V Scenario: The connectivity in this scenario denotes that any pair of vehicles in the VANET can be connected through a multihop path. Fig. 8 shows the analysis and simulation results of the connectivity probability with different numbers of ordinary vehicles. It is clear that the analytical results match the simulation curve well and the connectivity probability increases with the increase in either the number of platoons or the number of ordinary vehicles. Moreover, the network will nearly be fully connected (Pc = 1) when the number of ordinary vehicles is larger than 80 and when the connectivity probabilities in a platoon-based VANET are always larger than those in a VANET without platoons (M = 0). 2) One-Way V2I Scenario: In this scenario, we consider the connectivity probability as the probability that the vehicles can access an arbitrary RSU within two hops. The vehicles can connect with the RSUs directly or through a vehicle under coverage of the RSU as a relay. Fig. 9 shows the connectivity probability of the network in terms of distance between two adjacent RSUs, when R1 = 300 m and R2 = 500 m. It can be found that the connectivity probability will decrease when distance L increases. The connectivity probability is higher in platoon- Fig. 10. Connectivity probability with different traffic densities for the twoway V2V scenario. based networks compared with that in networks without platoons. B. Numerical Results for the Two-Way Scenario 1) Two-Way V2V Scenario: In this scenario, if the connectivity of the two successive vehicles on the one-way road is broken, the broken link can be connected if there are vehicles located in their coverage gap and connected with each other on the opposite road. Since the VANET is dynamic, many data forwarding steps will cause large delay and unreliability in the networks. For simplicity, we consider the situation when F = 1, which means that there is one vehicle located in the coverage gap of the two broken vehicles and can connect with them. When F = 1, VC and VD shown in Fig. 3 can be seen as one vehicle VC . If VC can connect VA on the left side while connecting VB on the right side, then we can consider the link between VA and VB as connected. Fig. 10 shows the SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS Fig. 11. Connectivity probability with different values of L for the two-way V2I scenario. 5607 Fig. 12. Optimal channel intervals (M = 10). TABLE I S IMULATION PARAMETERS analysis and simulation results of the connectivity probability in the one-way V2V scenario and the two-way V2V scenario, respectively. It is clear that the connectivity probability is higher in the two-way communication scenario than in the one-way communication scenario. Similarly, when there are platoons in the two-way V2V communication scenario, the connectivity probability will be improved. 2) Two-Way V2I Scenario: In this scenario, we consider the connection between the vehicles with the RSUs within two hops. Fig. 11 shows the connectivity probability for the twoway V2I communication scenario in terms of distance between two adjacent RSUs, when R1 = 300 m and R2 = 500 m. The connectivity probability decreases when distance L increases. Simulation and analysis results show that the connectivity probability for the two-way V2I scenario is higher than that for the one-way V2I scenario. Moreover, the connectivity probabilities are higher in the platoon-based VANETs compared with those in networks without platoons. C. Performance Evaluation of the MAC Protocol The performance of the CA MAC protocol is evaluated by both analytical results and simulations. Table I lists the system parameters used in both the theoretical analysis and the simulations. Fig. 13. Throughput on the CCH during the WSAI. Fig. 12 shows the optimal intervals in terms of different numbers of vehicles corresponding to the connectivity probability shown in Fig. 8. It can be found that our proposed MAC protocol can provide sufficient transmission opportunities for safety packets by providing larger SAFI, ACKI, and CCHI as the number of vehicles increases. Moreover, the WSAI and the SCHI decrease with the increase in the number of vehicles, which means that the intervals for service reservations on the CCH and service packet transmissions on the SCHs decrease to ensure the sufficient transmission time for safety information. Therefore, under different traffic loads of the network, the proposed MAC protocol is able to adjust the channel intervals to provide the proper bandwidth. Fig. 13 shows the system throughput on the CCH during the WSAI in terms of different numbers of ordinary vehicles. Although there is a small deviation between the simulation result and the analytical result since the channels are fading, collisions may happen among two and three or more nodes, 5608 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015 Fig. 14. Throughput on the SCHs during the SCHI. and the transmission probability and the collision probability affect each other during the simulation process, it is clear that the simulation results almost match the analytical results. When the number of ordinary vehicles increases, the connectivity probability will increase, as shown in Fig. 8. Accordingly, the throughput increases with the connectivity probability. However, when the number of ordinary vehicles is larger than 60, the throughput will decrease, whereas the connectivity probability increases. This is because the channel contention is aggravated by numerous nodes. The system throughput on the SCHs during the SCHI with different numbers of vehicles is shown in Fig. 14. It can be found that similar to the throughput change on the CCH during the WSAI, the system throughput first increases when the connectivity probability of the network increases, in spite of the decreasing TSCHI , as shown in Fig. 12. Then, the throughput decreases when the number of vehicles further increases. Furthermore, when there are more platoons in the network, the throughput will be improved since the connectivity probability of the network increases. Moreover, we compare the proposed CA MAC protocol with the VCI MAC protocol [22] and the WAVE MAC scheme. It can be found that our proposed MAC outperforms the VCI MAC protocol in terms of throughput on SCHs, since more successful service reservations can be made due to fewer channel collisions on the CCH offered by the contention-free ACK scheme. Furthermore, the maximum system throughput theory [23] adopted in our paper can improve the WSA packet transmission, which can also increase the successful reservations and the throughput on SCHs. Meanwhile, compared with the typical WAVE MAC scheme, the CA MAC can significantly improve the system throughput on the SCHs since the multichannel reservation coordination scheme can provide contentionfree SCHs. VII. C ONCLUSION In this paper, the connectivity probabilities for V2V and V2I communication scenarios in one-way and two-way platoon- based VANETs have been investigated with respect to some important system parameters, such as the traffic density, the coverage of the vehicles, the coverage of the RSU, the distance between two adjacent RSUs, and the platoon ratio in the VANETs. A CA MAC protocol is designed for platoonbased VANETs. Based on a Markov analytical model, the performance of the CA MAC protocol is evaluated in terms of connectivity probability and system throughput. The proposed MAC protocol is enhanced with a multichannel reservation scheme that can dynamically adjust the CCHI and the SCHI for the improvement of the system throughput. Both theoretical analysis and simulation results indicate that the system throughput increases with the connectivity probability. However, when the connectivity probability further increases, the throughput will decrease due to numerous channel contentions. Moreover, simulation results show that compared with the VCI MAC protocol and the WAVE MAC scheme, the CA MAC protocol can improve the system throughput on SCHs due to the effective avoidance of transmission collisions in VANETs. R EFERENCES [1] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” J. Internet Technol., vol. 16, no. 2, pp. 317–323, Mar. 2015. [2] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., to be published, DOI:10.1109/TPDS.2015. 2401003. [3] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190–200, 2015. [4] N. P. Chandrasekharamenon and B. Ancharev, “Connectivity analysis of one-dimensional vehicular ad hoc networks in fading channels,” EURASIP J. Wireless Commun. Netw., vol. 2012, no. 1, p. 1, Jan. 2012. [5] S. C. Ng, W. Zhang, Y. Yang, and G. Mao, “Analysis of access and connectivity in infrastructure-based vehicular relay networks,” in Proc. IEEE Wireless Commun. Netw. Conf., 2010, pp. 1–6. [6] P. Guo, J. Wang, B. Li, and S. Lee, “A variable threshold-value authentication architecture for wireless mesh networks,” J. Internet Technol., vol. 15, no. 6, pp. 929–936, Nov. 2014. [7] S. Xie and Y. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Pers. Commun., vol. 78, no. 1, pp. 231–246, Sep. 2014. [8] IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, IEEE Std. 802.11p, 2010. [9] IEEE Standard for Wireless Access in Vehicular Environments (WAVE)Multi-Channel Operation, IEEE Std. 1609.4, Sep. 2010. [10] S. Leng, H. Fu, Q. Wang, and Y. Zhang, “Medium access control in vehicular ad hoc networks,” Wireless Commun. Mobile Comput., vol. 11, no. 7, pp. 796–812, Jul. 2011. [11] S. Yousefi, E. Altman, R. El-Azouzi, and M. Fathy, “Analytical model for connectivity in vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3341–3356, Nov. 2008. [12] C. Bergenhem, E. Hedin, and D. Skarin, “Vehicle-to-vehicle communication for a platooning system,” Procedia–Social Behav. Sci., vol. 48, pp. 1222–1233, 2012. [13] G. H. Mohimani, F. Ashtiani, A. Javanmard, and M. Hamdi, “Mobility modeling, spatial traffic distribution, and probability of connectivity for sparse and dense vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1998–2007, May 2009. [14] S. Panichpapiboon and W. Pattara-atikom, “Connectivity requirements for self-organizing traffic information systems,” IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3333–3340, Nov. 2008. [15] A. Abdrabou and W. Zhuang, “Probabilistic delay control and road side unit placement for vehicular ad hoc networks with disrupted SHAO et al.: CONNECTIVITY PROBABILITY AND CONNECTIVITY-AWARE MAC PROTOCOL DESIGN FOR VANETS [16] [17] [18] [19] [20] [21] [22] [23] connectivity,” IEEE J. Sel. Areas Commun., vol. 29, no. 1, pp. 129–139, Jan. 2011. W. Jin and W. W. Recker, “An analytical model of multihop connectivity of inter-vehicle communication systems,” IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 106–112, Jan. 2010. R. Hall and C. Chin, “Vehicle sorting for platoon formation: Impacts on highway entry and throughput,” Transp. Res. C, Emerging Technol., vol. 12, no. 5/6, pp. 405–420, Oct.–Dec. 2005. D. Jia, K. Lu, and J. Wang, “A disturbance-adaptive design for VANETenabled vehicle platoon,” IEEE Trans. Veh. Technol., vol. 63, no. 2, pp. 527–539, Feb. 2014. N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, “Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks,” IEEE Commun. Lett., vol. 18, no. 1, pp. 527–539, Jan. 2014. Y. Zhang, G. Cao, and J. Wang, “V-PADA: Vehicle-platoon-aware data access in VANETs,” IEEE Trans. Veh. Technol., vol. 60, no. 5, pp. 2326–2339, Jun. 2011. D. Jia et al., “Improving the uplink performance of drive-thru Internet via platoon-based cooperative retransmission,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4536–4545, Nov. 2014. Q. Wang, S. Leng, H. Fu, and Y. Zhang, “An IEEE 802.11p-based multichannel MAC scheme with channel coordination for vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 2, pp. 449–458, Jun. 2012. J. Mao, Y. Mao, S. Leng, and X. Bai, “Performance optimization for IEEE 802.11 with QoS differentiation supporting,” J. Softw., vol. 21, no. 11, pp. 2866–2882, 2010. Caixing Shao received the B.Eng. degree from Southwest University, Chongqing, China, in 2006. She is currently working toward the Ph.D. degree with the University of Electronic Science and Technology of China, Chengdu, China. From 2013 to 2014, she was a joint Ph.D. student with the Simula Research Laboratory, Fornebu, Norway. She is currently a Lecturer with the College of Computer Science and Technology, Southwest University for Nationalities, Chengdu. Her research interest includes vehicular ad hoc networks. Supeng Leng (M’06) received the Ph.D. degree from Nanyang Technological University (NTU), Singapore. He is a Professor with the School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu, China. He has been a Research Fellow with the Network Technology Research Center, NTU. He has published over 100 research papers. His research interests include resource, spectrum, energy, routing and networking in broadband wireless access networks, vehicular networks, Internet of things, next-generation mobile networks, and smart grids. Dr. Leng serves as an Organizing Committee Chair and a Technical Program Committee Member for many international conferences, as well as a Reviewer for more than ten international research journals. 5609 Yan Zhang (M’05–SM’10) received the Ph.D. degree from the School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore. He is currently the Head of Department with the Department of Networks, Simula Research Laboratory, Fornebu, Norway, and an Adjunct Associate Professor with the Department of Informatics, University of Oslo, Oslo, Norway. His current research interests include wireless networks and reliable and secure cyberphysical systems (e.g., healthcare, transport, and smart grids). Dr. Zhang is an Associate Editor, as well as being on the Editorial Boards, of a number of well-established scientific international journals, e.g., Wiley Wireless Communications and Mobile Computing. He also serves as a Guest Editor for the IEEE T RANSACTIONS ON I NDUSTRIAL I NFORMATICS , IEEE C OMMUNICATIONS M AGAZINE, IEEE W IRELESS C OMMUNICATIONS, and the IEEE T RANSACTIONS ON D EPENDABLE AND S ECURE C OMPUTING. He serves as a Chair or a TPC member for numerous international conferences. He has received seven Best Paper Awards. He is a Senior Member of the IEEE Communications and Vehicular Technology Societies. Alexey Vinel (M’07–SM’12) received the Bachelor’s (Hons.) and Master’s (Hons.) degrees in information systems from the Saint Petersburg State University of Aerospace Instrumentation, Saint Petersburg, Russia, in 2003 and 2005, respectively, and the Ph.D. degrees in technology from the Institute for Information Transmission Problems, Moscow, Russia, in 2007 and Tampere University of Technology, Tampere, Finland, in 2013. He is currently a Professor of data communications with the School of Information Technology, Halmstad University, Halmstad, Sweden. He has been involved in research projects on vehicular networking standards, advanced driver-assistance systems, and autonomous driving. Dr. Vinel has been an Associate Editor for the IEEE C OMMUNICATIONS L ETTERS since 2012. Magnus Jonsson (SM’07) received the B.S. and M.S. degrees from Halmstad University, Halmstad, Sweden, in 1993 and 1994, respectively, and the Licentiate of Technology and Ph.D. degrees from Chalmers University of Technology, Gothenburg, Sweden, in 1997 and 1999, respectively, all in computer engineering. Since 2003, he has been a Full Professor of realtime computer systems with Halmstad University, where he is also the Vice Dean and the Director of Research with the School of Information Technology (ITE). From 1998 to March 2003, he was an Associate Professor of data communication with Halmstad University (acting between 1998 and 2000). He has published close to 120 scientific papers and book chapters, most of them in the areas of vehicular communication, real-time communication, wireless networking, real-time and embedded computer systems, optical networking, and optical interconnection architectures.