Skip to main content
Ali  Balador
  • Valencia, Spain
  • +34673448988
Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As... more
Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As platooning takes place in a vehicular ad hoc network, the use of IEEE 802.11p is close to mandatory. IEEE 802.11p has problems with its medium access method causing packet collisions and random delays. Therefore, we suggest a token-passing medium access method, where the next token holder is selected based on beacon data age. This has the advantage of allowing beacons to be re-broadcasted in case of extra time in each beacon interval. We show that our token-based method is able to reduce the data age and increase reliability considerably compared to the standard.
Research Interests:
Lately, all the top truck manufacturers are investing considerable resources in the research and development of platooning systems which would allow vehicles to save fuel and improve safety by travelling in a close-following manner. The... more
Lately, all the top truck manufacturers
are investing considerable resources in the research
and development of platooning systems which would
allow vehicles to save fuel and improve safety by
travelling in a close-following manner. The platoon-
ing system requires frequent and reliable vehicle-to-
vehicle communications. As platooning takes place in
a vehicular ad hoc network, the use of IEEE 802.11p
is close to mandatory. However, the 802.11p medium
access method su ers from packet collisions and ran-
dom delays. Most ongoing research suggests using
TDMA on top of 802.11p as a potential remedy. How-
ever, TDMA requires synchronization and is not very

exible if the beacon frequency needs to be updated,
the number of platoon members changes, or if re-
transmissions for increased reliability are required.
We therefore suggest a token-passing medium access
method where the next token holder is selected based
on beacon data age. This has the advantage of al-
lowing beacons to be re-broadcasted in each beacon
interval whenever time and bandwidth are available.
We show that our token-based method is able to re-
duce the data age and considerably increase reliability
considerably compared to pure 802.11p.
Research Interests:
Intelligent Transportation Systems (ITS) have attractive potential in order to decrease the ordi- nary trac jams and avoid transportation disasters. Also, they are able to provide various infotainment services like browsing, reading... more
Intelligent Transportation Systems (ITS)
have attractive potential in order to decrease the ordi-
nary trac jams and avoid transportation disasters.
Also, they are able to provide various infotainment
services like browsing, reading e-mail or using social
networks that makes a trip more interesting. In or-
der to make it more ecient in real vehicular envi-
ronments, achieving a well-designed Medium Access
Control (MAC) protocol is a challenging issue due
to the dynamic nature of VANETs, scalability issues,
and the variety of application requirements. Di er-
ent standardization organizations have selected IEEE
802.11 as the rst choice for VANET environments
considering its availability, maturity, and cost. The
research results for IEEE 802.11 MAC protocol show
the importance of contention window adjustment on
the communications performance. The impact of ad-
justing the contention window has been studied in
MANETs, but the vehicular communication commu-
nity has not yet addressed this issue thoroughly.
This paper proposes e-HBCWC, a new contention
window control scheme for VANET environments
based on estimating the network condition. Analy-
sis and simulation results using OMNeT++ in urban
scenarios show that e-HBCWC clearly outperforms
802.11 DCF, even in very high network density, by
increasing the packet delivery rate while decreasing
the number of collisions and the end-to-end delay for
unicast applications.
In mobile ad hoc networks (MANETs), the IEEE 802.11 CSMA/CA is deployed as the primary medium ­access control (MAC) layer protocol to schedule the access to the wireless medium. The IEEE 802.11 standard was designed with the assumption... more
In mobile ad hoc networks (MANETs), the IEEE 802.11 CSMA/CA is deployed as the primary medium ­access control (MAC) layer protocol to schedule the access to the wireless medium. The IEEE 802.11 standard was designed with the assumption that nodes would never deviate from the protocol. However, MANET nodes may purposefully show misbehavior at the MAC layer to obtain more bandwidth or degrade the network performance and disrupt the network services. This paper reviews and classifies the most important strategies generating MAC layer misbehavior based on their objectives and operating principles. Then, it examines some of the recent proposed solutions and mechanisms for detecting and preventing MAC layer misbehavior. A comparison of the studied solutions is carried out using a set of critical evaluation metrics. Finally, the paper concludes with a brief summary of key ideas and a general direction that can provide a basis for future work.
In the IEEE 802.11 standard, network nodes experiencing collisions on the shared medium need a mechanism that can prevent collisions and improve the throughput. Furthermore, a backoff mechanism is used that uniformly selects a random... more
In the IEEE 802.11 standard, network nodes experiencing collisions on the shared medium need a mechanism
that can prevent collisions and improve the throughput. Furthermore, a backoff mechanism is used that
uniformly selects a random period of time from the contention window (cw) that is dynamically controlled
by the Binary Exponential Backoff (BEB) algorithm. Prior research has proved that the BEB scheme suffers
from a fairness problem and low throughput, especially under high traffic load. In this paper, we present a
new backoff control mechanism that is used with the IEEE 802.11 distributed coordination function (DCF).
In particular, we propose a dynamic, deterministic contention window control (DDCWC) scheme, in which
the backoff range is divided into several small backoff sub-ranges. In the proposed scheme, several network
levels are introduced, based on an introduced channel state vector that keeps network history. After
successful transmissions and collisions, network nodes change their cw based on their network levels. Our
extensive simulation studies show that the DDCWC scheme outperforms four other well-known schemes:
Multiplicative Increase and Linear Decrease, Double Increment Double Decrement, Exponential Increase
Exponential Decrease, and Linear/Multiplicative Increase and Linear Decrease. Moreover, the proposed
scheme, compared with the IEEE 802.11 DCF, gives 30.77% improvement in packet delivery ratio, 31.76%
in delay, and 30.81% in throughput.
The IEEE 802.11 provides a MAC layer protocol for controlling competition among nodes to access the channel in wireless local area network. Recent works show that this standard has not suitable performances in mobile ad-hoc networks and... more
The IEEE 802.11 provides a MAC layer protocol for controlling competition among nodes to access the channel in wireless local area network. Recent works show that this standard has not suitable performances in mobile ad-hoc networks and especially in error prone channels. Many researchers proposed many algorithms to improve this standard like HBCWC (History Based Contention Window Control) scheme has significant performances but also has fairness problem. In this paper, we present a novel contention-based protocol to improve fairness and throughput together. We use an array to keep history of network collision and based on array information, we optimize the contention window. The main point is that we get higher priorities to nodes had unsuccessful transmissions unlike most of researches. This helps us to solve fairness problem. Simulation results show that compared to the IEEE 802.11 DCF and HBCWC scheme, our algorithm has better performances in term of throughput, fairness, and network overhead load.
Problem statement: IEEE 802.11 Medium Access Control (MAC) protocol is one of the most implemented protocols in this network. The IEEE 802.11 controls the access to the share wireless channel within competing stations. The IEEE 802.11 DCF... more
Problem statement: IEEE 802.11 Medium Access Control (MAC) protocol is one of the
most implemented protocols in this network. The IEEE 802.11 controls the access to the share wireless
channel within competing stations. The IEEE 802.11 DCF doubles the Contention Window (CW) size
for decreasing the collision within contending stations and to improve the network performances but it
is not good for error prone channel because the sudden CW rest to CWmin may cause several collisions.
Approach: The research to date has tended to focus on the current number of active stations that
needs complex computations. A novel backoff algorithm is presented that optimizes the CW size with
take into account the history of packet lost. Results: Finally, we compare the HBCWC with IEEE
802.11 DCF. The simulation results have shown 24.14, 56.71 and 25.33% improvement in Packet
Delivery Ratio (PDR), average end to end delay and throughput compared to the IEEE 802.11 DCF.
Conclusion: This study showed that monitoring the last three channel status achieve better delay and
throughput that can be used for multimedia communications.
The IEEE 802.11 medium access control (MAC) protocol defines a contention-based distribution channel access mechanism that shares the wireless medium for mobile stations. In this paper, we present a novel back off mechanism, which divides... more
The IEEE 802.11 medium access control (MAC) protocol defines a contention-based distribution channel access mechanism that shares the wireless medium for mobile stations. In this paper, we present a novel back off mechanism, which divides contention window range to the different level based on the history of channel status. Instead of doubling and resetting the CW, we change the CW range by taking into account last three channel states. We test the new scheme against legacy IEEE 802.11 with NS-2 network simulator. The simulation results have shown 30.77% improvement in packet delivery ratio and 31.76% in delay and 30.81% in throughput compared to the IEEE 802.11 DCF.
in wireless networks, the sharing channel has limited communication bandwidth. So designing efficient Medium Access Control (MAC) protocol with high performances is a major focus in distributed contention-based MAC protocol research. IEEE... more
in wireless networks, the sharing channel has limited communication bandwidth. So designing efficient Medium Access Control (MAC) protocol with high performances is a major focus in distributed contention-based MAC protocol research. IEEE 802.11 MAC protocol is the most famous standard in this area. But, this standard has a problem with adopting its backoff range based on channel status. It causes some problems in throughput and fairness in a real situation. In this paper, we propose a simple algorithm that maximizes the throughput and fairness among competing nodes. We have divided nodes into four section of our backoff range. Numerical results show improvement in all performances except end to end delay.
Research Interests:
This presentation tries to give a general view of how to do a simulation with OMNeT++ with showing you different parts of working with OMNeT++. Also, it focuses on using Veins (MiXiM) Framework which provides some protocols for wireless... more
This presentation tries to give a general view of how to do a simulation with OMNeT++ with showing you different parts of working with OMNeT++. Also, it focuses on using Veins (MiXiM) Framework which provides some protocols for wireless and mobile communications. Also, it shows how to use Veins and SUMO together to do realistic urban simulations.
Research Interests: