Share

Export Citation

APA
MLA
Chicago
Harvard
Vancouver
BIBTEX
RIS
Universitas Hasanuddin
Research output:Contribution to journalArticlepeer-review

Evaluation Performance of Contention Window on the Impact Hidden Node Vehicle to Vehicle

Rasna

2023 International Seminar on Intelligent Technology and Its Applications Leveraging Intelligent Systems to Achieve Sustainable Development Goals Isitia 2023 Proceeding

Published: 2023Citations: 1

Abstract

The IEEE 802.11p protocol uses Medium Access Control (MAC) to control who has access to the vehicle. The MAC layer of 802.11p uses access techniques known as Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). Channel access is possible using the Distributed Coordination Function (DCF), which includes a built-in countdown. Additionally, CSMA/CA uses a radio station before speaking to another vehicle to identify which one is broadcasting. However, the RTS/CTS mechanism cannot be applied to broadcast communication because broadcast communication cannot receive CTS from all receiving vehicles. To eliminate hidden nodes in vehicle-to-vehicle communication, the contention window’s effectiveness will be evaluated in this study by raising the communication channel’s signal-to-interference and noise ratio (SINR). V2V transmission is used, namely broadcast, considering that from previous research, RTS/CTS transmission can only be done in unicast. RTS/CTSCW=64 if it is in dense traffic conditions (N=400), then $\mathrm{Radius}_{\mathrm{hidden}}$ is approximately 25 meters in radius. In contrast, in light traffic conditions with RTS/CTSCW=64, $\mathrm{Radius}_{\mathrm{hidden}}$ is around 300 meters in radius.

Other files and links

Fingerprint

Node (physics)Sciences
Computer scienceSciences
Window (computing)Sciences
Computer networkSciences
EngineeringSciences
Operating systemSciences
Structural engineeringSciences