Study of the Impact of PHY and MAC Parameters in 3GPP C-V2V Mode 4

In the latest years, 3GPP has added short range cellular-vehicle-to-anything (C-V2X) to the features of LTE and 5G in order to make vehicles, roadside devices, and vulnerable users directly exchange information using the same chipset as for classical long range connections. C-V2X is based on the use of advanced physical layer techniques and orthogonal resources, and one of the main aspects affecting its performance is the way resources are allocated. Allocations can be either managed by the network or in a distributed way, directly by the nodes. The latter case, called Mode 4, is defined to manage those situations where the network cannot be involved in the scheduling process, for example due to a lack of coverage, but could also be adopted in order to reduce the processing burden of eNodeB. An algorithm, defined in the standards, makes nodes sense the medium and identify the best time-frequency combination to allocate their messages. Focusing on C-V2V Mode 4, in this work we analyze the parameters of the algorithm designed by 3GPP and their impact on the system performance. Through simulations in different large scale scenarios, we show that modifying some parameters have negligible effect, that the proper choice of others can indeed improve the quality of service, and that a group of parameters allows to trade-off reliability with update delay. The provided results can also be exploited to guide future work.



There are no comments yet.


page 7


Performance Analysis of Sensing-Based Semi-Persistent Scheduling in C-V2X Networks

The 3rd Generation Partnership Project released the cellular vehicular-t...

Decentralized Subchannel Scheduling for C-V2X Mode-4: A Non-Standard Configuration for CAM Retransmissions

In Release 14, 3GPP introduced a novel paradigm known as cellular vehicl...

Analytical Models of the Performance of C-V2X Mode 4 Vehicular Communications

The C-V2X or LTE-V standard has been designed to support V2X (Vehicle to...

Denial-of-Service Attacks on C-V2X Networks

Cellular Vehicle-to-Everything (C-V2X) networks are increasingly adopted...

Shortest Paths in a Hybrid Network Model

We introduce a communication model for hybrid networks, where nodes have...

OpenCV2X: Modelling of the V2X Cellular Sidelink and Performance Evaluation for Aperiodic Traffic

This paper presents OpenCV2X, the first publicly available, open-source ...

Co-channel Coexistence: Let ITS-G5 and Sidelink C-V2X Make Peace

In the last few years, two technologies have been developed to enable di...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Everyone is agreed that cooperative and automated vehicles are coming on our roads in the next few years, completely changing the way mobility is conceived today. As often remarked, full automation is not enough and wireless technologies will play a key role.

In this scenario, as an alternative to the well known and widely tested IEEE 802.11p (and related standards), 3GPP has added new dedicated features to the cellular ecosystem to enable short range communications in the so-called C-V2X. More specifically, by the end of 2016, advanced features have been added in Release 14 to enable direct device-to-device (D2D) communications for the specific scenario of vehicular networks [1]. Such technology will enable short-range vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-pedestrian (V2P) communications, integrated with classical long-range coverage.

Distinctive characteristics of short-range C-V2X with respect to IEEE 802.11p are its advanced physical (PHY) layer and the use of orthogonal resources at the medium access control (MAC) layer. In principle, different users can transmit in fully separate time-frequency slots, thus avoiding reciprocal interference. However, this beneficial effect strictly depends on the ability to identify those resources that are not occupied. In addition, the available spectrum is scarce and space diversity becomes a third optimization dimension in order to minimize the reciprocal interference.

In short-range C-V2X, two different approaches are defined for resource allocation, one under the control of the network, called Mode 3, and the other where decisions are fully distributed among nodes, denoted as Mode 4. Although Mode 3 is expected to outperform Mode 4 given the more information available at the scheduler [2, 3], still problems could arise at the cellular boundaries (especially with different operators) and the latter remains the only option when coverage is intermittent or not available.

Given its crucial importance and in order to make products from different vendors interoperable, a Mode 4 algorithm is defined by 3GPP in [4, 5]. Outside 3GPP, still few works have investigated its performance and the impact of the various parameters. A study is presented for example in [6], where the authors compare Mode 4 to a random selection of resources. Results, in terms of delivery rate, are provided in a Manhattan grid scenario. The same authors extend the investigation to a highway environment in [7], while in [8] an analytical model is proposed in simplified scenarios. Furthermore, in [9] Nguyen et al. compare Mode 4 with a controlled allocation scheme and with IEEE 802.11p. All these works assume fixed and arbitrary settings of the parameters. Some very recent works have focused on the impact of the parameters, limiting their studies to specific aspects and showing that the settings can significantly affect the performance [10, 11].

Although several papers have recently concentrated on Mode 4, they have all posed the attention on specific aspects and one or few parameters. To cope with this limitation and to provide an in-depth discussion of Mode 4, here we focus on the main parameters defined at the PHY and MAC layers, considering both those that can be adjusted by specification and those that are instead mandate to a given value. The study will focus on the semi-persistent scheduling (SPS) related to the cooperative awareness service, which is the periodic broadcast of updated information by all vehicles about their status and movements and is at the basis of most of the applications foreseen for connected vehicles [12, 13]. The impact of each parameter and its optimal setting is derived through large-scale simulations in three realistic scenarios with hundred of nodes, using LTEV2Vsim [14].

In summary, the contribution of the paper is as follows.

  • The performance of C-V2X Mode 4 is shown in realistic urban and highway scenarios, varying all main parameters at PHY and MAC layers;

  • We evaluate the impact of each parameter, starting from, but not constrained to, the values indicated by 3GPP, and identify the optimal settings;

  • Based on the results, guidelines for future improvements of the C-V2X Mode 4 algorithm are provided.

Fig. 1: Example of BRs in the time and frequency domain. In the example, there are four BRs per subframe (in the frequency domain) and one beacon period lasts six TTIs, , , . It follows , of which 16 are within and . Assuming , the number of BRs passed to the MAC layer is .

The rest of the paper is organized as follows: in Section II, the main characteristics of short-range C-V2X are summarized and the Mode 4 algorithm is briefly introduced; in Section III, the models and settings adopted for numerical results are detailed; Sections IV and V then focus on the impact of parameters at the PHY and MAC layer, respectively, followed by summary results and discussion in Section VI; finally, in Section VII we provide our conclusions.

Ii LTE-V2V and Mode 4 in Brief

Constraints from 3GPP Used if not specified
Sensing period () 1 s 1 s (mandated)
Minimum threshold to the power level () dBm -110 dBm (Ref. [7])
Portion of beacon resources passed to the MAC () 0.2 0.2 (mandated)
First subframe for the next allocation () 4 1 (lowest)
Last subframe for the next allocation () 20, 100 100 (highest)
Minimum number of beacon periods before evaluating a new reallocation () 5 5 (mandated)
Maximum number of beacon periods before evaluating a new reallocation () 15 15 (mandated)
Probability to keep the same resource () 0.4 (intermediate)
TABLE I: Main parameters of Mode 4, with constraints indicated by 3GPP and values used where not differently specified.

Ii-a Lte-V2v

The concept of D2D communications was initially introduced in Release 12 of LTE using the term sidelink

to differentiate from downlink and uplink. The new interface for this scope, called PC5, was explicitly designed for proximity services, and has been enhanced in Release 14 to address also vehicular scenarios, where the high mobility of nodes and the possibly high carrier frequency make the channel estimation more challenging.

The new technology, hereafter denoted as LTE-V2V to highlight the reference to the present release of the standards (i.e., LTE) and the case of car-to-car communication, is part of the C-V2X, which promises to cover all use cases in a single chipset and to provide a continuous evolution with backward compatibility in the following releases.

Like LTE uplink, LTE-V2V adopts single carrier-frequency division multiple access (SC-FDMA) at the PHY and MAC layers, with the time-frequency domains organized into orthogonal resources called resource blocks. Resource blocks are allocated in pairs, corresponding to 180 kHz bandwidth (12 subcarriers with 15 kHz space) and 1 ms duration (14 OFDM symbols, of which 9 carry data, 4 are used for channel estimation, and one for timing adjustments and possible tx-rx switch). The minimum allocation time interval is 1 ms and is also denoted as transmission time interval (TTI). In LTE-V2V, resource blocks are also grouped in the frequency domain into subchannels, which are all of a given size (set by the network, with the constraints detailed in [15]). Each subchannel can carry at most one data packet, although one data packet can span over more than one subchannel. More specifically, each data packet, also known as transport block (TB), has an associated control message, called sidelink control information (SCI), which requires 2 pairs of resource blocks. A TB and the associated SCI must be transmitted in the same subframe, but can be allocated on adjacent or non-adjacent resource blocks. In the former case (adjacent), subchannels carry both TBs and SCIs, with the SCI transmitted in the first allocated subchannel. In the latter case (non-adjacent), specific resources are reserved for SCIs and subchannels are only occupied by TBs. The number of subchannels allocated to carry a packet depends on the kind of allocation, the subchannel size, the TB size, and the adopted modulation and coding scheme (MCS).

As mentioned, LTE-V2V has two possible approaches to allocate the resources for transmissions, namely Mode 3, where the network is in charge of performing the allocation and communicating it to the vehicles via signalling channels, and Mode 4, not requiring any intervention by the network. In both cases, a key traffic flow to be allocated is given by the cooperative awareness service, which means the broadcasting from each vehicle of periodic messages, hereafter called beacons111In this work we will use the generic term beacon for the messages that broadcast the cooperative awareness information. Such beacons correspond, for example, to the CAMs of ETSI [16] or a subclass of the basic safety messages of SAE [17]., detailing their status and movements. This service will play a key role in future CAV networks for both safety applications and data routing, since it allows each node to have continuously an updated knowledge of its neighbourhood. Given the periodic nature of the transmissions, allocations are in such case performed on an SPS basis, where the same subchannels are periodically reserved for some time in order to reduce the associated signalling.

Ii-B The 3GPP Mode 4 Algorithm in Brief

The algorithm detailed by 3GPP for Mode 4 is divided into a PHY layer part [4] and a MAC layer part [5]. Hereafter, we provide a brief overview, whereas details on each of the mentioned parameters will be given later in Sections IV and V. An example, including most of the described parameters, is shown in Fig. 1.

Before entering in the description of the algorithm, we will introduce the concept of beacon resource (BR), largely used in the further.

Ii-B1 Beacon resources (BRs)

The objective of the algorithm is to identify an appropriate group of subchannels to allocate one beacon, with the aim to maximize the probability of correct reception by neighbouring vehicles. Given the periodicity (a message every beacon period ) and adopting the SPS approach, once a beacon is allocated, the same subchannels are kept every for a given time. This implies that the selection process focuses on the next time window lasting and on all the groups of subchannels able to carry the beacon during that interval. Such groups are hereafter denoted as BRs and correspond to the single-subframe resources of 3GPP in [4].

Given the size of the beacon, its generation periodicity, the used MCS, the size of subchannels, and the adjacent/non-adjacent allocation of SCIs, the generic node can calculate the number of messages that can be allocated in each subframe and create the time-frequency grid of BRs in one beacon period . The number of BRs in one will be denoted as . Please remark that the BRs are in principle orthogonal to each other (they do not interfere), except for some in-band emission (IBE) when they share the same TTI.

Ii-B2 PHY layer

At the PHY layer, the node continuously reads decodable SCIs and measures the average interference in each BR, with the aim to estimate the occupation of the BRs in the next . Measurements older than a given period are discarded, thus represents a sensing interval.

Given this information, the node focuses on the portion of BRs in the next that lay in an interval to TTIs, where and are parameters. Within this portion, the node considers as candidates only those that

  1. have been monitored; e.g., due to half duplex limitations, a node cannot sense during a TTI if it transmits;

  2. are estimated as not used, either because known as not occupied by the associated SCI or since the average measured reference signal received power (RSRP) is below a given threshold .

The node then sorts the candidate BRs in terms of average sidelink-received signal strength indicator (S-RSSI) and selects the portion with the lowest value, where , is a parameter, and is the ceiling function. If the number of candidates is smaller than , then is increased by 3 dB and the previous steps are repeated. Once the required number of BRs is reached, those selected are passed to the MAC layer.

Ii-B3 MAC layer

At the MAC layer, a BR is randomly selected among the received . Given SPS, the BR is then reserved for a certain number of beacon periods, randomly selected within and .

Once this time interval expires, a new resource allocation is performed with probability . If a reallocation is commanded, the new BR is again randomly selected within the received from the PHY layer. If a reallocation is not commanded (i.e., with probability ), the same BR is kept. Both if a new allocation is performed or not, a new random duration is set following the described rules and the process continues.

Iii Modelling and Simulation Settings

The results shown in the further have been obtained using the LTEV2Vsim simulator [14], which was designed for the investigation of resource allocation algorithms in C-V2X. In this section, a brief description of the main models and settings used for the simulations is provided. The main settings are also summarized in Tables I and II, together with the values adopted if not differently specified.

Fig. 2: Cumulative distribution function of the number of neighbours in the various scenarios.

Iii-a Cooperative Awareness Settings and Definition of Neighbour

To simplify the scenario, we assume that all nodes have messages of the same size, generated at the same frequency, and transmitted using the same MCS. Given these assumptions, the BR grid and the number of beacon resources  is the same for all vehicles. Please note that adopting the same size for all messages is equivalent to assume different sizes transmitted using the same number of resource blocks (as done for example in [9]) and focus the performance investigation on the largest one as the worst case.222For example, 3GPP suggests in [18] sequences of four CAMs of 190 bytes and one of 300 bytes. Our results still hold if the smaller messages use the same amount of resources than the larger ones, adopting a lower coding rate. A different option is to use less resources for the smaller packets, which however causes high inefficiencies with Mode 4, as explained in [7].

Beacons are assumed of size , with periodicity . Equivalently, beacons are periodically generated with a constant periodicity . In particular, is set to 10 Hz, which is the value most commonly adopted and  bytes, which is the largest size suggested by 3GPP in [18].

Beacons are broadcast, thus each of the other vehicles is a potential receiver. However, the importance of a message reduces with the distance. For this reason, we focus on a given maximum distance, set to 100 m in the urban and 200 m in the highway scenarios, and we denote as neighbours all the vehicles within such range from the source.

Iii-B Output Metrics

The following output metrics will be used.

  • Packet reception ratio (PRR): the average ratio between the number of neighbours correctly decoding a beacon and the total number of neighbours;

  • Update delay (UD): given a destination and source couple, it is the time difference between the instant a message is correctly received and the instant the last of the previous messages was correctly received. The UD quantifies how long a node does not receive any update from one neighbour and implicitly gives information about the correlation among errors.

Scenario and application
Scenario Cologne Bologna Highway
Size 3.4 km 2.1 km 16 km,
3+3 lanes
Average n. of vehicles 925 667 2015
Reference awareness distance 100 m 100 m 200 m
Average neighbours (std. dev.) 14.8 (8.8) 25.4 (25.4) 49.4 (12.5)
Beacon periodicity 10 Hz
Beacon size 300 bytes
PHY settings
Bandwidth 10 MHz
Transmission power 23 dBm
Antenna gain (both tx and rx) 3 dB
Noise figure 9 dB
Propagation model WINNER+, Scenario B1

Shadowing variance

LOS 3 dB, NLOS 4 dB
MCS 4 in Cologne (1 BR/TTI)
7 in Bologna & Highway (2 BRs/TTI)
Minimum SINR MCS 4: 2.76 dB, MCS 7: 7.30 dB
TABLE II: Main settings.

Iii-C Scenarios

Results are provided in the following three scenarios.

  • Cologne - Urban, medium density: The scenario is a 1.851.85 km portion, at 7:30, of the urban trace detailed in [19]

    ; on average, there are 925 vehicles, each with 14.8 neighbours within 100 m (standard deviation 8.8), thus the network is moderately dense;

  • Bologna - Urban, congested: The scenario is a 1.61.3 km urban area, denoted in [20] as congested; on average, there are 667 vehicles, each with 25.4 neighbours within 100 m (standard deviation 25.4); certain roads are highly loaded, with even long tailbacks at some junctions;

  • Highway - High density: The scenario, detailed in [20], corresponds to approximately 16 km of a 3+3 lanes highway; on average, there are 2015 vehicles with 49.4 neighbours within 200 m (standard deviation 12.5); the road is highly loaded.

In Fig. 2, the distribution of the number of neighbours that the generic vehicle has in each scenario is shown, considering a maximum distance of 100 m in the urban scenarios (Bologna and Cologne) and 200 m in the Highway scenario. As observable, they have different characteristics and allow to evaluate the performance under various densities. Please note that the upper 20% of vehicles in Bologna and in the highway scenario have a similar number of neighbours, even if the considered range is the half; this implies that in Bologna there is a relevant portion of nodes that are subject to heavy interference conditions. In addition, whereas all links are in LOS conditions in the Highway scenario, communications are often affected by non- (NLOS) conditions in the urban cases.

Iii-D Propagation and Settings at the PHY layer

Fig. 3: Packet reception ratio varying the scenario and MCS, assuming the settings of Mode 4 detailed in Table I.

All devices are assumed transmitting with 23 dBm power and using antennas with 3 dB gain. As for the propagation, the WINNER+ model, scenario B1, is adopted as recommended by 3GPP in [18]. The model also includes log-normal correlated shadowing, with variance 3 dB in LOS and 4 dB in NLOS and with decorrelation distance 10 m in urban and 25 m in highway scenarios. A packet is assumed to be correctly received if the corresponding signal to noise and interference ratio (SINR) is larger than a minimum threshold. All details about the calculations, which take into account co-channel interference and IBE, are provided in Appendix A.

The typical channel bandwidth of 10 MHz is assumed, which corresponds to 50 pairs of resource blocks per subframe. A non-adjacent allocation of SCIs, with four subchannels of 10 pairs (and the remaining used by the SCIs) are assumed.

Preliminary simulations have been then performed to set the MCS per each scenario. With the given assumptions, the options are to either allocate in each subframe one beacon occupying four subchannels with MCS 4, or two beacons occupying two subchannels each with MCS 7, or four beacons, one per subchannel, with MCS 14 (all the other MCSs would reduce the reliability without reducing the occupation of subchannels).

In Fig. 3, the PRR is shown for MCS 4, 7, and 14 in the three scenarios. In general, the PRR is higher in the Highway scenario since there are no buildings impairing the communication and all links are in LOS. Comparing the various MCSs, it can be noted that the results are the consequence of a trade-off: on the one hand, a higher value implies more available BRs, thus a lower collision probability, while on the other, increasing the MCS raises the required minimum SINR, thus causing a higher probability that the received power is insufficient. As observable, the best performance is provided by MCS 4 in the lightly loaded scenario of Cologne, where there are on average less competing nodes, and by MCS 7 in the other two. For this reason, these MCSs are adopted in the further and it follows that in the Cologne scenario and in the Bologna and Highway scenarios.

Iii-E Preliminary Considerations: Hidden Node Probability

Before discussing the impact of the various parameters, it is interesting to estimate how frequent is the event that an interfering signal is not revealed by a node, thus making the sensing procedure ineffective. To this aim, we calculate the probability that an interferer is not sensed, hereafter called hidden node probability, as detailed in Appendix B.

The hidden node probability varying the source-destination distance is shown for the three scenarios in Fig. 4. As expected, the hidden node probability is negligible when the source is near to the destination and then increases when the distance rises. Some differences can be observed in the three scenarios, due to the peculiar road topologies. In particular, especially for short distances, the absolute values vary among all scenarios and a non-monotonic behaviour can be noted in Cologne and Bologna. This is a direct consequence of the LOS/NLOS conditions, that strictly depend on the length of the road segments and the number of intersections.

As the main derivation from Fig. 4, it is important to note that the hidden node probability remains limited within reasonable distances. In particular, it results below 10% up to 50 m in the urban scenarios and almost 150 m in the Highway and do not exceed 30% as a worst case within the distances considered hereafter (i.e., 100 m in urban, 200 m in Highway). This implies that the sensing procedures are indeed potentially effective against most interferers.

Fig. 4: Hidden node probability in the three scenarios.
(a) Varying the sensing period.
(b) Varying the power threshold.
(c) Varying the portion of resources.
(d) Varying the time window.
Fig. 5: Impact of PHY parameters: simulations in realistic scenarios. The values listed in Table I are used for those settings not explicitly indicated.

Iv Impact of Mode 4 PHY settings

As discussed in Section II-B and summarized in Table I, the algorithm is characterized by several parameters at both PHY and MAC layers. In this section, the possible values of those at the PHY layer and their impact will be detailed. Since PRR and UD lead to the same conclusions, curves are shown only in terms of PRR to limit the number of figures; comments to UD are provided only when relevant.

Iv-1 Sensing period

is the time interval during which the node decodes the SCIs and measures the average interference power per each BR. Since the nodes are mobile and reallocations are continuously performed, averaging over long periods increases the risk of inaccurate or outdated measurements. In principle, the lower it is and the better is the estimation for the next future. At the same time, however, it must be long enough to individuate at least one transmission from all neighbouring vehicles, i.e., it should be longer than their beacon period. In the standard, the value is fixed by specifications, depending on the duplexing type, and normally corresponds to 1 s. Please note that 1 s allows to sense at least one transmission from any node having a beacon periodicity of 1 Hz, which should be the lowest value under normal operation conditions.

The impact of a variation of in the investigated scenarios is provided in Fig. 5(a). As expected, except for Cologne, where the sparsity of the network makes results negligibly dependent on , PRR reduces increasing . What is interesting to notice is that a high impact on PRR is observable when gets lower than 1 s (up to 10% higher PRR). As explained previously, this is indeed coherent with the presence of a beacon period of 100 ms. For the same reasons and given that higher beacon periods are possible, simply reducing below 1 s is not a viable solution in general. However, the significance of the improvement suggests that some effort could be posed to enhance the algorithm, for example by either making it variable with the settings of the neighbours or adding mechanisms that better identify and discard the outdated information.

Iv-2 Power threshold

defines a power level below which a BR is assumed as available, independently on what inferred from the decoded SCI. This allows to control the interference level that is considered acceptable and make the selection process more or less stringent. is set by the upper layers, depending on the priority of the transmitter and of the receiver (both within 0 and 7). Specifically, it is set to a value in the range  dBm following the formula

(a) Statistic of the duration before reallocation.
(b) Probability of reallocation during the sensing period.
Fig. 6: Impact of MAC parameters: analysis in simplified scenarios. Results are shown for various combinations of [, ], and . Lines are obtained with (3) and (4), whereas dots correspond to simulations used to validate the analysis.

The impact of is shown in Fig. 5(b). As observable, the impact is irrelevant in both Cologne and Highway. Only in Bologna, a small is shown to improve the performance of about 5% compared to a high . In this case, there are a few congested intersections, where vehicles have more than 70 neighbours in a range of 100 m. To better understand these results, please recall that only a portion of the resources assumed available will be then passed to the MAC, starting from those that have less interference. This implies that is relevant only if a very large number of resources is affected by an interference higher than , thus in very dense scenarios. Summarizing, the lower is and the higher is the PRR, although some impact is only observable in crowded conditions.

Iv-3 Portion of resources

The parameter is then set to control the number of BRs passed to the MAC layer. is fixed to 0.2 by specifications.

Apparently, the lower is , the higher is the probability to select a resource with negligible interference, thus a smaller might be expected to perform better. Indeed, this effect can be observed in Fig. 5(c), even if the variation of PRR is very small: if we look at Bologna and Highway, a slight decrease while increasing can be noted, especially with . However, with simulations not shown here for brevity, it was noted that a too low causes a slight increase in some cases.333For example, this happened assuming Bologna with MCS 4. In such case, the congested situation due to a very high density of vehicles is emphasized by few resources available (). With a smaller set of resources for the random selection of the BR, in fact, the risk of a collision increases if the choice is performed by two nodes at the same time from the same pool. And having the same pool is rather frequent for nodes that are located near to each other and thus sense similar interference. This condition becomes anyway relevant only when the number of neighbours is very high compared to the number of resources. To summarize, the value 0.2 given by the standard appears as an acceptable compromise, even if 0.1 brought us to a small improvement (2-3% in our experiments).

Iv-4 Time window

and are two further parameters at the PHY layer that allow to restrict the interval of the allocation. The former, which must be between 1 and 4, indicates the first TTI where the allocation can be performed and gives a time margin to the device for the selection process. The latter, between 20 and 100, sets the last possible TTI and is used in the case of stringent delay requirements.

The results, shown in Fig. 5(d) for three combinations of and , show a negligible difference in terms of PRR. In terms of UD we noted a very slight increase only with and , confirming the intuitive conclusion that a larger time window better randomizes the resource selection among the various users. The value of and should thus be reasonably set to maximize the window, once the constrains on processing and delay are applied.

(a) Packet reception ratio.
(b) 99.99% of the update delay.
Fig. 7: Impact of MAC parameters: simulations in realistic scenarios. Results are shown for various combinations of [, ], and . The values listed in Table I are used for all the other settings.

V Impact of Mode 4 MAC settings

In this section, the attention is moved to the MAC layer. The main parameters, summarized in Table I, are:

  • Time before evaluation. Parameters and define the minimum and maximum number of beacon periods before a reallocation is considered (only considered and not always performed, as later clarified). Such an interval will be hereafter denoted as time before evaluation (TBE)

    . The actual duration is randomly selected with uniform distribution within

    and . By standard, they are respectively fixed to 5 and 15 for a beacon periodicity of 10 Hz (higher values are defined for smaller frequencies); this means that the same RB is allocated for a duration that ranges between 0.5 and 1.5 seconds;

  • Keep probability. Once the selected number of beacon periods has expired, a new allocation is performed with probability . Equivalently, with keep probability , the same allocation is maintained for another random number of beacon periods. The value of can be chosen between 0 and 0.8.

Parameters , , and together determine the distribution of the duration of an SPS allocation before a different scheduling is performed, hereafter denoted as time before change (TBC). Directly related to , one TBC is composed of a variable number of TBE; each TBE is in turn of variable duration, which depends on and .

It must be noted that an increase of TBC has two opposite effects: on the one hand, it makes the use of the channel more stable, thus making the sensing from neighbouring nodes less affected by outdated information (recall the discussion on ); on the other hand, possible wrong selections are maintained for more time (for example, if two nearby nodes select the same resource they remain invisible for longer).

These two opposed effects are hereafter better highlighted, first focusing on specific metrics in a simplified scenario, and then showing PRR and UD in the realistic ones. With the sake of focusing on relevant cases, we compare five representative combinations: three with and , varying from 0 to 0.4 and 0.8; the other two, assuming , , or , , .

V-a Focus on Specific Metrics.

Let us first focus on the average duration before a reallocation is performed. Following the algorithm at the MAC layer, the probability that the duration of one TBE is equal to a number of beacon intervals is


which can be re-written in the form of vector


As a consequence, the probability distribution

that the same allocation is kept for a given number of beacon periods is then obtained as



denotes the discrete Fourier transform and the power raised to the vector denotes its application to each element. The demonstration is in Appendix C.

quantifies the duration before reallocation and should not be too large to avoid that unfortunate allocations last for too long. With trivial elaborations from , in Fig. 6(a) it is shown the complementary cumulative distribution function (ccdf) of the time before reallocation. Simulation results that validate the analysis are also shown. As observable, if , , and , the probability that the same resource is maintained for more than 10 seconds is approximately 0.1. This could be extremely dangerous, since it implies that two neighbouring vehicles simultaneously selecting a resource of the same TTI (recalling the half duplex limitation) will remain hidden to each other for more than 10 s in 1 case every 100.

Looking now at the negative effect of a short time before reallocation, from (3) we also derive the probability to observe a change during the sensing interval, which causes a wrong view of the occupied resources. To this aim, the probability that a change is performed within a given interval of beacon periods is obtained as


The proof is in Appendix D.

Assuming is a multiple of , the probability that a change is performed during the sensing interval is , which should be obviously as close as possible to zero: in fact, all measurements performed during before the change alter the correct view of the interference. Results varying are shown in Fig. 6(b). Simulations that validate the analysis are also shown. As observable, if the standard is assumed with , the probability to have a change during  s is 0.9, which means that 90% of the sensed nodes have changed their allocation during the sensing interval. This very high probability reflects on an inaccurate estimation of the interference and thus a reduced efficiency of the sensing process.

V-B Simulations in the Investigated Scenarios.

Simulation results in the considered scenarios are then shown in terms of PRR and 99.99% of UD in Fig. 7.

As observable, again the impact of different combinations of , , and have opposed effects on PRR and UD. Whereas increasing any of the values have a positive impact on PRR due to an higher stability on the resource usage and thus a more efficient sensing process, the impact is negative on the update delay, because the duration of wrong allocations is statistically longer. This effect makes plain that the optimal definition of the parameters at MAC layer is subject to an unavoidable trade-off.

Another interesting point is that acting on the window does not lead to significant improvements. This means that the modification of is enough to control the trade-off between PRR and UD and there is no necessity to modify and .

Vi Summary results and discussion

In Fig. 8 and Fig. 9, the PRR and UD are respectively shown for all the addressed scenarios. The former shows the PRR varying the source-destination distance , while the latter provides the UD correspondent to a target percentile, varying such target. In each sub-figure, five curves are compared, corresponding to the following allocations:

  • IEEE 802.11p (with CSMA/CA, hidden terminals, capture effect, and so on), adopting QPSK with 1/2 coding rate, which corresponds to 6 Mbps raw data rate and is the MCS normally used by default;

  • Random, meaning that each vehicle changes allocation every , selecting one of the BRs at random;

  • Standard protocol, with (the minimum) and the other parameters set as in Table I;

  • Standard protocol, with (the maximum) and the other parameters set as in Table I;

  • An optimized Mode 4 where ,  dBm, and some parameters are changed outside the specifications, with particular reference to  s and .

IEEE 802.11p is considered as a benchmark technology for this application. The random allocation is also used as benchmark, since it is the simplest way to allocate resources in LTE-V2V. Then, in addition to considering the standard protocol with the two extremes of , the last item corresponds to the maximum PRR obtainable with the detailed algorithm by modifying all parameters.

From Fig. 8 and Fig. 9, the following observations can be derived.

Vi-1 LTE-V2V vs. IEEE 802.11p

Focusing on the PRR in Fig. 8, thanks to the more advanced PHY and MAC protocols LTE-V2V Mode 4 is shown to outperform IEEE 802.11p in almost all situations, especially if is assumed in LTE. It is however to note that the gap between the technologies is not as large as presumable. The superiority of LTE-V2V is more debatable if we now focus on the UD in Fig. 9. In some cases, such as with target 0.999 in Bologna, the update delay of IEEE 802.11p is indeed lower than with LTE; this is due to a significantly lower correlation between errors that follow the CSMA/CA protocol.

(a) Cologne.
(b) Bologna.
(c) Highway.
Fig. 8: Summary comparison in terms of PRR. The values listed in Table I are used for those settings not explicitly indicated.
(a) Cologne.
(b) Bologna.
(c) Highway.
Fig. 9: Summary comparison in terms of UD.

Vi-2 Random allocation

Using the random allocation as a reference, all curves in Fig. 8 give evidence that Mode 4 is effective in the identification of the free resources and the consequent spacial reuse. At the same time, Fig. 9 illustrates how this comes at the cost of a higher correlation in the errors. If we focus as an example on the Highway scenario, when a target 0.999 or more is considered, Mode 4 has an update delay which is double or more than with the random allocation.

Vi-3 Standard Mode 4

Restricting the observation to Mode 4, it can be noted that allows to improve PRR at the cost of a higher UD. The improvement in terms of PRR (Fig. 8) is negligible in Cologne, where the scenario is sparse, but becomes clear in both Bologna and Highway. The impact in terms of UD (Fig. 9) requires a more careful discussion: it can be noted, in fact, that allows also a lower UD until for values of the target percentile below a given threshold (between 0.997 and 0.998), but causes a higher UD above it. As discussed in Section V, this behaviour is a consequence of longer intervals with the same allocation when is higher; with , wrong estimation of occupied resources is less probable, with lower UD at low target percentile, but an error causes longer bursts of errors, implying higher UD at higher target percentiles.

Vi-4 Mode 4 with Optimized Parameters

In Fig. 8 and Fig. 9, we also show the performance obtained by optimizing the Mode 4 parameters as discussed in the previous sections and summarized in Table I. The clear result is that some margin for optimization in terms of PRR is possible, even if small and limited to very crowded situations (i.e., in Bologna). The impact to the UD is not remarkable, with a slight improvement compared to the standard Mode 4 with in the congested scenarios and a negligible worsening in the Cologne scenario.

Vi-5 Comparison with related work

The discussed results appear consistent with those presented in the related work. Specifically, focusing on a highway scenario, in [11] the authors show that PRR improves increasing , which is in total agreement with Fig. 8(c). In [9], LTE-V2V is shown to outperform IEEE 802.11p both in urban and highway scenarios; the gap is doubled in the latter case; these results are fundamentally coherent with Figs. 8(a), Figs. 8(b), and Figs. 8(c), especially if a high is assumed. Finally, in [6], the authors show that with in a not congested urban scenario, Mode 4 provides a delivery rate not too much higher than a random allocation. Although we observed some improvement also in the (least loaded) Cologne scenario, the cited results appear compatible with the fact that reducing the density of vehicles from Highway to Bologna to Cologne, the gap between Mode 4 and a random allocation reduces (Fig. 8).

Constraints by 3GPP Summary indications
Sensing period  s The lower it is and the more accurate is the estimation, but it is constrained by the minimum beacon period
Minimum threshold to the power level dBm The lower is better, since the used resources are better individuated
Portion of resources passed to the MAC 0.1 might be slightly better in very congested scenarios: it limits the MAC choice to the less interfered resources, without reducing the set too much
First/Last subframes for the next allocation , Negligible impact in all investigated scenarios. Expected anyway that the longer is the interval and the better it is
Min/Max beacon periods before evaluating a reallocation , Modifications to have a similar impact
Probability to keep the same resource PRR/UD trade-off: if then PRR and UD
TABLE III: Main conclusions per each parameter.

Vii Conclusion

In this work we have described the various parameters affecting the performance of the 3GPP Mode 4 algorithm of LTE-V2X. Results have been shown separating those acting at the PHY and MAC layer and performing simulations in three different realistic scenarios. The main conclusions, which also lead to the specific indications reported as the last column of Table III, can be summarized as follows.

  • The modification of all parameters appears almost irrelevant in scenarios with a low to medium number of vehicles, whereas it might become significant when congestions occur;

  • Most parameters at the PHY layer have a minor impact on the performance and should be set to the extremes allowed by the specifications: specifically, the threshold power to sense the resource as occupied and the first TTI for the next allocation should be set to the minimum, whereas the last TTI for the next allocation should be set to the maximum;

  • A minimum improvement is possible by reducing the portion of beacon resources passed to the MAC layer, presently fixed to 20% by the specifications; it has also been observed that the best number slightly varies with the density of vehicles;

  • Again at the PHY layer, some performance improvement can be achieved acting on the sensing period, which is currently fixed to 1 s; it however requires to rethink the way the channel is sensed, since just reducing it is against the fact that some nodes may be transmitting at 1 Hz;

  • At the MAC layer, by modifying the keep probability it is possible to trade-off between a higher packet reception probability and a lower update delay; the variation can be relevant;

  • The variability of the keep probability appears sufficient to control the system performance; thus, as defined in the specifications, it appears acceptable to have fixed values for the minimum and maximum number of beacon periods before a reallocation.

Appendix A: SINR Calculation

Given a generic node , and will be respectively used to denote the set of subframes (we define a set for generality, although it will be always of one element in our case) and the portion of bandwidth where transmits. Given the generic transmitter and the generic receiver , if , cannot decode the message from due to half duplex limitations. Otherwise, the message is correctly decoded if the average SINR, denoted as , is higher than a given threshold . The average SINR is calculated as


where is the power received by from , is the average noise power, is the set of all the vehicles in the scenario, is the portion of time when the two signals from and overlap, and is the IBE coefficient from a signal transmitted in the frequency portion to the frequency portion . is proportional to the number of subframes they overlap, with 0 if the two signals use different subframes and 1 if they use the same subframes. The IBE coefficient is calculated as detailed in [21], with a value of 1 if the signals overlap in frequency and a lower value otherwise.

Appendix B: Calculation of the Hidden Node Probability

The hidden node probability shown in Fig. 4 is calculated as follows. We denote the set of all nodes at a given time instant as . Then, any node in the scenario is a potential source and we define as a generic destination any node that receives from with sufficient signal to noise ratio (SNR), thus any , with

where is the power received by when is transmitting, is the noise power, and is a suitable threshold. Furthermore, we denote as the generic interfering node, which is any node that causes the SINR to become lower than the given threshold (this excludes the nodes that are too far), which can be written as , with

Among all interfering nodes, we call hidden any node that the source cannot hear, using the same threshold as a discriminator. In formulas, , where

At a given instant, the hidden node probability is calculated as

where is the cardinality of set . Finally, the overall hidden node probability is given by the average of over all considered instants, which in our case correspond to periodic samples of period equal to the beacon interval, i.e.,  ms.

Appendix C: Demonstration of Equation (3)

Equation (3) gives the probability that the same allocation is kept for a given number of beacon periods, i.e., the probability that a TBC lasts for a given number of .

Let us denote as the number of TBE of which the generic TBC is composed. The probability distribution that the same allocation is kept for a given number of beacon periods, conditioned to the fact that the TBC is composed by a single TBE, is simply


Since the length of each TBE is independent to the others and given the definition of , the probability distribution that the same allocation is kept for a given number of beacon periods, conditioned to the fact that the TBC is composed by two TBE, becomes


where the symbol denotes the convolution operation and the symbol means the multiplication element-by-element of the vectors. The use of discrete Fourier transformations allows to convert convolutions into products. Straightforwardly, (Appendix C: Demonstration of Equation (3)) can be generalized, for a generic number of TBE composing the TBC as


where the exponent to the vector denotes its application to each element.

Then, the probability that the TBC includes TBE, denoted as , is equal to the probability to keep it times and do not keep it the last one, i.e.,


Using (Appendix C: Demonstration of Equation (3)) and (9) and summing up for a variable number of TBE, it follows (3).

Appendix D: Demonstration of Equation (4)

Equation (4) corresponds to the probability that a change occurs within a given number of beacon intervals, i.e., the probability that a TBC ends within an interval of the given number of .

Let us focus on the last TBC that starts before the given observation interval. The probability to be calculated is indeed exactly equal to the probability that such TBC ends within the observation interval. Let us use to denote the length (in number of beacon intervals) of the TBC and that of the observed interval. The probability that a change occurs within is obviously 1 if . If , it depends on when it started: the change occurs if the interval does not start in the last beacon intervals, which means, assuming equal probability that it started on a generic beacon interval before the observation interval not farther than beacon periods, that a change occurs with probability .

Summarizing, the probability to observe a change within the observation interval of length , conditioned to having the length of TBC, denoted as and expressed in beacon intervals, equal to is


The probability that a change occurs within the observation interval can then be easily calculated, using (10) and (3), as the probability that no change occurs later than the given observation interval, leading to (4).


  • [1] A. Bazzi, B. M. Masini, A. Zanella, and I. Thibault, “On the performance of IEEE 802.11p and LTE-V2V for the cooperative awareness of connected vehicles,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10 419–10 432, November 2017.
  • [2] W. Min, M. Winbjork, Z. Zhang, R. Blasco, H. Do, S. Sorrentino, M. Belleschi, and Y. Zang, “Comparison of LTE and DSRC-based connectivity for intelligent transportation systems,” in IEEE 85th Vehicular Technology Conference (VTC Spring), 2017.
  • [3] G. Cecchini, A. Bazzi, B. M. Masini, and A. Zanella, “Performance comparison between IEEE 802.11p and LTE-V2V in-coverage and out-of-coverage for cooperative awareness,” in 2017 IEEE Vehicular Networking Conference (VNC), Nov 2017, pp. 109–114.
  • [4] “Technical specification group radio access network; evolved universal terrestrial radio access (E-UTRA); physical layer procedures,” 3GPP TS 36.213 V14.7.0, June 2018.
  • [5] “Technical specification group radio access network; evolved universal terrestrial radio access (E-UTRA); medium access control (MAC) protocol specification,” 3GPP TS 36.321 V14.7.0, July 2018.
  • [6] R. Molina-Masegosa and J. Gozalvez, “System level evaluation of LTE-V2V mode 4 communications and its distributed scheduling,” in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
  • [7] ——, “LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications,” IEEE Vehicular Technology Magazine, vol. 12, no. 4, pp. 30–39, December 2017.
  • [8] M. Gonzalez-Martin, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez, “Analytical models of the performance of c-v2x mode 4 vehicular communications,” arXiv preprint arXiv:1807.06508, 2018.
  • [9] T. V. Nguyen, P. Shailesh, B. Sudhir, G. Kapil, L. Jiang, Z. Wu, D. Malladi, and J. Li, “A comparison of cellular vehicle-to-everything and dedicated short range communication,” in IEEE Vehicular Networking Conference (VNC), 2017.
  • [10] A. Nabil, V. Marojevic, K. Kaur, and C. Dietrich, “Performance analysis of sensing-based semi-persistent scheduling in c-v2x networks,” arXiv preprint arXiv:1804.10788, 2018.
  • [11] B. Toghi, M. Saifuddin, M. Mughal, H. N. Mahjoub, Y. P. Fallah, J. Rao, and S. Das, “Multiple access in cellular v2x: Performance analysis in highly congested vehicular networks,” arXiv preprint arXiv:1809.02678, 2018.
  • [12] N. Lyamin, A. Vinel, M. Jonsson, and B. Bellalta, “Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance,” IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 17–28, Jan 2018.
  • [13] A. Balador, E. Uhlemann, C. T. Calafate, and J.-C. Cano, “Supporting beacon and event-driven messages in vehicular platoons through token-based strategies,” Sensors, vol. 18, no. 4, 2018.
  • [14] G. Cecchini, A. Bazzi, B. M. Masini, and A. Zanella, “LTEV2Vsim: An LTE-V2V simulator for the investigation of resource allocation for cooperative awareness,” in 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), June 2017, pp. 80–85.
  • [15] “Evolved universal terrestrial radio access (E-UTRA); radio resource control (RRC); protocol specification,” 3GPP TS 36.331 V14.7.0, June 2018.
  • [16] “Intelligent transport systems (ITS); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service,” 3GPP EN 302.637-2 V1.3.1, September 2014.
  • [17] “DSRC message communication minimum performance requirements: Basic safety message for vehicle safety applications. draft std. j2945.1 revision 2.2, SAE,” SAE, 2011.
  • [18] “Technical specification group radio access network; study on LTE-based V2X services,” 3GPP TR 36.885 V14.0.0, July 2016.
  • [19] S. Uppoor, O. Trullols-Cruces, M. Fiore, and J. M. Barcelo-Ordinas, “Generation and analysis of a large-scale urban vehicular mobility dataset,” IEEE Transactions on Mobile Computing, vol. 13, no. 5, pp. 1061–1075, May 2014.
  • [20] A. Bazzi, B. M. Masini, A. Zanella, and A. Calisti, “Visible light communications as a complementary technology for the internet of vehicles,” Elsevier Computer Communications, Special issue on Multi-radio, Multi-technology, Multi-system Vehicular Communications, 2016.
  • [21] “Technical specification group radio access network; evolved universal terrestrial radio access (E-UTRA); user equipment (UE) radio transmission and reception,” 3GPP TS 36.101 V14.8.0, June 2018.