Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

An Error Protection Protocol for the Multicast Transmission of Data Samples in V2X Applications

Published: 13 July 2024 Publication History
  • Get Citation Alerts
  • Abstract

    There is a trend towards communication of larger data objects in wireless vehicle communication. In many cases, communication uses publish-subscribe protocols. Data rate requirements of such protocols are best addressed by wireless multicast protocols, but the existing protocols lack an error protection that is suitable for real-time and safety-critical applications. We present an application-aware protocol that supports the popular DDS (Data Distribution Service) middleware. By exploiting data object deadlines and slack for retransmissions and employing an adaptable, multicast-aware prioritization mechanism, the reliable exchange of large data objects is enabled. The protocol is sufficiently general to be used on top of different communication standards such as 802.11- and cellular-based V2X (Vehicle-to-Everything) technologies. The protocol was implemented in an OMNeT++ simulation model and evaluated against recent state-of-the-art alternatives using parameters and constraints taken from a motivational truck platooning example. Furthermore, the protocol was implemented using an open-source DDS implementation as the basis and tested on a physical wireless demonstrator setup. The evaluation shows that the presented multicast protocol substantially outperforms the alternatives keeping streaming applications operational even under high frame error rates.

    1 Introduction

    Wireless communication is a key component for future autonomous driving applications, with the planned future use cases trending towards the exchange of large data objects (such as sensor data) [6, 7, 10, 46] that are, e.g., intended for collaborative sensing applications [48]. We refer to such objects as samples, which have to be fragmented for transmission and fully received in time to be usable by the application w.r.t. its safety requirements. For example, in collaborative sensing, samples can be raw sensor data from sensors such as cameras or LIDARs or preprocessed data such as environmental maps, object lists, or similar data structures.
    Thereby, resource limitations of the wireless channel are critical, especially if many transmissions of large samples have to be served in parallel. To tackle this problem, the overall load injection can be reduced by the introduction of multicast, which is able to combine the transmission of same data from one sender to multiple receivers. This way, multicast opens up the channel for a larger number of collaborative sensing applications, which is critical for their broad usability.
    However, fragments of a sample can get lost and have to be retransmitted timely, so an appropriate error protection is necessary. It is uncertain whether physical layer Forward Error Correction (FEC) can serve as a sufficient solution for high frame loss rates under real-time and reliability constraints. In this article, we follow the Backward Error Correction (BEC) approach used in vehicular communication. Under decreasing signal quality, backward traffic and retransmissions can grow substantially. Furthermore, packets can be received by some nodes but dropped by others. Hence, complex feedback scenarios may arise. These effects can easily outweigh the benefits of wireless multicast.
    To address this concern, the idea is to exploit application properties. First, all fragments of a sample have to be (re)transmitted within the extended sample deadline, which allows for relaxed and more efficient fragment scheduling strategies that are managed by a middleware. Second, rather than acknowledging individual fragments, bitmaps provide a robust and low-cost BEC feedback mechanism addressing multiple fragments each. Considering Vehicle-to-Everything (V2X) stack integration, any higher-level protocol faces the large variety of wireless standards and their protocols. In this article, we use the lower layers of IEEE 802.11, which is the basis for the ITS-G5 and WAVE V2X software stacks [23, 32]. However, our model abstractions also make this work applicable to cellular technologies.
    To illustrate and investigate our approach, we will use truck platooning as a prominent example of many surveys and roadmaps [1, 7, 16]. Figure 1 shows such an application, where the leading truck transmits its front camera video or LIDAR stream to the following vehicles via multicast. The sensor data stream provides a front view that is otherwise inaccessible to the following trucks and is necessary to provide safety while driving at close distance. Hence, the augmented service is subject to functional safety requirements: To exclude outdated information, all sensor data samples must be completely received within a sample deadline ( \(D_S\) ). Consequently, all fragments that make up a sample must be received within \(D_S\) . We refer to this as a reliable sample transmission. Otherwise, the affected truck discontinues the service, where it goes back to normal distance (fallback to safe state) and only uses its own sensors. This way, a deadline violation is not critical, nevertheless, a platooning application is only usable if such violations are rare. Within the BEC multicast approach, the middleware protocol can prioritize retransmissions w.r.t. different trucks based on their importance in the platoon, e.g., corresponding to their position.
    Fig. 1.
    Fig. 1. A platoon comprising multiple trucks. The leading truck sends augmenting sensor data in a fragmented manner to the trailing trucks via multicast. Fragment retransmissions are managed by a BEC mechanisms in the middleware that is a part of the V2X communication stack.
    Contribution: In this work, we first present a comprehensive analysis of related work in wireless (multicast) communication w.r.t. the applicability to cooperative perception use cases requiring the exchange of large samples under stringent timing constraints. To overcome inefficiencies and limitations in state-of-the-art technologies and protocols in protecting multicast streams of large objects, we introduce an efficient middleware protocol for multicast error protection and integrate it into the Data Distribution Service (DDS), a highly popular middleware that has been adopted in the automotive AUTOSAR standard for in-vehicle communication [12, 38]. The protocol in this article extends DDS to one-to-many communication between vehicles and is designed to work on top of both 802.11- and cellular-based Media Access Control (MAC) layers in state-of-the-art V2X communication stacks. This way, multicast streams of large sensor data samples are efficiently protected within real-time requirements present in applications such as truck platooning. Specifically, the proposed approach exploits the multi-fragment nature of large samples to address dedicated multicast constraints. These combined considerations enable the use of efficient error correction mechanisms for such communication, which significantly improve the effectiveness of wireless multicast compared to existing protocols. These mechanisms also include a per-reader prioritization mechanism accounting for different measures of importance. We evaluate the protocol in an OMNeT++ simulation as well as implemented in C++ and running on a physical demonstrator concerning truck platooning as in the above example. Furthermore, we present a theoretical analysis of protocol bounds.
    The article starts with a review of related work in the fields of wireless (vehicular) technologies and wireless middleware protocols in Section 2. Section 3 introduces the channel model. Afterwards, we dive deeper into the DDS middleware (Section 4) and our novel multicast protocol (Section 5) that extends the middleware to include context-aware prioritization mechanisms. Evaluation results from simulating a platooning application can be found in Section 6, with results from the physical test setup described in Section 7. Final conclusions are drawn in Section 8.

    2 Related Work

    In this section, we review related work on error protected wireless multicast protocols for large data samples considering the above requirements of a cooperative sensing application such as truck platooning. We first review the capabilities of state-of-the-art V2X communication stacks as a relevant basis for integration of our protocol into actual vehicular setups. Next, we present existing work in the context of reliable wireless multicast communication. Finally, the most relevant approaches for wireless middleware protocols are reviewed in the context of our work.

    2.1 V2X Communication Stacks

    Dedicated Short Range Communication (DSRC) technologies are IEEE 802.11p-based wireless communication systems for vehicular environments [47]. Implementations can be found in ITS-G5 [23] and in WAVE [32] offering ad hoc communication. Several use cases utilizing DSRC for the exchange of small status information have already been tested, including automated valet parking [35, 44], truck platooning [21, 30] and hazard warning systems [17, 22]. In WAVE, also larger data objects can be transmitted via UDP/IP. At its base DSRC uses the physical and data link layer of IEEE 802.11p. The standard handles channel arbitration by a decentralized Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism. Multicast communication is possible, however, error protection in 802.11 is only specified for unicast transmissions [29].
    An alternative to IEEE 802.11-based DSRC technologies that appeared more recently are cellular-based technologies for V2X environments (C-V2X). They offer a sidelink mode, which enables ad hoc communication without the need for base stations [2, 4], such as required in out of coverage situations or for low latency communication. There are LTE-based (4G - Long-Term Evolution) [2] and 5G-based technologies [4]. Those standards try to improve upon 802.11p-based DSRC w.r.t. data rates and reliability. Instead of handling the channel arbitration via CSMA/CA, a Semi-Persistent Scheduling (SPS) approach is used [4]. W.r.t. error protection, a distinction must be made between LTE- and 5G-based technologies. The only means of error protection in LTE-based C-V2X broadcast is sending a packet twice (blind retransmission) [13], which is no sufficient protection for multi-packet samples at higher error rates. In contrast, 5G-based C-V2X provides an acknowledgement-based hybrid automatic repeat request (HARQ) mechanism with up to 32 retransmissions for multicast that can be used for retransmissions [4, 13, 24].
    Moreover, while the C-V2X standard claims to be able to translate application-level requirements to network requirements, those network-level requirements are only applied on a packet level [4], rather than on the sample-level, missing out on the potential exploitation of an application’s sample structure and timing requirements. As a result, sample unaware protection leads to a non-controllable number of frame retransmissions that degrades the efficiency of the sample transmissions as well as interferes with sample transmissions on other links, as shown by Reference [41].
    In summary, neither 802.11p nor the recent C-V2X based-systems offer appropriate error protection mechanisms for multicast on application sample level. Both require an application-level complement that can properly exploit sample-level timing for which the multicast protocol presented in this article would be a promising candidate. To provide maximum efficiency in such a middleware protocol, MAC layer retransmissions may be disabled, which is permitted by the standards.
    Even though data rate improvements for C-V2X exist, it remains unlikely that those suffice for sensor data transfer in sidelink mode. For 802.11p (27Mbit/s) and its successor 802.11bd (54Mbit/s) the transmission of raw sensor data, e.g., a LIDAR stream (35Mbit/s) [1], are impractical, especially due to the nature of a shared wireless channel. Similarly, the performance of C-V2X in sidelink mode does not significantly exceed that of 802.11p/bd [11] in a way that would allow for efficient and reliable sensor data transfer. Data rates in the hundreds of Mbit/s, such as achievable using commodity standards like 802.11ax, are needed.

    2.2 High Reliability Extensions for Wireless Standards

    There are efforts to extend both cellular and 802.11-based technologies to address stringent reliability constraints for communication in safety-critical applications in automotive, industrial and robotic environments. We focus on two noteworthy extensions.
    First, 5G-based C-V2X technologies have introduced a standard extension for Ultra-Reliable and Low Latency Communications (URLLC). A guaranteed reliability of 99.999 % is achieved by means of using redundant signal paths and HARQ mechanisms [3]. However, the guaranteed maximum latency is 1ms for 32 B packets and 10ms for packet sizes of 300 B only [5]. This profile results in extremely short latencies at low data rates, which demonstrates that URLLC has never been intended for the exchange of large samples but rather for the reliable exchange of small control information. This, and the fact that URLLC does not offer multicast extensions, makes it inapplicable for cooperative perception applications as considered in this work.
    Not limited to cellular technologies are efforts to introduce Time-Sensitive Networking (TSN) mechanisms for wireless communication [8, 18]. Originally designed for wired Ethernet communication [28], TSN offers means of reliable and real-time communication. However, the efforts to bring TSN into the wireless domain right now focus on time synchronization and reliability of small data object communication [36, 45]. The intended use cases are similar to those addressed by URLLC, namely, real-time and safety-critical control and automation applications with short latency requirements.
    Consequently, while URLLC and wireless TSN offer advancements towards real-time applications in wireless communication, they are not suitable for real-time communication of large data samples, as, e.g., needed for cooperative perception applications in our use case.

    2.3 Reliable Wireless Multicast Communication

    In literature, there have been several proposals on how to achieve reliable multicast communication in wireless channels. Realizing multicast via multiple unicast connections on the MAC layer cannot solve the limited data rate problem [19, 29]. Approaches adapting the Request-to-Send/Clear-to-Send (RTS/CTS) mechanism used in 802.11 unicast to multicast can only reduce collision errors and do not reduce bit error based frame losses [27, 33]. In this context, complementing or replacing existing bit-level FEC with packet-level FEC protocols to reduce the need for retransmissions has also been addressed [37, 43]. However, protecting large samples using erasure codes under potentially high error rates requires large amounts of redundancy information to achieve reasonable levels of reliability, making such protocols less efficient.
    All approaches are agnostic to the application’s timing constraints that are relevant for the presented V2X use case. Moreover, the main focus is on reliability considerations without taking real-time requirements into account.

    2.4 Wireless Middleware Protocols

    In contrast, and most relevant to our work, application-level middleware, such as DDS, is organized around the exchange of large data samples. The DDS specification defines a publish-subscribe-mechanism for multicast that includes error protection mechanisms for samples. In detail, the concrete data exchange protocol is implemented in DDS’s Real-Time Publish-Subscribe (RTPS) protocol, which supports communication via User Datagram Protocol (UDP) uni- and multicast [39]. As RTPS originally targeted wired (Ethernet) networks, where frame losses are rare, there are no protocol mechanisms supporting compliance to real-time requirements for lossy wireless channels. DDS implementations specifically designed for wireless networks can be found in wireless sensor networks (WSNs), e.g., References [9, 14]. However, their requirements rather focus on resource-constraint environments rather than on latency bounds as in our automotive use case. A proposal to use DDS in V2X applications can be found in Reference [42]. However, this work only considers the exchange of small objects via unicast and does not consider implications of the lossy wireless channel on error protection. Nevertheless, DDS features bitmap-based acknowledgments as well as the general notion of samples that are of interest for this article. For unicast communication, the Wireless Reliable Real-Time Protocol (W2RP) extends DDS in the context of a lossy wireless real-time setup [41]. It proposes shaping and timeout mechanisms, which are able to translate the application deadline requirements to the scheduling of frame (re)transmissions, and to prevent unbounded interference between different senders. However, W2RP only supports unicast. To address multicast with its complex feedback patterns, we need extended error protection protocols.

    2.5 Concluding Remarks on Limiting Factors of Existing Reliable Wireless Technologies

    Overall, the majority of research in the field of reliable real-time wireless communication has focused on the exchange of small messages. This focus matches the need of many applications in areas ranging from WSNs to industrial automation to current versions of cooperative driving automation, as defined in SAE J3216 [31]. With small messages, focusing transmission timing and error control on individual packets is well justified. The relevance changes where large application data objects are involved requiring many packet transmissions for a single data object. The packets of such objects form coherent records that must jointly match reliability and deadline constraints. It is not clear that the protocols developed for individual packet guarantees are also appropriate for such compound data structures. On the contrary, the discussion above has already shown that the majority of available reliable and real-time protocols for small packets will not be efficient. As we will see in the sequel, the established frame-based approaches lead to inefficient solutions when compared to our novel, application-aware protocol.

    3 Channel Model

    Wireless applications communicate via a multi-layered software stack. The communication stack beneath the DDS-based multicast protocol presented in this article uses UDP/IP on top of an IEEE 802.11-based or C-V2X-based MAC and physical access layer to communicate over a lossy channel. UDP implements a simple fire-and-forget approach, which provides flexibility and efficiency to build custom middleware protocols on it. Below the middleware, the MAC and physical layers limit the capabilities of timely and error-protected multicast transmissions of samples and are therefore modeled in the following.

    3.1 Media Access Control Protocol

    On the lower stack levels, frame arbitration has to be managed to minimize collisions. This applies to cellular as well as to 802.11-based technologies.
    To access the channel, IEEE 802.11 standards use a CSMA/CA approach. Before sending a frame, the protocol waits for a certain time in which the channel is idle. Each of such waiting times is generated with uniform random distribution within the so-called Contention Window (CW). This procedure reduces the chance for collisions. While SPS in C-V2X works differently from CSMA/CA, there is also randomness involved to reduce the probability of collision. Before transmitting data, channel sensing is used to determine free Resource Blocks (RBs) that could be used for transmission. The actual resource block used for transmission is then selected randomly from the set of free resource blocks within a selection window of a configurable but static size [4].
    In the system model, we abstract from the specifics of the MAC layer protocol and focus on access time distribution. First, we assume the load on the channel to be constant at least up to the sample deadline \(D_S\) , i.e., we have an average channel idle time. Next, when drawing uniformly random values from the CW (802.11) or using channel sensing to select the next free resource blocks (C-V2X) within the selection window it will lead to an approximately uniformly random distributed waiting time w.r.t. the idle channel state. As an approximation, we have an average arbitration time ( \(\overline{t}_a\) ), which we define as the uniformly random distribution:
    \(\begin{equation} t_a = \text{rand}(0,2) \cdot \overline{t}_a . \end{equation}\)
    (1)
    Figure 2 depicts our arbitration model. Each transmission is delayed by an arbitration time \(t_a\) (Equation (1)), that on average has the duration of \(\overline{t}_a\) . Once the arbitration process succeeded, the transmission blocks the channel for \(t_{tx,data}\) , with \(t_{tx,data}\) depending on the frame size and the data rate.
    Fig. 2.
    Fig. 2. Each frame transmission blocks subsequent frames at the same MAC layer interface for the arbitration and transmission time.

    3.2 The Lossy Wireless Channel

    After its successful arbitration at the MAC layer, a frame is transmitted over the wireless channel. In a wireless setup there are two sources of data loss. First, different frame transmissions can collide, whereas the chance for such a collision increases with the number of simultaneously accessing senders. Scenarios in which collisions dominate as reason for transmission errors represent an overload situation, in which the transmission of large data samples under real-time constraints is not possible anyway, as queuing effects delay fragment transmission and thereby would lead to service decommissioning (cf. above). As our work only addresses feasible setups, we do not consider this error class. Low or moderate amounts of errors due to occasional collisions, however, still allow for communication in the affected channel. Under such circumstances in a non-overloaded setup, the second source of data loss—bit-error related fading effects—dominate. Root-cause for fading effects are reflections, Doppler-Shift, shadowing, and so on, that influence the signal to noise ratio of the transmitted signal at the receiver.
    We model those errors using a bit error rate, as it is common practice in the evaluation of wireless protocols [20]. Correlations between bit errors resulting in burst errors are not considered here specifically. Burst errors affecting multiple consecutive packets correspond to situations with excessive transient error rates, for which we cannot give guarantees with the work presented here. The resulting Bit Error Rate (BER), as adopted from Reference [41], describes the loss probability for each individual frame (Frame Error Rate (FER)), depending on the frame size ( \(S_\text{fr}\) ) in Byte. Different FEC mechanisms can reduce the BER, however, we refer to the residual BER, as it is the effective rate seen at the MAC layer.
    \(\begin{equation} \text{FER}(S_\text{fr}, \text{BER}) = 1-(1-\text{BER})^{(S_\text{fr} \cdot 8)} \end{equation}\)
    (2)
    In contrast to unicast, a multicast frame is simultaneously transmitted to multiple receivers. As the receivers can differ in their location, error rates can differ as well. We consider two scenarios: First, to cover the generality of the protocol, we use completely independent signal paths. Alternatively, there can be dependent signal paths. These allow to more accurately model use cases such as platooning meaning, where, e.g., due to line topology, a frame lost at the second truck will be lost by all other trailing trucks, too.
    Together, the arbitration and loss models are sufficiently detailed to provide a proper basis for evaluation and comparison of different protocols.

    4 Towards an Error Protection Protocol for Wireless Multicast

    For our goal of efficient real-time communication of large data samples, as they support the publish-subscribe paradigm, are multicast capable, and allow for consideration of application requirements. Data samples of size \(S_S\) are transmitted to all RTPS readers by an RTPS writer in a fragmented manner. All fragments of a sample have a constant size \(S_f\) . For error-protection Heartbeat messages that trigger the readers to answer with so-called NackFrag bitmaps can be used. These bitmaps allow readers to positively or negatively acknowledge fragments, which are then retransmitted by the writer. A problem with Standard DDS is the fact that fragment transmissions are handled in bursts. In a shared wireless channel this results in inherent blocking effects that make standard DDS inefficient for such kind of communication, as will be shown in the evaluation. However, the NackFrag acknowledgments and the awareness of application timing requirements allows for more sophisticated high-level fragment scheduling mechanisms to be integrated into DDS/RTPS that explicitly supports \(D_S\) compliance for lossy wireless communication.
    In a first approach, W2RP has developed a mechanism exploiting the aforementioned reliability mechanisms for simple unicast communication. It deploys fragment shaping ( \(t_{f}^{sh}\) ) by periodically transmitting fragments and piggy-backed heartbeats (cf. ① Figure 3) to avoid blocking effects on MAC layer queues caused by bursts of fragments. Additionally, timeouts are used to mitigate stalling effects in case NackFrags are lost.
    Fig. 3.
    Fig. 3. Transmissions phase—Fragment and NackFrag exchange in a multicast scenario as defined in WiMEP: Each fragment is transmitted once, with readers acknowledging the reception or reporting missing fragments with NACKs. The writer tracks the reader responses in the reader proxies.
    In the following, we will adopt the shaping and bitmap based error protection mechanism of W2RP and extend it to different multicast prioritization scenarios within the context of DDS.

    5 Wireless Multicast Error Protection Protocol

    In this section, we introduce our Wireless Multicast Error Protection Protocol (WiMEP) for DDS. WiMEP is a middleware protocol that extends the multicast mechanisms found in RTPS/DDS and W2RP to be capable of offering error protection in lossy wireless multicast communication. Specifically, we extend the reader tracking and use detailed per-reader information for prioritization mechanisms. Implemented on a middleware level and technology-independent with respect to MAC layer properties, WiMEP is applicable for use on top of both 802.11 and cellular-based V2X technologies.
    A graphical representation of WiMEP can be found in Figures 3 and 4.

    5.1 Multicast-aware Error Protection Mechanisms

    RTPS supports UDP multicast and allows serving fragments to all readers in a multicast group simultaneously. As a result, a fragment transmitted by the writer ① can be received by all readers ②. Standard DDS, however, does not specify how to handle feedback from multiple readers in a multicast scenario, making it unsuitable here. When traversing from unicast (W2RP) to multicast, WiMEP can leverage the slack to address the issue of complex error scenarios.
    In complex multicast scenarios, where the missing fragments and error rates at each reader can vary, a per-reader acknowledgment tracking is indispensable. Only by doing so, complex error scenarios can be addressed by the protocol. For this purpose, we track the reception progress of each reader at the writer. Each readers’ NackFrags are tracked in a separate vector at the writer ③. A fragment can either be “unsent” □, “sent” , or “acknowledged” . The reader ID transmitted as part of every NackFrag is used for differentiation here. With each NackFrag the writer’s tracking vectors are updated, keeping detailed up-to-date information on each reader. Fragments that are reported as missing by readers within NackFrags are reset to state “unsent” □ (e.g., ④).
    In general, a sample transmission is split into two phases. In the transmission phase, all fragments are transmitted once in an ascending manner, starting with the smallest fragment number. NackFrag information are gathered but no retransmissions are performed. As WiMEP adopts the periodic shaping of W2RP, the fragments are transmitted with a fixed distance (shaping time \(t_f^{sh}\) ). During the retransmission phase, which is following the transmission phase and also adheres to the periodic shaping, the gathered information is used to select readers and fragments for retransmission. Arbitrary selection policies could be used to select the next fragment. As multicast is used for the retransmission as well, the retransmitted fragment can be used by each reader that is missing the fragment, reducing the number of retransmission overall. While it might seem excessive to send NackFrags following each received fragment if the information is only used at the end of the transmission phase, not doing so would have severe reliability implications. In case either the last fragment or the NackFrags following that fragment would get lost, the writer would have no indication which fragments need to be retransmitted. As a result, we require regular NackFrag responses during the transmission phase to ensure as much up-to-date information on the readers is available at the writer at the beginning of the retransmission phase. We acknowledge that moderately reducing the NackFrag rate could reduce overhead without severely reducing reliability, but the resulting benefit is small and will shrink with future higher data rates.
    The per-reader tracking is also essential for efficient timeouts in multicast scenarios. Timeouts are indispensable in WiMEP to achieve reasonable levels of error protection in cases where no other fragments need to be transmitted and the NackFrags get lost. Without timeouts, this would result in the transmission progress being halted, as the writer does not receive any NackFrags acknowledging or signaling the failure of the last transmission. To avoid such scenarios, we define a configurable timeout of duration \(t_{TO}\) (cf. Figure 4). A timeout is activated if there are no unsent fragments remaining (all fragments are either in state sent or acknowledged ⑤). If no response to the heartbeat part of this message is received prior to the end of the timeout ⑥, then every fragment currently in state will be reset to □, allowing for further retransmissions of affected fragments ⑦.
    Fig. 4.
    Fig. 4. Retransmissions phase: At each periodic transmission instant, the highest-priority reader with missing fragments is selected. The missing fragment with the smallest fragment identifier is retransmitted via multicast. Therefore, it can also be used by other readers missing the fragment. For situation in which no further retransmissions will occur as all fragments are either marked as acknowledged or sent, a timeout mechanism counteracts dropped fragments by resetting sent fragments to unsent if no feedback is received from the readers. This allows for repeated retransmission of affected fragments.

    5.2 Prioritized Retransmission Scheme

    In one-to-many communications, participants can be treated with different priority. The priorities can be either used for prioritizing of already stable links by reducing the negative impact of more erroneous links or to encode the importance and criticality of specific nodes based on the application’s context. In applications such as truck platooning both aspects often overlap. Data provided by the first truck is most important at trucks closest to it. Having intermediate trucks that do not receive the sample data disrupts platooning for all other trailing trucks as well, therefore, the closer to the leading truck, the higher the priority of a reader is. These priorities would correspond with the increasing likelihood of packet loss for trucks further behind the leading truck due to decreasing signal strength.
    We propose a writer-centric prioritization mechanism that can leverage applications’ context information to improve retransmission performance. Writer-centric refers to the writer being designated for assigning priorities to the readers based on some configuration (function, algorithm, or table) as part of the information exchange happening between the writer and the readers during the discovery process (cf. Section 5.3). While the assignment of priorities in the truck platooning use case illustrates the advantages achievable with such a mechanism, the priority selection in other use cases might not be as straightforward. In infrastructure-supported use cases such as camera-equipped valet parking or intersection scenarios use cases there is no guarantee for line-of-sight connections. Therefore, the readers deemed most critical (e.g., closest to the area covered by the camera) must not be the readers with the lowest error rates, as shadowing due to walls or buildings within the signal path can decrease signal quality and thereby increase error rates. Consequently, it might be the case that samples can be delivered to less readers completely in time, however, safety is improved significantly. Safety is just one possible prioritization objective. Reader prioritization has many potential objectives, such as mission-criticality, cost, energy consumption or system performance, with applications in rescue operations, traffic, factory automation and robotics or smart buildings and infrastructure, to name just a few examples. The examples show that prioritization is application-context-dependent, which we consider out of the scope of this work. Instead, we focused on implementing a simplistic prioritization mechanism in WiMEP that prioritizes easy and wide usability and works with any priority selection.
    If no fixed priorities from the application’s context shall be used, then WiMEP also allows for adaptive prioritization mechanisms using the gathered reader information, e.g., to use the packet delivery rate (PDR) as a priority, however, the system performance would be subject to similar tradeoffs as described above. The PDR is defined as the ratio between fragments acknowledged by a reader and the total number of fragments already sent by a writer:
    \(\begin{equation} PDR_i = \frac{N_{f,ack,i}}{N_{f,sent,i}} . \end{equation}\)
    (3)
    If all readers are treated equally, then retransmissions to low-priority readers waste resources that could have been used for retransmission addressing higher-priority readers. In the worst case, this can lead to all readers missing their deadlines. For this purpose, we adjust the fragment selection mechanism in the Retransmission Phase (cf. Figure 4).
    The retransmission phase is structured as follows: First, at each periodic transmission opportunity, the protocol uses its priority-based reader selector to determine the reader with the highest priority. Once a reader has been selected, its first previously negatively acknowledged fragment is selected and retransmitted via multicast. Hence, all readers missing that particular fragment can benefit from the retransmission. This procedure is repeated until no reader with missing fragments remains or the sample deadline has elapsed. Meanwhile, the timeout mechanism ensures transmission progress does not stall due to dropped fragments at the end of the retransmission phase.

    5.3 Protocol Parametrization and Consequences

    The communication is set up with protocol parameters (fragment size \(S_f\) and period \(t_f^{sh}\) ), which are exchanged during the discovery process. During the discovery process of DDS/RTPS, entities (writers and readers) broadcast available services based on so-called topics. If a subscriber recognizes a publisher matching its topic, then it registers at the publisher and data exchange is initiated. As part of the broadcast of service information as well as during registration Quality of Service (QoS) parameters are exchanged between the entities, which was extended for the distribution of WiMEP parameters and priorities here. So far, we assume static parameter assignments for a platoon in operation. Dynamic parameter optimization might improve performance but increases risk of failure, because any transient transmission disruption due to dynamic reconfiguration states a safety violation. Hence, specific protocols will be needed to address parameter adaption and reconfiguration under consideration of stringent safety and timing constraints. This, however, is out of the scope of this work. Still, it is reasonable to define boundary conditions for the communication system. If the bounds are exceeded, then service can be discontinued or the mode of operation changes. This assumption seems acceptable in the platoon example, because there is a fallback truck behavior, as described in the beginning. Then, we can safely focus on the communication behavior within the bounds. The bounds presented in the following are the basis for the evaluation:
    WiMEP is only usable in scenarios where no persistent overload situations occur over the course of a sample transmission. Those occur if the shaping time (here, \(t_f^{sh}\) ) is shorter than the sum of the average arbitration time \(\overline{t}_a\) and transmission times of data fragments \(t_{tx,data}\) and acknowledgments \(t_{tx,ack}\) . Note that for multicast data exchange between a writer and n readers, the acknowledgments of all n readers have to be considered. Persistent overload situations can lead to recurring blocking effects and delays due to queuing on the MAC layer that increase arbitration time even further, making timely sample transmission in those scenarios impractical. To avoid such effects, as in Reference [41], a lower bound for \(t_f^{sh}\) can be defined.
    \(\begin{align} t_{f,min}^{sh} \ge \overline{t}_a + t_{tx,data} + n \cdot t_{tx,ack} \end{align}\)
    (4)
    \(\begin{align} \Leftrightarrow \overline{t}_{a,max} \le t_{f}^{sh} - t_{tx,data} - n \cdot t_{tx,ack} \end{align}\)
    (5)
    W.r.t. the maximum throughput, a protocol foremost is limited by the underlying technology. For periodic multicast protocols like WiMEP, though, the protocol’s maximum throughput is also bounded from above by other factors. Prior to a deadline \(D_S\) elapsing, based on the shaping time \(t_f^{sh}\) a maximum number of (fragment) transmissions \(N_{tx}^{max}\) are possible:
    \(\begin{equation} N_{tx}^{max}= \lfloor {\frac{D_S}{t_f^{sh}}}\rfloor . \end{equation}\)
    (6)
    In error-free scenarios, this results in n times better throughput for multicast over one-to-many communication via multiple unicast streams, as all n readers can be served simultaneously compared to using multiple unicast streams. In non-error-free scenarios, it would be interesting to know to what (frame) error rate WiMEP is at best capable of maintaining error-free sample transmissions. Once again, the periodic nature of the protocol can be used to determine bounds for those error rates. We approximate the number of retransmissions ( \(N_{retr,i}^{needed}\) ). The number of missing fragments per reader is approximated using \(N_f * FER_i\) , where \(N_f\) is the number of individual fragments per sample calculated according to Equation (7) from the given sample size \(S_S\) and configured fragment size \(S_f\) . The number of retransmissions needed at a given FER can be described using the limiting sum of the geometric series in Equation (8). Each x represents a further retransmission step: \(x = 0\) gives the retransmissions needed after the transmission phase. \(x = 1\) then corresponds to the retransmission still needed due to errors occurring during retransmission for \(x = 0\) , Increasing x further continues this series. With this equation representing a geometric series and as \(FER^j \lt 0,\) the presented limiting function converges to the final form of Equation (8). The ceiling function is then used to account for the fact that fragments cannot be missing partly and are always retransmitted completely if dropped in a previous (re)transmission attempt.
    \(\begin{equation} N_f = \lceil {\frac{S_S}{S_f}}\rceil \end{equation}\)
    (7)
    \(\begin{equation} N_{retr,i}^{needed} = {\lceil {\lim _{x\rightarrow \infty } { N_f \cdot FER_i \cdot \sum _{j = 0}^{x} (FER_i)^j }}\rceil } = \lceil {\frac{N_f \cdot FER_i}{1 - FER_i}}\rceil \end{equation}\)
    (8)
    Unless environmental conditions ensure dependent errors, independent errors and signal paths must be assumed as the worst case. Thus, for high but still manageable error rates, retransmissions will in most cases not reach all relevant readers. Using a conservative worst-case assumption, we assume that each reader requires \(N_{retr,i}^{needed}\) retransmission. Combining the fragment transmissions from the first phase of WiMEP and the retransmissions needed for each reader, the total number of transmissions needed to transmit a sample to n readers at a given error rate can be calculated by adding the sum of retransmissions needed for each reader. However, for dependent signal paths and errors this equation would vastly overestimate the packet losses and, consequently, the number of retransmission needed to transmit a sample successfully to all readers. To account for dependencies, we introduce the factor \(r_{d}\) that describes the ratio of common errors across different readers, either due to signal paths dependencies, common interference, or just coincidence. For \(r_{d} = 1\) (upper bound) Equation (9) corresponds to the worst-case scenario described above. However, for completely dependent errors, the lower bound of \(r_{d}\) ( \(\frac{1}{n}\) ) becomes relevant, highlighting the significant reduction in the number of needed retransmissions. Again, n here corresponds to the number of readers. Finally, all mixed scenarios with some dependent and some independent paths and errors lie between those bounds.
    \(\begin{equation} N_{tx}^{needed}= N_f + \sum _{i=0}^{n-1} N_{retr,i}^{needed} { \cdot r_{d} \qquad \text{ with } r_{d} \in \left[\frac{1}{n}, {1}\right]} \end{equation}\)
    (9)
    If \(N_{tx}^{needed}\) exceeds the maximum number of transmissions \(N_{tx}^{max}\) , a reliable sample transmission and thereby deadline violation rates of 0% are not feasible at a given error rate. Consequently, if the number of frame errors exceeds the maximum tolerable FER specified by \(FER_{max}\) in Equation (10) for a given shaping time, then augmented services utilizing the sample data will be discontinued and systems will fall back to a safe state. Only for smaller FERs, reliable sample exchange is possible.
    \(\begin{equation} FER_{max} = \underset{\lbrace FER | 0 \lt FER \lt 1\rbrace }{\operatorname{arg}\,\operatorname{max}}\;{N_{tx}^{needed}| N_{tx}^{needed}\le N_{tx}^{max}} \end{equation}\)
    (10)
    We briefly investigate these reliability bounds in the following evaluation. Thereby, we focus on reliable sample transmission as in the protocol’s capability to transmit the sample completely to all readers within the sample deadline \(D_S\) and not reliability as a statistical parameter.

    6 Evaluation

    In the following, we evaluate the performance of WiMEP in the truck platooning use case, comprising one writer and n readers, w.r.t. deadline violation rates. We start with addressing the limitations of state-of-the-art frame-based MAC-layer retransmission protocols. Then, we compare the WiMEP results to a unicast-based one-to-many protocol as well as to standard DDS. Both protocols implement a sample-based retransmission scheme. First, we will show advantages of multicast-based protocols over unicast solutions. Afterwards, we compare the multicast mechanisms in WiMEP and standard DDS multicast in scenarios with different levels of channel load modeled by the average arbitration time \(\overline{t}_a\) as well as simulating multiple applications at the same time. We close the evaluation by presenting the advantages of a retransmission protocol with prioritization of readers.
    All protocols are implemented in OMNeT++ on top of the UDP/IP-based WiFi stack from the INET package1 and simulated using the channel model described in Section 3. The code of the IdaWirelessSimulator used for the following experiments can be found on GitHub.2 Due to the limitations of V2X technologies w.r.t. data rates, we use 802.11ax with 400Mbit/s, whereby the result for the considerations of a middleware multicast protocol are transferable to other standards as well. For all investigated scenarios the simulated time span is 100 s. Sample period \(P_S\) and deadline \(D_S\) are set to 100 ms, as high-resolution sensors are often sampled with 10 Hz, and 100 ms is a commonly regarded latency constraint for sensor data sharing and autonomous driving applications in general [25, 34]. All three experiments are performed using independent signal paths to prove the protocol’s generality. The prioritization experiments were also run with dependent signal paths.

    6.1 Limitations of Frame-based Retransmission Protocols

    Reference [41] already demonstrated issues of frame-based retransmissions scheme using MAC-layer retransmissions as used in 802.11 unicast communication. The results showed that 802.11’s ARQ mechanism is unable to deliver the performance needed for real-time sample exchange in challenging channel conditions, resulting in frequent deadline violations.
    We evaluated the effectiveness of state of technology retransmission mechanisms for multicast available in C-V2X, namely, blind and HARQ retransmissions, by integrating those into the 802.11 MAC layer. Figure 5 shows the deadline violation rates achieved when transmitting a 450 kB sample either of the frame-based retransmission exceeding 0% for anything exceeding low error rates. In contrast, the sample-based retransmission in WiMEP manages to not violate a single sample deadline. As a result, in the following, we focus only on sample-based retransmission protocols.
    Fig. 5.
    Fig. 5. Deadline violation rates of frame-based retransmission protocols in comparison to WiMEP when exchanging 450 kB samples in a platoon comprising four trucks for different increasing FERs and an average arbitration time \(\overline{t}_a = 500 us\) .

    6.2 Maximum Throughput Analysis

    We compare the maximum error-free throughput achievable using WiMEP, Standard DDS with UDP multicast, and a modified W2RP protocol that supports serving multiple readers via multiple unicast streams (unicast one-to-many), in a simulated platoon comprising four trucks. WiMEP is configured with a period \(t_f^{sh} = {700}\,\mu {\mathrm{s}}\) , a timeout duration \(t_{to} = 2 * t_f^{sh}\) and a fixed fragment size of 11,306 B, to utilize the maximum MPDU-size of 802.11ax (11,454 B) when combining the payload (sample fragment) with the 148 B for all protocol headers needed here. The same configuration is also applied to the unicast-based protocol. Standard DDS uses the reliability QoS policy with the heartbeat period being set to \(3,\!500\, \mu\) s. We use this heartbeat period as a compromise between very short and longer periods that both result in extreme outliers, whereas the chosen heartbeat period enables reasonable communication in more conditions.
    Figure 6 illustrates the results by visualizing the maximum sample size that the protocols were able to transmit without any deadline violations. It is apparent that WiMEP outperforms the other two protocols in all tested scenarios. While for 0% FER Standard DDS offers reasonable improvements over the unicast-based approach, performance degrades rapidly when increasing error rates. As a result, WiMEP offers double the throughput for FERs in range of 10% to 50%. Assume a constant LIDAR data stream of 35Mbit/s [1] that comprises 10 samples per second, each roughly \({450}\,{\text{kB}}\) in size. WiMEP is the only protocol allowing for a stable transmission of such data in a loaded wireless channel under all tested error rates.
    Fig. 6.
    Fig. 6. Maximum violation-free throughput of different protocols at varying frame error rates and an average arbitration time \(\overline{t}_a = 350 us\) in a platoon comprising four trucks.
    A second important aspect of a wireless multicast protocol is the scaling performance w.r.t. the number of readers as platoons, and other use cases may comprise more than 3 readers. For that purpose, we tested the throughput of the three protocols at a FER of 20%. Results can be found in Figure 7. Increasing the number of readers, WiMEP is scaling the best and offers the highest violation-free throughput in all tested setups. For up to 6 readers standard DDS is outperformed or roughly matched by the unicast-based approach. This highlights that multicast without proper handling of lossy communication in shared wireless channels is not an option. Taking the LIDAR data example from Reference [1], only WiMEP is capable of transmitting the sample to up to 14 readers, with the first issue transmitting that data only observed for 15 readers. Meanwhile, both the unicast one-to-many and the standard DDS approaches did not manage to transmit the LIDAR sample to more than 3 readers without deadline violations.
    Fig. 7.
    Fig. 7. Maximum violation-free throughput scaling with an increasing number of readers in a channel with 20% FER and an average arbitration time of \(\overline{t}_a = 350\, \mu\) s.

    6.3 DDS and WiMEP in Different Channel Conditions

    WiMEP and DDS offered significant advantages over a unicast approach in Section 6.2 for 0% FER. However, for increasing FERs, DDS performance degraded rapidly, while WiMEP scaled better. To investigate the reasons, we compared WiMEP and standard DDS in varying channel conditions. The setup is the same platoon comprising four trucks as in Section 6.2, here transmitting a \({450}\,{\text{kB}}\) LIDAR sample with WiMEP using \(t_f^{sh} \in \lbrace {700}\,\mu {\mathrm{s}}, {1000}\,\mu {\mathrm{s}}\rbrace\) . We tested with increasing frame error rates and interference, with the latter being modeled using the average arbitration time. Note that, following the BER model w.r.t. Equation (2), the FER of smaller NackFrag messages is much lower than the one of the larger fragment messages, to which the FER refers in the following:
    Figure 8(a) illustrates, that standard DDS works best only at low levels of interference. For comparison, both tested WiMEP configurations (Figures 8(b), 8(c)) offer more consistent behavior with reliable and violation-free sample transmission at substantial error rates feasible even at higher levels of interference. For both configurations the results are roughly in line with the technical limitations from Section 5.3 though are slightly lower due to statistical modeling effects affecting the violating rate at the fringes of the area of operation. The results also highlight the configurability of our protocol: Using the configurable shaping time parameter \(t_f^{sh}\) , which is only bound from above by Equation (4), it is possible to either adapt the protocol to support higher error rates at lower levels of interference or higher levels of interference at lower error rates.
    Fig. 8.
    Fig. 8. Deadline violation rates for the transmission of a LIDAR sample with varying interference and frame error rates in a platoon comprising four trucks.
    So far, we have considered errors caused by fading effects while neglecting collision-related errors. Instead, the interference was abstracted and included in the average arbitration time \(t_a\) . To shed some light on behavior under collisions as well, we simulated multiple multicast applications, each comprising four trucks, that attempt to transmit the LIDAR sample ( \({450}\,{\text{kB}}\) ). Figure 9 shows the average arbitration time, the collision rate (FER), and the observed deadline violation rate for increasing number of (identical) applications utilizing the same channel. As already shown in Figure 8, longer shaping times \(t_f^{sh}\) allow for more resilience to interference—and thereby also for more applications using the same channel concurrently without deadline violations.
    Fig. 9.
    Fig. 9. Simulation of multiple, independent platoons comprising four trucks each that utilize the same channel. Fading related errors are neglected in this experiment. Instead, the focus is on frame errors caused by collisions and the arbitration time. The two subplots display the average arbitration time, the collision rate (FER), and the observed deadline violation rate of a single application (writer) in this setup. As arbitration times exceeding 1300 \(\mu {\mathrm{s}}\) violate Equation (5) for all shaping times, those are omitted here.
    While the collision rate is not negligible, it is apparent that the main culprit for deadline violations is a significant increase in average arbitration time once Equation (5) is violated. In those instances where deadline violations occur for the first time for a given \(t_f^{sh}\) , the sum of a frame’s average arbitration time and the actual transmission time exceeds 1500 \(\mu {\mathrm{s}}\) , reaching even double-digit milliseconds, making a timely sample transmission infeasible. This can be explained by the overload situation resulting in queuing effects on the MAC layer, thereby significantly delaying fragment transmissions and eventually leading to deadline violations. Even more problematic, the queuing effects on the MAC layer caused by the overload situation prevail after a sample deadline is passed, delaying the fragments of a subsequent sample even more. In general, however, unless Equation (5) is violated, WiMEP is capable of coping with the errors caused by collisions.
    Finally, our simulation results show that WiMEP is capable of addressing both error classes concurrently. We repeat the previous experiment, but this time also simulate errors caused by fading effects. These errors alone account for a FER of 10%. Figure 10 visualizes the results. It is apparent that less applications can utilize the channel simultaneously as, due to the additional channel load caused by the need for more retransmissions, the average arbitration time increased earlier compared to Figure 9, thereby also violating Equation (5) earlier. In spite of this, as long as Equation (5) applies, WiMEP can still sustain reliable and violation-free sample transmission in channels that suffer from collisions and fading-related errors simultaneously.
    Fig. 10.
    Fig. 10. Simulation of multiple, independent platoons comprising four trucks each that utilize the same channel. Both collisions and fading related errors have been investigated. The two subplots display the average arbitration time, the collision rate (FER), and the observed deadline violation rate of a single application (writer) in this setup.

    6.4 Prioritization of Nodes in Mixed FER Scenarios

    An essential mechanism introduced as part of WiMEP is the explicit prioritization of readers. The primary focus lies on preventing negative impact from a single reader with high FER. For experiments, we simulated a platoon comprising six trucks, with the readers experiencing different FERs. Sample and fragment sizes are set to 450 kB and 11,306 B, respectively, to accommodate LIDAR samples. A shaping period \(t_f^{sh}\) of 1,000 µ s is used. We simulated 4 FER combinations, with the FER of reader 4 being increased from 50 % to 80 %. WiMEP with prioritization was compared to a modified WiMEP implementation without the prioritization mechanism.
    The results are presented in Figure 11. Without prioritization, the average individual deadline violation rates of all readers exceeded 0% in all tested scenarios (Figure 11(a)). In contrast, the WiMEP implementation applying the prioritization mechanism manages to achieve violation rates of 0% for readers 0–3 regardless of the FER experienced by reader 4 (Figure 11(b)). The results apply to scenarios with dependent and independent signal paths alike: Figure 12 visualizes the latencies of a setup configured with 600 kB samples and modified error rates. The latencies of readers 0–3 remain unchanged in case prioritization is used (Figure 12(b)), whereas not using prioritization leads to increased sample latencies and eventual deadline violations across all readers (Figure 12(a)). The “missing” boxplots for reader 4 are a result of the violation rate of reader 4 being 100%, hence there is no latency information available.
    Fig. 11.
    Fig. 11. Deadline violation rates for independent signal paths.
    Fig. 12.
    Fig. 12. Sample latencies for dependent signal paths.
    When comparing the results with the protocol bounds plotted in Figure 13, the importance of prioritization for predictability becomes apparent. In scenarios with independent signal paths and without utilizing a prioritization mechanism (cf. Figure 11(a)), due to the single high FER reader interfering with retransmissions to other reader, the bounds presented in Figure 13(a) cannot be met. In comparison, with prioritization WiMEP manages to exceed the bounds for independent path ( \(r_d = 1\) ), as the first four readers are subject to bounds for n (number of readers) = 4, as interference from any lower priority reader is prevented. Hence, readers with up to 30% FER do not experience any deadline violations. Similarly, for dependent signal paths (cf. Figure 12 and Figure 13(b)), it is apparent that not using prioritization results in not adhering to the bounds specified in Equation (10). This is contrasted by the results with prioritization that show all readers with FERs lower than the threshold defined by the curve for dependent signal paths ( \(r_d = \frac{1}{n}\) ) not violating any deadlines, as expected.
    Fig. 13.
    Fig. 13. WiMEP protocol bounds according to Equation (9) and Equation (10) for (a) independent signal path and (b) fully dependent signal paths. The comparisons with the experimental results in Figure 11 and Figure 12 confirm the assumption that prioritization is essential for predictability.
    In mixed FER scenarios as assumed here, the prioritization mechanism is essential for the continuation of the augmented service for the majority of the platoon. It becomes apparent that the prioritization mechanism avoids more important readers (closer to the leading truck) being affected by a single low priority (PDR) reader, whereas not using prioritization leads to increased latencies for all readers and eventually to deadline violations. Using prioritization, only the truck at the end of the platoon would have to leave the platoon. Without prioritization, occasional sample deadline violations will occur at each reader, hence stable platooning is not feasible, as the augmented mode cannot be maintained. The advantages of the prioritization mechanisms do not only apply to platooning applications, but to any use case with similar cyber-physical context and prioritization criteria. To conclude, considering safety-critical applications, the protocol without prioritization does not suffice for systems with hard real-time requirements, whereas when using prioritization, such requirements can be met.

    7 Physical Demonstrator Setup

    We have built a wireless demonstrator that allows for testing of WiMEP in physical environments (Figure 15). Thereby, we can validate the results from the simulation in a real-world environment, namely, the advantages of WiMEP over standard DDS in lossy and loaded wireless channels, and the effectiveness of the prioritization mechanisms. The setup comprises three x86 Linux-hosts running Ubuntu 20.04. Even though the 802.11 standard does not prohibit ad hoc operation for 802.11 versions such as 802.11n, ac, or ax [29], tests with different wireless chipsets showed that Linux does not allow for ad hoc operation using other standards than 802.11b, g (2.4 GHz), and a (5 GHz). Ultimately, extension cards with Atheros WiFi chipsets (AR5B22) have been selected for enabling wireless connectivity between the three hosts. While not the latest models, the ath9k driver supporting the selected Atheros chipset has been found to be the most flexible after a comparison of Linux wireless drivers for chipsets of all major suppliers. Furthermore, the ath9k driver is the only one allowing for easy self-configured operation in bands between 5 and 6 GHz with some driver modifications.
    Fig. 14.
    Fig. 14. Visualization of the truck platooning setup replicated using the physical demonstrator setup.
    Fig. 15.
    Fig. 15. Wireless demonstrator setup comprising three WiFi-enabled Linux hosts. For the experiments, the hosts were distributed across the floor, as seen in lower part of the figure. Due to fading effects caused by shadowing and reflections at walls as well as signal strength decreasing with further distances, error rates at r1 are higher than those at r0.
    For our experiments, the setup was configured for 802.11a ad hoc communication, with the highest possible multicast data rate allowed to be configured using the driver being 24Mbit/s. The real-world maximum UDP throughput as measured using iperf is even lower, topping out at 20Mbit/s. As the basic underlying 802.11 mechanisms remain unchanged regardless of the data rate, this setup is still suitable for the evaluation of WiMEP protocol mechanisms.
    For first practical evaluations, we used the setup in a typical office environment, where packet losses occur due to the many possibilities for shading and reflections in indoor environments. These effects get amplified with increasing distance from the sending node, as (a) signal strength drops with increasing distance and (b) more walls in between nodes cause more reflections and decrease signal strength even further. Testing in an actual mobility scenario such as truck platooning was beyond the scope of this work. The two smaller hosts were distributed within the office as illustrated in Figure 15. Increasing the distance and adding more intermittent walls decreases the signal strength. This results in higher vulnerability to physical shading and reflection effects and thereby higher error rates. We used a pair of hosts with identical wireless configurations to replicate feasible load conditions by means of additional traffic injection on the same channel.
    WiMEP was implemented using the open-source DDS and RTPS implementation FastDDS3 by eProsima that is supported by the Robot Operating System 2 (ROS 2) [40]. Specifically, we implemented the shaping mechanisms as well as the per-reader transmission progress tracking and retransmission prioritization mechanisms for multicast, allowing for an evaluation of the proposed protocol. General details on the implementation can be found in Reference [15]. While there, only the unicast implementation (W2RP) is described, with WiMEP building on W2RP the general structure is similar. Hence, the multicast-specific transmission function and prioritization of retransmissions is integrated within the new periodic, TimedEvent-based, transmission function.
    In Section 7.1, we will give insights into the setup’s capabilities and derive appropriate configurations for the following experiments. Then, Section 7.2 compares our FastDDS-based WiMEP implementation with the unaltered FastDDS version (in the following referred to as “standard DDS”), and Section 7.3 evaluates the effectiveness of the prioritization mechanism.

    7.1 Experiment Parametrization

    Considering the limited maximum throughput, full-resolution vehicular camera data (1,920*1,280 pixels and 24-bit color) such as provided by the Audi Autonomous Driving Dataset (A2D2)4 [26] cannot be transmitted using the presented setup. For a first test, we scaled down the resolution of frames to 257*171 pixels and used 8-bit color (grayscale) instead (cf. Figure 16). The resulting samples are 44000 kB in size. While not containing all information, basic information such as road boundaries, vehicles, and other potential obstacles are still recognizable, and we end up with samples that can be exchanged using the demonstrator setup. While we acknowledge that advanced future applications would rather use higher-resolution images, the effectiveness of error protection mechanisms for fragmented samples is valid even for lower data rates. Same as with the simulation, sample period \(P_S\) and deadline \(D_S\) are set to 100 ms.
    Fig. 16.
    Fig. 16. Exemplary scaled camera frame (257*171 pixels) derived from Reference [26] that is transmitted between the three nodes.
    The fragment size \(S_f\) for all following experiments has been set to 1500 B. Given that fragment size, in an initial test of WiMEP, we measured average FERs of 7% and 16% for r0 and r1 in the described setup, respectively. However, it is important to note that there are occasional samples with lower as well as higher FERs. Equation (4) under the assumption of an idle channel for \(t_{f,min}^{sh}\) and Equation (9) for \(t_{f,max}^{sh}\) can be used to estimate feasible parameter configurations for WiMEP. For the latter, a FER of 20% has been used as a point of reference. This results in the shaping time to be selected from \(\left[{0.6}{~ms},{2.6}{~ms}\right]\) . Using WiMEP with \(t_{f}^{sh}\) = 2,000 ms and standard DDS with a heartbeat period of 5 ms, both protocols were able to transmit the sample in a timely manner as long as there had been no interference.

    7.2 Multicast Comparison with Standard DDS

    For the direct comparison of standard DDS and the WiMEP implementation, we stressed the channel with additional load and measured the deadline violation rate at each reader. Load has been generated using iperf with the target load gradually increasing from 0Mbit/s to 20Mbit/s. At the upper end, this resulted in 74% of additional channel load. Using iperf’s pacing-timer parameter, the load has been configured to be constant and evenly distributed, transmitting 1500 B packets periodically, as can be seen from the visualized packet trace for 15Mbit/s load in Figure 17. The average periods of the iperf packets for the all four configurations are also plotted in Figure 17. According to Section 5.3, the chosen shaping time ( \(t_{f}^{sh}\) = 2 ms) should allow for deadline violation free sample transmissions in the given environment. Standard DDS retained the heartbeat period of 5 ms from the initial parametrization.
    Fig. 17.
    Fig. 17. Periodic load as generated using iperf (here, for a target load of 15Mbit/s). The average packet periods of all four load configurations are visualized within the smaller subplot.
    The results visualized in Figure 18 are based on 100 s traces resulting in the evaluation of 1,000 samples in total per data point. The trends in Figure 18 are in line with the simulation results from Section 6.3: Standard DDS only managed to transmit all 1,000 samples if there was no additional channel load. In all other tested scenarios, violation rates exceeded 0%, making standard DDS unusable for wireless multicast communication in use cases like truck platooning where any violation states a safety violation. Contrary to standard DDS, WiMEP only experienced deadline violations at target loads of 20Mbit/s that represent an overload situation with effectively 100% channel load. For all other experiment runs, no violations could be observed, making WiMEP an effective solution that is suitable for the timely exchange of large (fragmented) samples in safety-critical multicast scenarios.
    Fig. 18.
    Fig. 18. Measured deadline violation rates when comparing standard DDS and the WiMEP implementation in scenarios with increasing channel load.

    7.3 Retransmission Prioritization

    To validate the effectiveness of the prioritization mechanism, we used a fixed channel load of 10Mbit/s. At that load and a shaping time of 2 ms, no deadline violations occur (cf. Figure 18). To investigate priority effects, \(t_{f}^{sh}\) was increased to 2.5 ms, thereby reducing slack for retransmissions and making the sample transmission more vulnerable to deadline violations. We compared WiMEP with and without reader prioritization. Again, results in Figure 19 and Figure 20 are based on a 100 s trace. Average measured FERs experienced by the readers remain unchanged at about 7% and 16% for readers r0 and r1, respectively. However, as the FER of some samples at r1 reaches 27%, we observe deadline violations at r1.
    If no prioritization mechanism is used, then it is apparent that not only r1 but both readers experience deadline violations (Figure 19). Deadline violations at r0 correlate with late or incomplete samples at r1, as can been seen when looking at the excerpt of the trace of deadline violations at each reader in Figure 20. Even though r0 does not experience an exceptionally high frame error rate, the retransmissions to r1 affect r0: Fragments being retransmitted that are only missing at r1 prevent transmission progress at r0. Moreover, considering that r1 has a higher probability of not receiving a retransmitted fragment, the probability of required retransmissions is higher for r1, potentially blocking progress at r0 even more. Eventually, this is leading to incomplete or late samples at both readers. As a result, the operation of any envisioned platooning application without a prioritization mechanism is not possible under realistic load and FER conditions. In contrast, default WiMEP with the dedicated prioritization mechanism enables reader r0 (highest priority) to be unaffected by reader r1 (lower priority). This would enable safe platooning between the first two trucks. The increase in r1’s violation rate in comparison is irrelevant in this case, as any deadline violation rate exceeding 0% states a safety violation that would lead to service decommissioning.
    Fig. 19.
    Fig. 19. Measured deadline violation rates when comparing WiMEP with and without the prioritization mechanism.
    Fig. 20.
    Fig. 20. WiMEP without prioritization: Excerpt (first 250 samples only for improved legibility) of the trace visualizing deadline violations at each reader and correlations between deadline violations (red lines) at the readers.

    8 Conclusion

    The article shows that wireless multicast of large data objects with selective backward error correction is useful and efficient in serving the needs of vehicular real-time publish-subscribe communication. The dedicated multicast protocol WiMEP complements existing protocols and mechanisms in the field of reliable wireless communication that are currently limited to the exchange of small messages by enabling reliable and real-time exchange of large data objects. Thereby, WiMEP broadens the scope of wireless communication to new applications that so far have not been feasible due to challenges in wireless multicast. The developed wireless multicast protocol outperformed two alternatives for publish-subscribe applications using known error protection mechanisms, both in simulation as well as on a physical demonstrator setup. The context-aware prioritization mechanism also proved to be highly effective in mitigating complex error effects in multicast scenarios. The proposed protocol is not limited to vehicle communication but can equally be applied to other cyber-physical systems with wireless publisher-subscriber communication of large datasets, such as in robotics, industry, or other mobility applications.

    Footnotes

    References

    [1]
    3GPP. 2018. 3GPP TR 22.886 - Study on Enhancement of 3GPP Support for 5G V2X Services (Release 16). https://portal.3gpp.org/#/
    [2]
    3GPP. 2018. 3GPP TR 22.914 - Release 14 Description; Summary of Rel-14 Work Items (Release 14). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3179
    [3]
    3GPP. 2019. 3GPP TR 38.824-3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on Physical Layer Enhancements for NR Ultra-reliable and Low Latency Case (URLLC) (Release 16). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3498
    [4]
    3GPP. 2021. 3GPP TR 21.916 - Release 16 Description; Summary of Rel-16 Work Items (Release 16). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3493
    [5]
    3GPP. 2022. 3GPP TR 38.913-3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Scenarios and Requirements for Next Generation Access Technologies (Release 17). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2996
    [6]
    5G Automotive Association (5GAA). 2020. C-V2X Use Cases Volume II: Examples and Service Level Requirements. Online: https://5gaa.org/c-v2x-use-cases-volume-ii-examples-and-service-level-requirements/. Accessed August 2023.
    [7]
    ACEA (European Automobile Manufacturers Association). 2019. Perspectives of the European automotive industry on future C-ITS spectrum needs for cooperative, connected and automated mobility. (Nov.2019). Online: https://www.acea.auto/publication/acea-clepa-paper-future-c-its-spectrum-needs/. Accessed August 2023.
    [8]
    Toni Adame, Marc Carrascosa-Zamacois, and Boris Bellalta. 2021. Time-sensitive networking in IEEE 802.11 be: On the way to low-latency WiFi 7. Sensors 21, 15 (2021), 4954.
    [9]
    Anas A. Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Hasan Mahmoud, and Khaled Salah. 2019. Reliable middleware for wireless sensor-actuator networks. IEEE Access 7 (2019), 14099–14111. DOI:
    [10]
    Ahmad Alalewi, Iyad Dayoub, and Soumaya Cherkaoui. 2021. On 5G-V2X use cases and enabling technologies: A comprehensive survey. IEEE Access 9 (2021), 107710–107737. DOI:
    [11]
    Waqar Anwar, Norman Franchi, and Gerhard Fettweis. 2019. Physical layer evaluation of V2X communications technologies: 5G NR-V2X, LTE-V2X, IEEE 802.11bd, and IEEE 802.11p. In IEEE 90th Vehicular Technology Conference (VTC2019-Fall’19).
    [12]
    AUTOSAR Org. 2020. AUTOSAR Specification of Communication Management. Retrieved from https://www.autosar.org/
    [13]
    Alessandro Bazzi, Antoine O. Berthet, Claudia Campolo, Barbara Mavì Masini, Antonella Molinaro, and Alberto Zanella. 2021. On the design of sidelink for cellular V2X: A literature review and outlook for future. IEEE Access 9 (2021), 97953–97980. DOI:
    [14]
    Kai Beckmann and Olga Dedi. 2015. sDDS: A portable data distribution service implementation for WSN and IoT platforms. In 12th International Workshop on Intelligent Solutions in Embedded Systems (WISES’15).
    [15]
    Alex Bendrick, Jonas Peeck, and Rolf Ernst. 2023. On the effectiveness of W2RP in physical environments. Publicat. Instit. Comput. Netw. Eng. (2023). DOI:
    [16]
    Mate Boban, Apostolos Kousaridas, Konstantinos Manolakis, Josef Eichinger, and Wen Xu. 2018. Connected roads of the future: Use cases, requirements, and design considerations for vehicle-to-everything communications. IEEE Vehic. Technol. Mag. 13, 3 (2018), 110–123. DOI:
    [17]
    C-ITS Deployment Group. 2020. ASFINAG Connects Roads with Vehicles on a Large Scale in Europe. Retrieved from https://c-its-deployment-group.eu/activities/c-its-deployments/2020-10-09-asfinag-connects-roads-with-vehicles-on-a-large-scale-in-europe/
    [18]
    Dave Cavalcanti, Ed Agis, Genio Kronauer, Maik Seewald, Malcolm Smith, and Alon Regev. 2022. Wireless TSN: Market expectations capabilities and certification. White Paper, Avnu Alliance 2 (2022).
    [19]
    Antonio de la Oliva, Pablo Serrano, Pablo Salvador, and Albert Banchs. 2013. Performance evaluation of the IEEE 802.11aa multicast mechanisms for video streaming. In IEEE 14th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM’13). 1–9. DOI:
    [20]
    J. Ebert. 1999. A Gilbert-Elliot Bit Error Model and the Efficient Use in Packet Level Simulation. Technical Report, Technical University Berlin.
    [21]
    S. Ellwanger and E. Wohlfarth. 2017. Truck platooning application. In IEEE Intelligent Vehicles Symposium (IV’17). DOI:
    [22]
    Federal Ministry of Transport and Digital Infrastructure, Germany. 2021. C-ITS: Intelligente Mobilität für weniger Verkehrsunfälle. Retrieved from https://www.autobahn.de/fileadmin/user_upload/Pressemitteilung_Intelligente_Mobilitaet_fuer_weniger_Verkehrsunfaelle.pdf
    [23]
    A. Festag. 2014. Cooperative intelligent transport systems standards in Europe. IEEE Commun. Mag. 52, 12 (2014). DOI:
    [24]
    Mario H. Castañeda Garcia, Alejandro Molina-Galan, Mate Boban, Javier Gozalvez, Baldomero Coll-Perales, Taylan Şahin, and Apostolos Kousaridas. 2021. A tutorial on 5G NR V2X communications. IEEE Commun. Surv. Tutor. 23, 3 (2021), 1972–2026. DOI:
    [25]
    David Garcia-Roger, Edgar E. González, David Martín-Sacristán, and Jose F. Monserrat. 2020. V2X support in 3GPP specifications: From 4G to 5G and beyond. IEEE Access 8 (2020), 190946–190963. DOI:
    [26]
    Jakob Geyer, Yohannes Kassahun, Mentar Mahmudi, Xavier Ricou, Rupesh Durgesh, Andrew S. Chung, Lorenz Hauswald, Viet Hoang Pham, Maximilian Mühlegg, Sebastian Dorn, et al. 2020. A2D2: Audi autonomous driving dataset. (2020). arxiv:2004.06320
    [27]
    S. K. S. Gupta, V. Shankar, and S. Lalwani. 2003. Reliable multicast MAC protocol for wireless LANs. In IEEE International Conference on Communications (ICC’03). 93–97. DOI:
    [28]
    IEEE. 2018. IEEE standard for local and metropolitan area network—Bridges and bridged networks. IEEE Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014) (2018), 1–1993. DOI:
    [29]
    IEEE. 2021. IEEE standard for information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016) (2021). DOI:
    [30]
    T. Bijlsma, T. Hendriks, J. Vissers, L. Elshof, T. Jansen, and B. Krosse. 2016. In-vehicle architectures for truck platooning: The challenges to reach SAE automation level 3. In Proceedings of the ITS World Congress.
    [31]
    SAE J3216. 2020. Taxonomy and Definitions for Terms Related to Cooperative Driving Automation for On-Road Motor Vehicles J3216 202107, SAE International.
    [32]
    J. B. Kenney. 2011. Dedicated Short-Range Communications (DSRC) standards in the United States. Proc. IEEE 99, 7 (2011). DOI:
    [33]
    J. Kuri and S. K. Kasera. 1999. Reliable multicast in multi-access wireless LANs. In IEEE INFOCOM’99, Vol. 2. DOI:
    [34]
    Shih-Chieh Lin, Yunqi Zhang, Chang-Hong Hsu, Matt Skach, Md E. Haque, Lingjia Tang, and Jason Mars. 2018. The architectural implications of autonomous driving: Constraints and acceleration. SIGPLAN Not. 53, 2 (Mar.2018), 751–766. DOI:
    [35]
    Christian Löper, Claas Brunken, George Thomaidis, Stephan Lapoehn, Paulin Pekezou Fouopi, Henning Mosebach, and Frank Köster. 2013. Automated valet parking as part of an integrated travel assistance. In 16th International IEEE Conference on Intelligent Transportation Systems (ITSC’13). 2341–2348. DOI:
    [36]
    Alexander Mildner. 2019. Time sensitive networking for wireless networks-a state of the art analysis. Network 33 (2019).
    [37]
    Neda Nikaein, Houda Labiod, and Christian Bonnet. 2000. MA-FEC: A QoS-based adaptive FEC for multicast communication in wireless networks. In IEEE International Conference on Communications (ICC’00). Global Convergence through Communications. Conference Record, Vol. 2. IEEE, 954–958.
    [38]
    Object Management Group (OMG). 2015. Data Distribution Service, Version 1.4. OMG Document Number formal/2015-04-10. https://www.omg.org/spec/DDS/1.4/About-DDS
    [39]
    Object Management Group (OMG). 2019. DDS Interoperability Wire Protocol, Version 2.3. OMG Document Number formal/2019-04-03. https://www.omg.org/spec/DDSI-RTPS/2.3
    [40]
    Open Robotics. 2023. ROS 2 Documentation. Retrieved from https://docs.ros.org/en/foxy/index.html
    [41]
    Jonas Peeck, Mischa Möstl, Tasuku Ishigooka, and Rolf Ernst. 2021. A middleware protocol for time-critical wireless communication of large data samples. In IEEE Real-Time Systems Symposium (RTSS’21). 1–13. DOI:
    [42]
    Joshwa Pohlmann, Maximilian Matthé, Tobias Kronauer, Paul Auerbach, and Gerhard Fettweis. 2022. ROS2-based small-scale development platform for CCAM research demonstrators. In IEEE 95th Vehicular Technology Conference (VTC2022-Spring’22). IEEE, 1–6.
    [43]
    Luigi Rizzo and Lorenzo Vicisano. 1998. RMDP: An FEC-based reliable multicast protocol for wireless environments. (Apr.1998). DOI:
    [44]
    Robert Bosch GmbH. 2023. Automated Valet Parking - The Driverless Parking Service. Retrieved from https://www.bosch-mobility-solutions.com/en/solutions/parking/automated-valet-parking/
    [45]
    Tobias Striffler, Nicola Michailow, and Michael Bahr. 2019. Time-sensitive networking in 5th generation cellular networks—Current state and open topics. In IEEE 2nd 5G World Forum (5GWF’19). 547–552. DOI:
    [46]
    Harsh Tataria, Mansoor Shafi, Andreas F. Molisch, Mischa Dohler, Henrik Sjöland, and Fredrik Tufvesson. 2021. 6G wireless systems: Vision, requirements, challenges, insights, and opportunities. Proc. IEEE 109, 7 (2021), 1166–1199. DOI:
    [47]
    U. S. Department of Transportation. 2011. Vehicle Safety Communications Project - Final Report. Technical Report DOT HS 810 591. National Highway Traffic Safety Administration.
    [48]
    Yicong Wang, Gustavo de Veciana, Takayuki Shimizu, and Hongsheng Lu. 2018. Performance and scaling of collaborative sensing and networking for automated driving applications. In IEEE International Conference on Communications Workshops (ICC Workshops’18). 1–6. DOI:

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Cyber-Physical Systems
    ACM Transactions on Cyber-Physical Systems  Volume 8, Issue 3
    July 2024
    211 pages
    ISSN:2378-962X
    EISSN:2378-9638
    DOI:10.1145/3613667
    Issue’s Table of Contents
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 13 July 2024
    Online AM: 23 August 2023
    Accepted: 12 August 2023
    Revised: 06 July 2023
    Received: 24 February 2023
    Published in TCPS Volume 8, Issue 3

    Check for updates

    Author Tags

    1. Wireless networks
    2. multicast
    3. error protection
    4. large data objects
    5. middleware

    Qualifiers

    • Research-article

    Funding Sources

    • Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)
    • German BMBF

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 133
      Total Downloads
    • Downloads (Last 12 months)133
    • Downloads (Last 6 weeks)12

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media