Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols
Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols
Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols
65
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
Index Terms Hidden Terminal Problem, CSMA, Hidden Terminal, Exposed Terminal, MACA
IDDEN nodes are the nodes that are not in the range
of other nodes or a group of nodes. Take a physical star
topology with an access point with many nodes
surrounding it in a circular fashion: Each node is within
communication range of the access point, but the nodes
cannot communicate with each other as they do not have
physical connection to each other. In a wireless network, it is
possible that the node at the far edge of the access point's
range, known as r, can see the access point, but it is unlikely
that the same node can see a node on the opposite end of the
access point's range, r2. These nodes are known as hidden.
The problem is when nodes r and r2 start to send packets
simultaneously to the access point. Since node r and r2
cannot sense the carrier, Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA) does not work. To
overcome this problem, handshaking is implemented in
conjunction with the CSMA/CA scheme. The same problem
exists in a MANET [2].
The hidden node problem can be observed easily in
widespread (>50m radius) WLAN setups with many nodes
that use directional antennas and have high upload. This is
why IEEE 802.11 is suited for bridging the last mile, for
broadband access, only to a very limited extent. Newer
standards such as Wi-MAX assign time slots to individual
stations, thus preventing multiple nodes from sending
simultaneously and ensuring fairness, even in oversubscription scenarios [2].
IEEE 802.11 uses 802.11 RTS/CTS acknowledgment and
handshake packets to partly overcome the hidden node
problem. RTS/CTS is not a complete solution and may
decrease throughput even further, but adaptive
acknowledgments from the base station can help too.
66
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
3 HIDDEN TERMINALS
The notorious hidden node problem deals with a
configuration of three nodes, like A, B, and C in Figure 1,
whereby B is within the transmission range of A and C, while
C is outside the range of A. In a situation like this, C will not
be able to detect the ongoing transmission of A to B by carrier
sensing and, consequently, it can inadvertently interfere with
Bs reception of As packet [1].
The transmission range of a node A is defined as the area
inside which other nodes are able to correctly receive As
packets. On the other hand, the carrier sense range of A is the
area encompassing those nodes whose transmission A can
perceive (carrier sense) while not necessarily being able to
receive the transmitted packets [1].
Generally, it is unreasonable to assume that the two areas
are always the same, e.g., the carrier sense range can be twice
the transmission range [7].
Suppose that every node in Figure 1 has the same
transmission range (represented by a solid circle). Node C is
out of the transmission range of node A and thus would
appear as a hidden node to A. However, if the carrier sense
range of C is larger than the transmission range of A (see the
dashed circle), C is no more hidden because it can sense the
transmission of A and thus avoid interfering with it. This
mechanism for eliminating the hidden node problem has
been described in [7].
4 EXPOSED TERMINALS
In wireless networks, the Exposed Node Problem occurs
when a node is prevented from sending packets to other
nodes due to a neighboring transmitter. Consider an example
of 4 nodes labeled R1, S1, S2, and R2, where the two receivers
are out of range of each other, yet the two transmitters in the
middle are in range of each other as shown in Figure 3. Here,
if a transmission between node S1 and node R1 is taking
place, node S2 is prevented from transmitting to node R2 as
it concludes after carrier sense that it will interfere with the
transmission by its neighbor node S1. However note that
node R2 could still receive the transmission from node S2
without interference because it is out of range from node S1
[1].
IEEE 802.11 RTS/CTS mechanism helps to solve this
problem only if the nodes are synchronized. When a node
hears an RTS from a neighboring node, but not the
corresponding CTS, that node can deduce that it is an
exposed node and is permitted to transmit to other
neighboring nodes [1]. If the nodes are not synchronized, the
problem may occur that the sender will not hear the CTS or
the ACK during the transmission of data of the second
sender Figure 4.
7 SOLUTIONS
The other methods that can be employed to solve hidden
node problem are:
Increase transmitting power from the nodes.
Use Omni-directional antennas.
Remove obstacles.
Move the node.
Use protocol enhancement software.
Use antenna diversity.
Wireless Central Coordinated Protocol.
67
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
8. CONCLUSION
9. REFERENCES
[3]
[4]
[1]
[2]
[5]
[6]
[7]
[8]
[9]