Hidden Vs Exposed Terminal Problem in Ad Hoc Netwo
Hidden Vs Exposed Terminal Problem in Ad Hoc Netwo
net/publication/228967992
CITATIONS READS
92 8,859
4 authors, including:
Arek Dadej
University of South Australia
48 PUBLICATIONS 524 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Aruna Jayasuriya on 27 October 2015.
Terminals A . . B
α
Transmission range of C
In this section, we derive the number of hidden and Area X(x)
exposed terminals affecting a given node in an ad
hoc network.
Transmission range of B
= 0.28
Then from Figure 3 the number of exposed ter-
minals can be found by integrating over the region
XY as follows: Where r1 , θ and S are as defined before.
20
1000
15 800
600
10
400
5
200
0
0 4 5 6 7 8 9 10 11 12 13
1 2 3 4 5 6 7 8 9 10
Number of nodes per transmission neighbourhood
Number of nodes per unit area
Figure 5. Variation of hidden and exposed termi- Figure 6. Throughput performance with and with-
nals with node density out RTS/CTS
mechanism to eliminate the performance degrada- simulation results suggest that throughput perfor-
tion caused by the exposed terminals. mance degrades due to use of RTS/CTS like pre-
data handshake mechanisms. This argues strongly
against the use of RTS/CTS in ad hoc networks,
4 Simulations contrary to the widely published results [6, 7, 8].
It is emphasised here that Figure 5 shows the
Network simulations using OPNET network simu- variation of number of hidden and exposed termi-
lator were conducted to further establish the find- nals, not the effect of hidden and exposed terminals
ing presented in section 3. The nodes were dis- on the performance of ad hoc networks. Therefore
tributed in a grid pattern evenly throughout the this study does not take into account all the effects
network. In these simulations the average through- of hidden and exposed terminals on the transmis-
put of nodes in the centre of the network was calcu- sion patters of ad hoc networks. Furthermore we
lated for different node densities with and without do not take into account the effect of data rate or
the RTS/CTS mechanism. A network with station- the condition of the physical channel in to consid-
ary nodes, each communicating only with the neigh- eration. A better method would be to evaluate the
bouring nodes using 802.11 medium access control relative transmission opportunities and the relative
layer and Dynamic Source Routing (DSR) was used success of these transmissions in ad hoc networks
in the simulation. Figure 6 shows the node through- with and without the RTS/CTS scheme, which can
put for different scenarios. take into account parameters such as the data rate
It can be seen in Figure 6 that the through- and conditions of the physical channel. The trans-
put at the centre of the network can be improved mission opportunities in the network in conjunction
on average by 50% without RTS/CTS. This agrees with the probability of packet loss due to collisions
with the analytical findings that the performance can then be directly related to the network through-
is degraded by the exposed terminals compared to put.
the effect of hidden terminals. Therefore, by comb-
ing the results of analytical and simulation studies
it can be concluded that the throughput of wire- Acknowledgments
less ad hoc networks can be improved by not using
handshake mechanisms such as RTS/CTS. Authors wish to thank Mr. Yong Liaw for his sup-
port during the simulation and discussions during
the analytical studies. This work was supported by
5 Conclusions Defence Science Technology Organisation.
[4]
(PHY) Specifications,” 1999.
V. Bharghavan, “Performance Evaluation of Al- A
. . B
gorithms for Wireless Medium Access,” in IEEE
International Computer Performance and De-
pendability Symposium, pp. 86–95, September
1998.
[5] L. Kleinrock and F. Tobagi, “Packet Switching
in Radio Channels Part II - the Hidden Node Area X(x)
Problem in Carrier Sense Multiple Access Nodes
and the Busy Tone Solution,” IEEE Transac- Figure 7. Parameters for exposed terminal calcula-
tions on Communications, vol. COM-23, no. 12, tions
pp. 1417–1433, 1975.
[6] Y. Wang and J. J. Garcia-Luna-Aceves, “Col-
lision Avoidance in Multi-Hop Ad Hoc Net-
works,” in IEEE/ACM Intl. Symposium on Now let us consider the following integral E(x):
Modelling, Analysis and Simulation of Com- Z π−θ Z R
E(x) = Y (x, y, α) dα dy
puter and Telecommunication Systems (MAS- 0 r1
COTS’02, 2002. Z α1 Z R Z α2 Z r2
2 2
= Y1 (y, α) σ y dy dα + Y2 (y, α) σ y dy dα
[7] P.Chatzimisios, V. Vitsas, and A. C. Boucou- 0 r1 α1 r1
Z Z Z Z
valas, “Throughput and Delay Analysis of IEEE α2 R
2
π−θ R
2
+ Y1 (y, α) σ y dy dα + Y2 (y, α) σ y dy dα
802.11 Protocol,” in 5th IEEE International α1 r2 α2 r1
Z Z Z Z
Workshop on Networked Appliances, pp. 168– =
π−θ R
2
Y1 (y, α) σ y dy dα −
α2 r2
2
Y3 (y, α) σ y dy dα
174, 2002. 0
Z
r1 α1 r1
π−θ Z R
[8] J. Weinmiller, H. Woesner, J. Ebert, and −
2
Y3 (y, α) σ y dy dα
A. Wolisz, “Analyzing the RTS/CTS Mecha- α2 r1
2π x
α2 = 3 − arccos ( 2R )
Appendix A p
r1 = R2 − x2 sin2 α − x cos α
In this appendix we provide the solution for the √
r2 = 4R2 − x2 sin α − x cos α
integration presented in equation (4). This derives
the number of exposed terminals affecting a pair of
communicating nodes in an ad hoc network.
Let us consider A(y), as defined in Equation 7
In figure 7, assume that (α1 , r1 ) and (α2 , R) are
the intersection points for a circle centred around µ ¶ Ã √ !
2 2 y yp 2 π 3
point T and circles centred around points A and B A(y) = πR −2R arccos
2R
+
2
4R − y 2 −
3
+
2
Ry
respectively (refer to Figure 4). Also let us assume (7)
that in the range α1 < α < α2 , y = r2 is the
distance between nodes B and C when C is located The first and second derivatives of A(y) are
distance R away from point T , as shown in Figure given by:
7. Therefore for α1 < α < α2 :
à √ !
p π 3
0
A (y) = 4R2 − y 2 − + R (8)
3 2
If y > r2 Y (x, y, α) = Y1 (x, y, α)
otherwise Y (x, y, α) = Y2 (x, y, α) and
³ x ´
00 −y Y3,max (x) = R2 sin (13)
A (y) = p 2R
4R2 − y 2
As now we have found a suitable expression for
Itr
can be shown that in the range y = 0 . . . R, Y3 , we can now evaluate the terms C(x) and D(x)
³ √ ´2
y = 4 − π3 + 23 R = ymax is the only solution in Equation (6). Using Equations (6) and (13) and
the arguments outlined in the previous paragraph,
for A0 (y) = 0 and A00 (ymax ) < 0. Therefore in we can deduce that:
the rangery = 0 . . . R, A(y) has a local maxima at
³ √ ´2
ymax = 4 − π3 + 23 R and A(ymax ) = 0.034. ³ x ´ Z α2 Z r2
C(x) < 2R2 sin σ 2 y dydα
Furthermore A(0) = 0 and A(R) = 0, implying that 2R α1 r1
A(y) is strictly non-negative in the range 0 . . . R. ³ x ´ Z α2
= R2 σ 2 sin r2 − r12 dα (14)
2R α1 2
Therefore,
à Where r1 and r2 are as defined earlier. Using
√ !
π 3 methods used in earlier in this section3 , it can be
Y1 (y, α) > + Ry (9) shown that:
3 2
Z Z
B(x) > 2KRσ
2
π−θ R
2
y dy dα
We can now find a lower limit for D(x) by using
0 r1 (13):
Z p
2KRσ 2 π−θ
3 3
= R −( R2 − x2 sin2 α − x cos α) dα
3 0 µ ¶ Z π−θ Z R
2 x 2
(10) D(x) < 2R sin σ y dydα
2R α2 r1
µ ¶ Z π−θ
2 2 x 2
³ = σ R sin R − Λ dα
√ ´ 2R α2
π 3
Where K = 3 + 2 . σ2
µ
x
¶h ³ ´ √ 2 2i
3 2
= sin S 2x − 3R x + Φ + 3R x
4 2R
Using a argument similar to the one used the = Dupper (x) (16)
in previous section, it can be shown that for all
y = y1 . . . R:
Where α2 , θ and r1 are as defined before.
p 3 3
√
3 3
R −( R2 − x2 sin2 α−x cos α) >
(α − (π − θ))(R − (R − x) ) S = ³ 4R2 − x2 ´2
π−θ p
(11) Λ= R2 − x2 sin2 α − x cos α
³ ³ ´ ¡ ¢´
Therefore, by using Equations (10) and (11); Φ = 4R4 arctan 2RxS 2 −x2 − arctan Sx
Z R
2
Elower = Blower (x) − Cupper (x) − Dlower (x) dx
R2 0
= 1.03σ R4 2
(18)