Abstract
The traditional IEEE802.11 Request-to-Send/Clear-to-Send (RTS/CTS) handshaking in medium access control layer has been widely adopted in wireless ad hoc networks to reduce the hidden node problem. However, it induces the false blocking problem, which occurs when nodes are prevented from replying to any incoming RTS packets when they are in deferring state after overhearing the RTS and/or CTS packets. Worse still, these unreplied RTS packets will then cause other neighbouring nodes to defer blindly which propagates the false blocking problem, resulting in exhaustion of scarce energy resource and throughput degradation. In this paper, we propose an adaptive Ready-to-Send and blocking notification (RSBN) scheme to mitigate the false blocking problem. The adaptive RSBN scheme not only validates the overheard RTS packets to avoid blind deferment but also informs neighbouring nodes of the nodes’ deferring status to block unnecessary RTS packets. We validate the proposed scheme by simulations and the results have shown that the adaptive RSBN scheme can achieve higher performance.
Similar content being viewed by others
References
Toh, C. (2012). Wireless ATM and ad-hoc networks: Protocols and architectures. Berlin: Springer Science & Business Media.
Lee, A., & Ra, I. (2015). Network resource efficient routing in mobile ad hoc wireless networks. Telecommunication Systems, 60(2), 215–223. doi:10.1007/s11235-015-0024-7.
Rezagah, R. E., & Mohammadi, A. (2014). Analyzing the capacity of wireless ad hoc networks. Telecommunication Systems, 55(1), 159–167. doi:10.1007/s11235-013-9758-2.
IEEE 802.11. (2012). Wireless LAN media access control (MAC) and physical layer (PHY) specification.
Tobagi, F., & Kleinrock, L. (1975). Packet switching in radio channels: Part II—The hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transaction on Communications, 23(12), 1417–1433.
Lauwens, B., Scheers, B., & Van de Capelle, A. (2010). Performance analysis of unslotted CSMA/CA in wireless networks. Telecommunication Systems, 44(1–2), 109–123. doi:10.1007/s11235-009-9220-7.
Bharghavan, V., Demers, A., Shenker, S., et al. (1994). MACAW: A media access protocol for wireless LAN’s. Proceedings of ACM SIGCOMM, 24(4), 212–225. doi:10.1145/190314.190334.
Boroumand, L., Khokhar, R., Bakhtiar, L., et al. (2012). A review of techniques to resolve the hidden node problem in wireless networks. Proceedings of SmartCR, 2(2), 95–110. doi:10.6029/smarter.2012.02.001.
Huang, C., Lea, C. T., & Wong, A. K. S. (2010). Rate matching: A new approach to hidden terminal problem in ad hoc networks. Wireless Networks, 16(8), 2139–2150. doi:10.1007/s11276-010-248-0.
Lu, W., Kaishun, W., & Hamdi, M. (2012). Combating hidden and exposed terminal problems in wireless networks. IEEE Transactions on Wireless Communications, 11, 4202–4213. doi:10.1109/TWC.2012.092712.120628.
Nishide, K., Kubo, H., Shinkuma, R., et al. (2012). Detecting hidden and exposed terminal problems in densely deployed wireless networks. IEEE Transactions on Wireless Communications, 11(11), 3841–3849. doi:10.1109/TWC.2012.092712.100868.
Ray, S., Carruthers, J., & Starobinski, D. (2003). RTS/CTS-induced congestion in ad hoc wireless LANs. Proceedings of IEEE Wireless Communications and Networking Conference, 3, 1516–1521. doi:10.1109/WCNC.2003.1200611.
Ray, S., & Starobinski, D. (2007). On false blocking in RTS/CTS-based multihop wireless networks. IEEE Transactions of Vehicular Technology, 56(2), 849–862. doi:10.1109/TVT.2007.891476.
Lihong, D., Yan’an, J. (2007). A novel MAC protocol for hidden receiver problem in ad hoc networks. In Proceedings of International Conference on Automation and Logistics, pp. 2345–2348.
Lo, C., Kuo, C., Huang, Y., et al. (2008). A study on hidden receiver problem in mobile ad hoc networks. In Proceedings of Fourth International Conference on Wireless and Mobile Communications, pp. 49–54. doi:10.1109/ICWMC.2008.43.
Singh, B., Tepe, K., Khalid, M. (2014). Control mechanism to solve false blocking problem at MAC layer in wireless sensor networks. In Proceedings of VLSI Design and 2014 13th International Conference on Embedded Systems, pp. 288–293. doi:10.1109/VLSID.2014.56.
Matoba, A., Hanada, M., Kanemisu, H., et al. (2014). Asymmetric RTS/CTS for exposed node reduction in IEEE 802.11 ad hoc networks. Journal of Computing Science and Engineering (JCSE), 8(2), 107–118. doi:10.5626/JCSE.2014.8.2.107.
Alonso-Zarate, J., Alonso, L., Kormentzas, G., et al. (2012). Throughput analysis of a cooperative ARQ scheme in the presence of hidden and exposed terminals. Mobile Networks and Applications, 17(2), 258–266. doi:10.1007/s11036-011-0338-y.
Chong, K., Drieberg, M., Jeoti, V. (2012). Mitigating false blocking problem in wireless sensor networks. In Proceedings of International Conference on Intelligent and Advanced Systems (ICIAS2012), pp. 1–5. doi:10.1109/ICIAS.2012.6306197.
Ray, S., Carruthers, J., & Starobinski, D. (2005). Evaluation of the masked node problem in ad-hoc wireless LANs. Proceedings of IEEE Transaction Mobile Computing, 4(5), 430–442.
Chong, K., Drieberg, M., Jeoti, V. (2014). A dynamic blocking notification (BN) scheme with strategic nodes for wireless ad hoc networks. In Proceedings of IEEE 79th Vehicular Technology Conference (VTC2014-Spring), pp. 1–5. doi:10.1109/VTCSpring.2014.7022774.
https://omnetpp.org. Accessed Jan 2017.
Larroca, F., & Rodríguez, F. (2014). An overview of WLAN performance, some important case-scenarios and their associated models. Wireless Personal Communications, 79(1), 131–184. doi:10.1007/s11277-014-1846-4.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chong, W.K., Drieberg, M. & Jeoti, V. Mitigating false blocking problem in wireless ad hoc networks. Telecommun Syst 67, 31–46 (2018). https://doi.org/10.1007/s11235-017-0314-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-017-0314-3