MAC Performance Enhancement by Efficient Hidden Node Detection in Infrastructure Mode IEEE 802.11 Wireless LANs

Infrastructure Mode IEEE 802.11 무선랜 시스템에서 효율적인 은닉 단말 발견 방법을 통한 MAC 성능 개선

  • Choi, Woo-Yong (Dept. of Industrial and Management Systems Engineering, Dong-A University)
  • 최우용 (동아대학교 산업경영공학과)
  • Published : 2008.06.30

Abstract

In this paper, a new efficient hidden node detection method is proposed to decide whether the RTS/CTS mechanism is necessary to resolve the hidden node problem for the data transmission of each node in infrastructure mode IEEE 802.11 wireless LANs. The nodes, for which the RTS/CTS mechanism is found to be not necessary by the hidden node detection method, can transmit their data frames without performing the RTS/CTS exchange. Only the nodes, for which the RTS/CTS mechanism is found to be necessary by the hidden node detection method, perform the RTS/CTS exchange before their data frame transmissions.

Keywords

References

  1. Choi, W.-Y. and Lee, S.-W. (2006), Optimal Polling Method for Improving PCF MAC Performance in IEEE 802.11Wireless LANs, Journal of Korean Institute of Industrial Engineers, 32(1), 1-8
  2. Choi,W.-Y. (2007), Efficient Polling Scheme for Multiple Direct Link Communication between STAs in InfrastructureMode IEEE 802.11 Wireless LANs, Journal of Korean Institute of Industrial Engineers, 33(2), 237-245
  3. Eckhardt, David A. and Steenkiste, Peter (1999), A Trace-Based Evaluation of Adaptive Error Correction for a Wireless Local Area Network, Mobile Networks and Applications, 4, 273-287 https://doi.org/10.1023/A:1019163202314
  4. IEEE Std 802.11 (1999), Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  5. IEEE Std 802.11a (1999), Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications : High Speed Physical Layer in the 5 GHz Band
  6. IEEE 802.11k draft 2.0 (2005),Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Radio Resource Measurement
  7. Kermani, P.,McKay, D. N., Naghshineh,M., Novak, F. P. and Rezvani, B. (1997), Schemes to determine Presence of Hidden Terminals in Wireless Networks Environment and to Switch between Them, United States Patent 5661727
  8. Li, F. Y., Kristensen, A. and Engelstad, P. (2006A), Hidden Terminal Detection in 802.11-based Wireless Ad Hoc Networks, Proc. IST Mobile & Wireless Communication Summit 2006
  9. Li, F. Y., Kristensen, A. and Engelstad, P. (2006B), Passive and Active Hidden Terminal Detection in 802.11-based Ad Hoc Networks, Proc. IEEE INFOCOM 2006
  10. NLANR (National Laboratory for Applied Network Research) Internet Homepage, http://www.nlanr.net/NA/Learn/packetsizes.html
  11. Sobrinho, J. L., Haan, R. and Brazio, J.M. (2005),Why RTS-CTS is not Your Ideal Wireless LAN Multiple Access Protocol, IEEE WCNC 2005, 81-87
  12. Tobagi, F. and Kleinrock, L. (1975), Packet Switching in Radio Channels: Part 2-The Hidden Node Problem in Carrier Sense Multiple Access Modes and the Busy Tone Solution, IEEE Transactions on Communications, 23, 1417-1433 https://doi.org/10.1109/TCOM.1975.1092767
  13. Xu, K., Gerla, M. and Bae, Sang (2002), How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks, Proc. IEEE GLOBECOM 2002, 72-76
  14. Zhou, G., He, T., Stankovic, J. A. and Abdelzaher, T. (2005), RID : Radio Interference Detection in Wireless Sensor Networks, Proc. INFOCOM 2005, 891-901