Browse > Article
http://dx.doi.org/10.5626/JCSE.2014.8.2.107

Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks  

Matoba, Akihisa (Department of Informatics, Tokyo University of Information Sciences)
Hanada, Masaki (Department of Informatics, Tokyo University of Information Sciences)
Kanemitsu, Hidehiro (Department of Informatics, Tokyo University of Information Sciences)
Kim, Moo Wan (Department of Informatics, Tokyo University of Information Sciences)
Publication Information
Journal of Computing Science and Engineering / v.8, no.2, 2014 , pp. 107-118 More about this Journal
Abstract
One interesting problem regarding wireless local area network (WLAN) ad-hoc networks is the effective mitigation of hidden nodes. The WLAN standard IEEE 802.11 provides request to send/clear to send (RTS/CTS) as mitigation for the hidden node problem; however, this causes the exposed node problem. The first 802.11 standard provided only two transmission rates, 1 and 2 Mbps, and control frames, such as RTS/CTS assumed to be sent at 1 Mbps. The 802.11 standard has been enhanced several times since then and now it supports multi-rate transmission up to 65 Mbps in the currently popular 802.11n (20 MHz channel, single stream with long guard interval). As a result, the difference in transmission rates and coverages between the data frame and control frame can be very large. However adjusting the RTS/CTS transmission rate to optimize network throughput has not been well investigated. In this paper, we propose a method to decrease the number of exposed nodes by increasing the RTS transmission rate to decrease RTS coverage. Our proposed method, Asymmetric Range by Multi-Rate Control (ARMRC), can decrease or even completely eliminate exposed nodes and improve the entire network throughput. Experimental results by simulation show that the network throughput in the proposed method is higher by 20% to 50% under certain conditions, and the proposed method is found to be effective in equalizing dispersion of throughput among nodes.
Keywords
Mitigation of exposed node problem; IEEE 802.11; RTS; CTS; Hidden node;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Zhang, Y. J. Cheng, and X. Zhou, "Rate avalanche: effects on the performance of multi-rate 802.11 wireless networks," Simulation Modelling Practice and Theory, vol. 17, no. 3, pp.487-503, 2009   DOI   ScienceOn
2 IEEE-SA Standards Board, "Information technology - Telecommunications and information exchange between system local and metropolitan area network - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Standards 802.11-2012.
3 F. A. Tobagi and L. Kleinrock, "Packet switching in radio channels: Part II. The hidden terminal problem in carrier sense multiple-access and busy-tone solution," IEEE Transactions on Communications, vol. 23, no. 12, pp. 1417-1433, 1975.   DOI
4 M. Burton, "802.11 Arbitration," White Paper, Certified Wireless Network Professional Inc., Durham, NC, 2009.
5 Ruckus Wireless Inc., "Best practice guide wireless mesh," 2010, http://c541678.r78.cf2.rackcdn.com/appnotes/bpg-wirelessmesh.pdf.
6 Motorola Solutions Inc., "Motorola Outdoor System Planner, Revision 2," November 2013.
7 M. S. Gast, 802.11 Wireless Networks: The Definitive Guide, 2nd ed., Farnham: O'Reilly Media, 2005.
8 Cisco Systems Inc., Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide (OL-4211-01), San Jose, CA: Cisco Systems Inc., 2004.
9 K. Mittal and E. M. Belding, "RTSS/CTSS: mitigation of exposed terminals in static 802.11-based mesh network," in Proceedings of the 2nd IEEE Workshop on Wireless Mesh Networks, Reston, VA, 2006, pp. 3-12.
10 S. Ray, J. B. Carruthers, and D. Starobinski, "RTS/CTS-induced congestion in ad hoc wireless LANs," in Proceedings of the IEEE Wireless Communication and Networking Conference, New Orleans, LA, 2003, pp. 1516-1521.
11 D. Shukla, L. Chandran-Wadia, and S. Iyer, "Mitigating the exposed node problem in IEEE 802.11 ad hoc networks," in Proceedings of the 12th International Conference on Computer Communications and Networks, Dallas, TX, 2003, pp. 157-162.
12 D. Kim and E. Shim, "P-MAC: parallel transmissions in IEEE 802.11 based ad hoc networks with interference ranges," in Proceedings of the International Conference on Information Networking, Convergence in Broadband and Mobile Networking, Jeju Island, Korea, 2005, pp. 735-744.
13 K. Nishide, H. Kubo, R. Shinkuma, and T. Takahashi, "Detecting hidden and exposed terminal problems in densely deployed wireless networks," IEEE Transactions on Wireless Communications, vol. 11, no. 11, pp. 3841-3849, 2012.   DOI   ScienceOn
14 L. B. Jiang and S. C. Liew, "improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 34-49, 2008.   DOI   ScienceOn
15 G. Anastasi, E. Borgia, M. Conti, and E. Gregori, "IEEE 802.11b ad hoc networks: performance measurements," Cluster Computing, vol. 8, no. 2-3, pp. 135-145, 2005.   DOI   ScienceOn
16 M. Borgo, A. Zanella, P. Bisaglia, and S. Merlin, "Analysis of the hidden terminal effect in multi-rate IEEE 802.11b networks," in Proceedings of the International Symposium on Wireless Personal Multimedia Communication, Abano Terme (Padova), Italy, 2004, pp. 6-10.
17 X. Yang and N. H. Vaidya, "On physical carrier sensing in wireless ad hoc networks," in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, 2005, pp. 2525-2535.