The Community for Technology Leaders
RSS Icon
Issue No.01 - January (2008 vol.7)
pp: 34-49
Two well known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposed-node (EN) and hidden-node (HN) problems. While there have been isolated and incidental studies of EN and HN, a comprehensive treatment has not been attempted. The contributions of this paper are three-fold. First, we provide rigorous mathematical definitions for EN and HN in wireless networks (including Wireless LANs with multiple Access Points, and ad-hoc networks). Second, we relate EN to non-scalability of network throughput; and HN to unfair throughput distributions. Third, we provide schemes to eliminate EN and HN respectively. We show that the standard 802.11 technology is not scalable because, due to EN, more Access Points (APs) do not yield higher total throughput. By removing EN, our schemes make it possible to achieve scalable throughput commensurate with the seminal theoretical results in [1], [2]. In addition, by removing HN, our schemes solve the performance problems triggered by HN, including throughput unfairness/starvation and re-routing instability.
IEEE 802.11, Hidden Node problem, Exposed Node Problem, Mathematical Modeling, Algorithms, Protocol, Performance Evaluation
Li Bin Jiang, Soung Chang Liew, "Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks", IEEE Transactions on Mobile Computing, vol.7, no. 1, pp. 34-49, January 2008, doi:10.1109/TMC.2007.1070
[1] P. Gupta and P.R. Kumar, “The Capacity of Wireless Network,” IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
[2] A. Agarwal and P.R. Kumar, “Capacity Bounds for Ad Hoc and Hybrid Wireless Networks,” ACM SIGCOMM Computer Comm. Rev., special issue on the science of networking design, vol. 34, no. 3, pp. 71-81, July 2004.
[3] IEEE 802.11 Standard for Wireless LAN, Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1999.
[4] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Media Access Protocol for Wireless LANs,” Proc. ACM Ann. Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM '94), vol. 24, pp. 212-225, Oct. 1994.
[5] S. Xu and T. Saadawi, “Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?” IEEE Comm. Magazine, vol. 39, no. 6, pp. 130-137, June 2001.
[6] X.L. Huang and B. Bensaou, “On Max-Min Fairness and Scheduling in Wireless Ad Hoc Networks: Analytical Framework and Implementation,” Proc. ACM MobiHoc, pp. 221-231, Oct. 2001.
[7] S. Ansari et al., “Performance Enhancement of TCP on Multi-Hop Ad Hoc Wireless Networks,” Proc. IEEE Int'l Conf. Personal Wireless Comm. (ICPWC '02), pp. 90-94, Dec. 2002.
[8] P.C. Ng and S.C. Liew, “Offered Load Control in IEEE 802.11 Multi-Hop Ad Hoc Networks,” Proc. First IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '04), Oct. 2004.
[9] P.C. Ng and S.C. Liew, “Re-Routing Instability in IEEE 802.11 Multi-Hop Ad Hoc Networks,” Proc. 29th IEEE Int'l Conf. Local Computer Networks (LCN '04), Nov. 2004.
[10] J.P. Monks, V. Bharghavan, and W.-M.W. Hwu, “A Power Controlled Multiple Access Protocol for Wireless Packet Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 219-228, Apr. 2001.
[11] A. Muqattash and M. Krunz, “Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM, pp. 470-480, 2003.
[12] Z.J. Haas and J. Deng, “Dual Busy Tone Multiple Access (DBTMA)—A Multiple Access Control Scheme for Ad Hoc Networks Communication,” IEEE Trans. Comm., vol. 50, no. 6, pp. 975-985, June 2002.
[13] P.C. Ng, S.C. Liew, and L.B. Jiang, “Achieving Scalable Performance in Large-Scale IEEE 802.11 Wireless Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
[14] The Network Simulator: ns2,, 2007.
[15] T. Rappaport, Wireless Communications: Principles and Practice. Prentice Hall, 2002.
[16] S. McCanne and S. Floyd, The ns Manual, , 2007.
[17] K. Xu, M. Gerla, and S. Bae, “How Effective Is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?” Proc. IEEE Global Telecomm. Conf. (GLOBECOM '02), vol. 1, pp. 17-21, Nov. 2002.
[18] S. Bansal, R. Shorey, and A.A. Kherani, “Performance of TCP and UDP Protocols in Multi-Hop Multi-Rate Wireless Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '04), Apr. 2004.
[19] L.B. Jiang, “Improving Capacity and Fairness by Elimination of Exposed and Hidden Nodes in 802.11 Networks,” MPhil thesis, The Chinese Univ. of Hong Kong, http://www.eecs.berkeley. edu/~ljiangThesis.pdf , June 2005.
[20] L.B. Jiang and S.C. Liew, “Removing Hidden Node Problem in IEEE 802.11 Wireless Networks,” Proc. 62nd IEEE Vehicular Technology Conf. (VTC '05), Sept. 2005.
[21] C.E. Perkins and E.M. Royer, “Ad Hoc On-Demand Distance Vector Routing,” Proc. Second IEEE Workshop Mobile Computing Systems and Applications (WMCSA '99), pp. 90-100, Feb. 1999.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool