A New Medium Access Control Protocol Application on the Hidden Node Interference

  • Guobin Chen
  • Mei Rong
  • Guangquan Zhang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 154)


The large interference area in wireless ad hoc network caused the increase of hidden nodes and reduced network performance severely. Existing protocols such as 802.11 and DBTMA could not block the hidden nodes outside the transmission range to interfere with current communication. To solve this problem, a Variable Frequency of Dual Busy Tone based MAC protocol (VFDBT) is proposed, which codes node’s id using frequency of busy tone. Other nodes which intending to send packets obtain transmitter-receiver’s id, then evaluate whether they are within the receiver’s interference range, thus determine whether to send packets or not. Theoretical analysis and simulation show that VFDBT protocol can prevent the hidden terminal in the large interference area and also solve the exposed terminal problem, efficiently improving the performance of wireless ad hoc network.


Medium Access Control Transmission Range Hide Node Medium Access Control Protocol Medium Access Control Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aruna J, Sylvie P, Arek D. Hidden vs. exposed terminal problem in ad hoc networks. Proceedings of the Australian Telecommunications, Networks and Architecture Conference. Sydney, Australia: ATNAC, 2004:52–56.Google Scholar
  2. 2.
    Raja J, VIDEIRA L C, PIERRE B, etal. Classification and Comparative analysis of medium access control protocols for ad hoc networks. IEEE Communications Surveys and Tutorials, 2004, 6(1):2–16.Google Scholar
  3. 3.
    Basel A, Yongning Z, Chadi A, et al. Improving Spatial Reuse in Multihop Wireless Networks—A Survey. IEEE Communications Surveys and Tutorials, 2009, 11(3):71–91.Google Scholar
  4. 4.
    IEEE 802.11 Work Group. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. New Jersey: IEEE Standards Information Network Press, 1999.Google Scholar
  5. 5.
    Haas Z J, Jing D. Dual busy tone multiple access (DBTMA)—a multiple access control scheme for ad hoc networks. IEEE Transactions on Communications, 2002, 50(6):975–985.Google Scholar
  6. 6.
    Choudhury R R, Vaidya N H. Deafness: a MAC problem in ad hoc networks when using directional antennas. In: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004:283–292.Google Scholar
  7. 7.
    Ping W, Hai J, Weihua Z. A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks. IEEE Transactions on Mobile Computing, 2008, 7(12):1491–1503.Google Scholar
  8. 8.
    Supeng L, Yan Z, Hsiao-Hwa C, et al. Power-Fixed and Power-Aware MAC Protocols for Multihop Wireless Networks With a Large Interference Area. IEEE Transactions on vehicular technology, 2009, 58(6):2966–2976.Google Scholar

Copyright information

© Springer-Verlag London Limited 2012

Authors and Affiliations

  1. 1.Rongzhi CollegeChongqing Technology And Bussiness UniversityChongQinChina
  2. 2.Shenzhen Tourism CollegeJinan UniversityShenzhenChina
  3. 3.School of Computer Science and TechnologySoochow UniversitySuzhouChina

Personalised recommendations