Skip to main content
Log in

Mitigating false blocking problem in wireless ad hoc networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The traditional IEEE802.11 Request-to-Send/Clear-to-Send (RTS/CTS) handshaking in medium access control layer has been widely adopted in wireless ad hoc networks to reduce the hidden node problem. However, it induces the false blocking problem, which occurs when nodes are prevented from replying to any incoming RTS packets when they are in deferring state after overhearing the RTS and/or CTS packets. Worse still, these unreplied RTS packets will then cause other neighbouring nodes to defer blindly which propagates the false blocking problem, resulting in exhaustion of scarce energy resource and throughput degradation. In this paper, we propose an adaptive Ready-to-Send and blocking notification (RSBN) scheme to mitigate the false blocking problem. The adaptive RSBN scheme not only validates the overheard RTS packets to avoid blind deferment but also informs neighbouring nodes of the nodes’ deferring status to block unnecessary RTS packets. We validate the proposed scheme by simulations and the results have shown that the adaptive RSBN scheme can achieve higher performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Toh, C. (2012). Wireless ATM and ad-hoc networks: Protocols and architectures. Berlin: Springer Science & Business Media.

    Google Scholar 

  2. Lee, A., & Ra, I. (2015). Network resource efficient routing in mobile ad hoc wireless networks. Telecommunication Systems, 60(2), 215–223. doi:10.1007/s11235-015-0024-7.

    Article  Google Scholar 

  3. Rezagah, R. E., & Mohammadi, A. (2014). Analyzing the capacity of wireless ad hoc networks. Telecommunication Systems, 55(1), 159–167. doi:10.1007/s11235-013-9758-2.

    Article  Google Scholar 

  4. IEEE 802.11. (2012). Wireless LAN media access control (MAC) and physical layer (PHY) specification.

  5. Tobagi, F., & Kleinrock, L. (1975). Packet switching in radio channels: Part II—The hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transaction on Communications, 23(12), 1417–1433.

    Article  Google Scholar 

  6. Lauwens, B., Scheers, B., & Van de Capelle, A. (2010). Performance analysis of unslotted CSMA/CA in wireless networks. Telecommunication Systems, 44(1–2), 109–123. doi:10.1007/s11235-009-9220-7.

    Article  Google Scholar 

  7. Bharghavan, V., Demers, A., Shenker, S., et al. (1994). MACAW: A media access protocol for wireless LAN’s. Proceedings of ACM SIGCOMM, 24(4), 212–225. doi:10.1145/190314.190334.

    Article  Google Scholar 

  8. Boroumand, L., Khokhar, R., Bakhtiar, L., et al. (2012). A review of techniques to resolve the hidden node problem in wireless networks. Proceedings of SmartCR, 2(2), 95–110. doi:10.6029/smarter.2012.02.001.

    Google Scholar 

  9. Huang, C., Lea, C. T., & Wong, A. K. S. (2010). Rate matching: A new approach to hidden terminal problem in ad hoc networks. Wireless Networks, 16(8), 2139–2150. doi:10.1007/s11276-010-248-0.

    Article  Google Scholar 

  10. Lu, W., Kaishun, W., & Hamdi, M. (2012). Combating hidden and exposed terminal problems in wireless networks. IEEE Transactions on Wireless Communications, 11, 4202–4213. doi:10.1109/TWC.2012.092712.120628.

    Google Scholar 

  11. Nishide, K., Kubo, H., Shinkuma, R., et al. (2012). Detecting hidden and exposed terminal problems in densely deployed wireless networks. IEEE Transactions on Wireless Communications, 11(11), 3841–3849. doi:10.1109/TWC.2012.092712.100868.

    Article  Google Scholar 

  12. Ray, S., Carruthers, J., & Starobinski, D. (2003). RTS/CTS-induced congestion in ad hoc wireless LANs. Proceedings of IEEE Wireless Communications and Networking Conference, 3, 1516–1521. doi:10.1109/WCNC.2003.1200611.

    Google Scholar 

  13. Ray, S., & Starobinski, D. (2007). On false blocking in RTS/CTS-based multihop wireless networks. IEEE Transactions of Vehicular Technology, 56(2), 849–862. doi:10.1109/TVT.2007.891476.

    Article  Google Scholar 

  14. Lihong, D., Yan’an, J. (2007). A novel MAC protocol for hidden receiver problem in ad hoc networks. In Proceedings of International Conference on Automation and Logistics, pp. 2345–2348.

  15. Lo, C., Kuo, C., Huang, Y., et al. (2008). A study on hidden receiver problem in mobile ad hoc networks. In Proceedings of Fourth International Conference on Wireless and Mobile Communications, pp. 49–54. doi:10.1109/ICWMC.2008.43.

  16. Singh, B., Tepe, K., Khalid, M. (2014). Control mechanism to solve false blocking problem at MAC layer in wireless sensor networks. In Proceedings of VLSI Design and 2014 13th International Conference on Embedded Systems, pp. 288–293. doi:10.1109/VLSID.2014.56.

  17. Matoba, A., Hanada, M., Kanemisu, H., et al. (2014). Asymmetric RTS/CTS for exposed node reduction in IEEE 802.11 ad hoc networks. Journal of Computing Science and Engineering (JCSE), 8(2), 107–118. doi:10.5626/JCSE.2014.8.2.107.

    Article  Google Scholar 

  18. Alonso-Zarate, J., Alonso, L., Kormentzas, G., et al. (2012). Throughput analysis of a cooperative ARQ scheme in the presence of hidden and exposed terminals. Mobile Networks and Applications, 17(2), 258–266. doi:10.1007/s11036-011-0338-y.

    Article  Google Scholar 

  19. Chong, K., Drieberg, M., Jeoti, V. (2012). Mitigating false blocking problem in wireless sensor networks. In Proceedings of International Conference on Intelligent and Advanced Systems (ICIAS2012), pp. 1–5. doi:10.1109/ICIAS.2012.6306197.

  20. Ray, S., Carruthers, J., & Starobinski, D. (2005). Evaluation of the masked node problem in ad-hoc wireless LANs. Proceedings of IEEE Transaction Mobile Computing, 4(5), 430–442.

    Article  Google Scholar 

  21. Chong, K., Drieberg, M., Jeoti, V. (2014). A dynamic blocking notification (BN) scheme with strategic nodes for wireless ad hoc networks. In Proceedings of IEEE 79th Vehicular Technology Conference (VTC2014-Spring), pp. 1–5. doi:10.1109/VTCSpring.2014.7022774.

  22. https://omnetpp.org. Accessed Jan 2017.

  23. Larroca, F., & Rodríguez, F. (2014). An overview of WLAN performance, some important case-scenarios and their associated models. Wireless Personal Communications, 79(1), 131–184. doi:10.1007/s11277-014-1846-4.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wai Kheong Chong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chong, W.K., Drieberg, M. & Jeoti, V. Mitigating false blocking problem in wireless ad hoc networks. Telecommun Syst 67, 31–46 (2018). https://doi.org/10.1007/s11235-017-0314-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-017-0314-3

Keywords

Navigation