HOME

TheInfoList



OR:

In
wireless networking A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks, and business installations to avoid the costly process of introducing cables in ...
, the hidden node problem or hidden terminal problem occurs when a
node In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex). Node may refer to: In mathematics * Vertex (graph theory), a vertex in a mathematical graph *Vertex (geometry), a point where two or more curves, lines ...
can communicate with a
wireless access point In Computer networking device, computer networking, a wireless access point (WAP) (also just access point (AP)) is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone ...
(AP), but cannot directly communicate with other nodes that are communicating with that AP. This leads to difficulties in
medium access control In IEEE 802 LAN/MAN standards, the medium access control (MAC), also called media access control, is the layer that controls the hardware responsible for interaction with the wired (electrical or optical) or wireless transmission medium. The ...
sublayer since multiple nodes can send data packets to the AP simultaneously, which creates interference at the AP resulting in no packet getting through. Although some loss of packets is normal in wireless networking, and the higher layers will resend them, if one of the nodes is transferring a lot of large packets over a long period, the other node may get very little
goodput In computer networks, goodput (a portmanteau of good and throughput) is the application-level throughput of a communication; i.e. the number of useful information bits delivered by the network to a certain destination per unit of time. The amou ...
. Practical protocol solutions exist to the hidden node problem. For example, Request To Send/Clear To Send (RTS/CTS) mechanisms where nodes send short packets to request permission of the access point to send longer data packets. As responses from the AP are seen by all the nodes, the nodes can synchronize their transmissions to not interfere. However, the mechanism introduces latency, and the overhead can often be greater than the cost, particularly for short data packets.


Background

Hidden nodes in a
wireless network A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks, and business installations to avoid the costly process of introducing cables int ...
are nodes that are out of range of other nodes or a collection of nodes. Consider a physical
star topology A star network is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The ...
with an access point with many nodes surrounding it in a circular fashion: each node is within communication range of the AP, but the nodes cannot communicate with each other. For example, in a wireless network, it is likely that the node at the far edge of the access point's range, which is known as A, can see the access point, but it is unlikely that the same node can communicate with a node on the opposite end of the access point's range, C. These nodes are known as ''hidden''. Another example would be where A and C are either side of an obstacle that reflects or strongly absorbs radio waves, but nevertheless they can both still see the same AP. The problem is when nodes A and C start to send packets simultaneously to the access point B. As the nodes A and C cannot receive each other's signals, so they cannot detect the collision before or while transmitting, carrier-sense multiple access with collision detection (CSMA/CD) does not work, and collisions occur, which then corrupt the data received by the access point. To overcome the hidden node problem, request-to-send/clear-to-send (RTS/CTS) handshaking ( IEEE 802.11 RTS/CTS) is implemented at the Access Point in conjunction with the Carrier sense multiple access with collision avoidance (
CSMA/CA Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a link layer multiple access method in which carrier sensing is used. Under CSMA/CA, nodes attempt to avoid collisions by beginning transmission only af ...
) scheme. The same problem exists in a
mobile ad hoc network A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as router (computing), routers or wireless acces ...
( MANET).
IEEE 802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer com ...
uses 802.11 RTS/CTS acknowledgment and handshake packets to partly overcome the hidden node problem. RTS/CTS is not a complete solution and may decrease throughput even further, but adaptive acknowledgements from the base station can help too. The comparison with hidden stations shows that RTS/CTS packages in each traffic class are profitable (even with short audio frames, which cause a high overhead on RTS/CTS frames).Pommer, Hermann: ''Roaming zwischen Wireless Local Area Networks''.
VDM Verlag Omniscriptum Publishing Group, formerly known as VDM Verlag Dr. Müller, is a German publishing group headquartered in Riga, Latvia. Founded in 2002 in Düsseldorf, its book production is based on print-to-order technology. The company pub ...
, Saarbrücken 2008, .
In the experimental environment following traffic classes are included: data (not time critical), data (time critical), video, audio. Examples for notations: (0, 0, 0, 2) means 2 audio stations; (1, 1, 2, 0) means 1 data station (not time critical), 1 data station (time critical), 2 video stations. The other methods that can be employed to solve hidden node problem are : *Increase transmitting power from the nodes *Use
omnidirectional antenna In radio communication, an omnidirectional antenna is a class of antenna (electronics), antenna which radiates equal radio power in all directions perpendicular to an Cartesian coordinate system, axis (azimuthal directions), with power varying wi ...
s *Remove obstacles *Move the node *Use protocol enhancement software *Use antenna diversity


Solutions


Increasing transmitting power

Increasing the transmission power of the nodes can solve the hidden node problem by allowing the cell around each node to increase in size, encompassing all of the other nodes. This configuration enables the non-hidden nodes to detect, or hear, the hidden node. If the non-hidden nodes can hear the hidden node, the hidden node is no longer hidden. As wireless LANs use the
CSMA/CA Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a link layer multiple access method in which carrier sensing is used. Under CSMA/CA, nodes attempt to avoid collisions by beginning transmission only af ...
protocol, nodes will wait their turn before communicating with the access point. This solution only works if one increases the transmission power on nodes that are hidden. In the typical case of a
WiFi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
network, increasing transmission power on the access point only will not solve the problem because typically the hidden nodes are the clients (e.g. laptops, mobile devices), not the access point itself, and the clients will still not be able to hear each other. Increasing transmission power on the access point is actually likely to make the problem worse, because it will put new clients in range of the access point and thus add new nodes to the network that are hidden from other clients.


Omnidirectional antennas

Since nodes using
directional antenna A directional antenna or beam antenna is an antenna that radiates or receives greater radio wave power in specific directions. Directional antennas can radiate radio waves in beams, when greater concentration of radiation in a certain directio ...
s are nearly invisible to nodes that are not positioned in the direction the antenna is aimed at, directional antennas should be used only for very small networks (e.g., dedicated point-to-point connections). Use
omnidirectional antenna In radio communication, an omnidirectional antenna is a class of antenna (electronics), antenna which radiates equal radio power in all directions perpendicular to an Cartesian coordinate system, axis (azimuthal directions), with power varying wi ...
s for widespread networks consisting of more than two nodes.


Removing obstacles

Increasing the power on mobile nodes may not work if, for example, the reason one node is hidden is that there is a concrete or steel wall preventing communication with other nodes. It is doubtful that one would be able to remove such an obstacle, but removal of the obstacle is another method of remedy for the hidden node problem.


Moving the node

Another method of solving the hidden node problem is moving the nodes so that they can all hear each other. If it is found that the hidden node problem is the result of a user moving his computer to an area that is hidden from the other wireless nodes, it may be necessary to have that user move again. The alternative to forcing users to move is extending the wireless LAN to add proper coverage to the hidden area, perhaps using additional access points.


Protocol enhancement

There are several software implementations of additional protocols that essentially implement a polling or
token passing On a local area network, token passing is a channel access method where a packet called a ''token'' is passed between nodes to authorize that node to communicate. In contrast to polling access methods, there is no pre-defined "master" node. The mos ...
strategy. Then, a master (typically the access point) dynamically polls clients for data. Clients are not allowed to send data without the master's invitation. This eliminates the hidden node problem at the cost of increased latency and less maximum throughput. The Wi-Fi IEEE 802.11 RTS/CTS is one handshake protocol that is used. Clients that wish to send data send an RTS frame, the access point then sends a CTS frame when it is ready for that particular node. For short packets the overhead is quite large, so short packets do not usually use it, the minimum size is generally configurable.


Cell network

With
cellular network A cellular network or mobile network is a telecommunications network where the link to and from end nodes is wireless network, wireless and the network is distributed over land areas called ''cells'', each served by at least one fixed-locatio ...
s the hidden node problem has practical solutions by time domain multiplexing for each given client for a mast, and using spatially diverse transmitters, so that each node is potentially served by any of three masts to greatly minimise issues with obstacles interfering with radio propagation.


See also

*
Exposed node problem In wireless networks, the exposed node problem occurs when a node is prevented from sending packets to other nodes because of co-channel interference with a neighboring transmitter. Consider an example of four nodes labeled R1, S1, S2, and R2, w ...
* Hybrid coordination function *
Point coordination function Point Coordination Function (PCF) is a media access control (MAC) technique used in IEEE 802.11 based WLANs, including Wi-Fi. It resides in a point coordinator also known as access point (AP), to coordinate the communication within the network. ...
*
Wireless LAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building ...


References

{{reflist


External links


Wireless Central Coordinated Protocol (WiCCP), a software solution of the hidden node problemFrottle, a client/server software solutionNetEqualizer, a throttling system addressing the hidden node problem
Wireless networking H de:Carrier Sense Multiple Access/Collision Avoidance#Hidden-Station-Problem