written 6.2 years ago by | • modified 6.1 years ago |
Subject: Wireless Technology
Topic:: Fundamentals of Wireless Communication
Difficulty: Medium
written 6.2 years ago by | • modified 6.1 years ago |
Subject: Wireless Technology
Topic:: Fundamentals of Wireless Communication
Difficulty: Medium
written 6.2 years ago by |
Hidden Terminal Problem:
A wireless network with lack of centralized control entity, sharing of wireless bandwidth among network access nodes i.e. medium access control (MAC) nodes must be organized in decentralized manner.
The hidden terminal problem occurs when a terminal is visible from a wireless access point (APs), but not from other nodes communicating with AP. This situation leads the difficulties in medium access control sub-layer over wireless networking.
In a formal way hidden terminals are nodes in a wireless network that are out of range of other node or a collection of nodes.
Consider the scenario of wireless networking with three wireless devices(e.g. mobile phones)as shown below.
he transmission range of access point A reaches at B, but not at access point C, similarly transmission range of access point C reaches B, but not at A. These nodes are known as hidden terminals. The problem occurs when nodes A and C start to send data packets simultaneously to the access point B. Because the access points A and c are out of range of each other and resultant they cannot detect a collision while transmitting, Carrier sense multiple access with collision detection (CSMA/CD) does not work, and collisions occur, which then corrupt the data received by the access point B due to the hidden terminal problem.
The hidden terminal analogy is determined as follows
Some other technology that can be employed to solve hidden node problem are: Increase Transmitting Power from the Nodes. With the enhancement of the transmission power of access point can solve the hidden terminal problem by allowing the cell around each mode to increase in size, encompassing all of the the nodes.
Use Omni directional antennas: Since nodes using directional antennas are nearly invisible to nodes that are not positioned in the direction the antenna is aimed at, directional antennas should be used only for very small networks.
Use protocol enhancement software:: Pooling and token passing strategy should be used before start data transformation
Exposed Terminal Problem::
In wireless networks, when a node is prevented from sending packets to other nodes because of a neighboring transmitter is known as the exposed node problem
Consider the wireless network having four nodes labeled A,B,C and D, where the two receivers are out of range of each other, yet the two transmitters (B,C) in the middle are in range of each other.
Here, if a transmission between A and B is taking place, node C is prevented from transmitting to D as it concludes after carrier sense that it will interfere with the transmission by its neighbor node B.However note that node D could still receive the transmission of C without interference because it is out of range from B. Therefore, implementing directional antenna at a physical layer in each node could reduce the probability of signal interference, because the signal is propagated in a narrow band.
The exposed terminal analogy is described as follows:
Hidden Vs Exposed Terminal Problem
In the case of hidden terminal problem, unsuccessful transmissions result from collisions between transmissions originated by a node such as node A which cannot hear the ongoing transmissions to its corresponding node B. The probability of such a collision is proportional to the total number of terminal hidden from node A
In the case of exposed terminal, unsuccessful transmissions result from nodes such as node A being prevented from transmitting because their corresponding node is unable to send a CTS. Again such unsuccessful transmissions are proportional to the number of exposed terminals. Both these events lead to degradation of node's throughput.