Resolution Strategy of Hidden Node Collision Based on Collision Indication and Grouping
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [21]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Hidden node problem is an important factor in performance degradation of IEEE 802.15.4 protocol. This paper presents a resolution strategy of hidden collision based on collision indication and grouping. The new strategy, named Hidden Node Collision Detection and Avoidance Strategy (HNCDAS), uses grouping method to divide the CFP of IEEE 802.15.4 protocol into several equal slot cycles and extract the hidden node address information from some damaged frame caused by the hidden conflict. The strategy dynamically adjusts nodes to different competition groups based on currently obtained hidden relationship. The nodes within competitive groups still competitively send messages in accordance with the binary back method in the same period, while different competitive groups send messages in different time slots. As a result, the strategy completely solves the hidden conflict problem. Compared with other hidden node collision resolution strategies, HNCDAS has certain advantages such as less overhead and dynamic adjustment capability. The convergence of the strategy and the maximum time of resolution strategies are also demonstrated in theory. Experimental results show that HNCDAS can significantly improve data transmission rate, throughput and energy efficiency.

    Reference
    [1] Xie R, Qi DY, Li YJ. A novel distributed MCDS approximation algorithm for wireless sensor networks. Wireless Communications& Mobile Computing, 2009,9(3):427-437. [doi: 10.1002/wcm.547]
    [2] Gu JJ, Chen SC, Zhuang Y. Wireless sensor network-based topology structures for the Internet of things localization. Chinese Journal of Computers, 2009,33(9):1458-1556 (in Chinese with English abstract). [doi: 10.3724%2fSP.J.1016.2010.01548]
    [3] Tseng YC, Ni SY, Shih EY. Adaptive approaches to relieving broadcast storms in a wireless multihop mobile ad hoc network.IEEE Trans. on Computers, 2003,52(5):545-557. [doi: 10.1109/TC.2003.1197122]
    [4] Li YJ, Wang ZJ. Cost analysis and optimization for IP multicast group management. Computer Communications, 2007,30(8):1721-1730. [doi: 10.1016/j.comcom.2007.02.002]
    [5] Tobagi A, Kleinrock L. The hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Trans. on Communication, 1975,23(12):1417-1433.
    [6] Koubaa A, Severino R, Alves M, Tovar E. Improving quality-of-service in wireless sensor networks by mitigating hidden-node collisions. IEEE Trans. on Industrial Informatics, 2009,5(3):299-313. [doi: 10.1109/TII.2009.2026643]
    [7] Haas ZJ, Deng J. Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks. IEEE Trans. on Communications, 2002,50(6):975-985.
    [8] Alshanyour A, Agarwal A. Performance of IEEE 802.11 RTS/CTS with finite buffer and load in imperfect channels: Modeling and analysis. In: Proc. of the 2010 IEEE Global Telecommunications Conf. Florida, 2010. 6-10. [doi: 10.1109/GLOCOM.2010.5684057]
    [9] Leng S, Zhang L, Chen Y. IEEE 802.11 MAC protocol enhanced by busy tones. In: Proc. of the 2005 IEEE Int'l Conf. on Communications. Seoul, 2005. 2969-2973. [doi: 10.1109/ICC.2005.1494936]
    [10] Zhai H, Fang Y. A solution to hidden terminal problem over a single channel in wireless ad hoc networks. In: Proc. of the MILCOM 2006. Washington, 2006. 1-7. [doi: 10.1109/MILCOM.2006.302394]
    [11] Eisenman SB, Campbell AT. Structuring contention-based channel access in wireless sensor networks. In: Proc. of the 5th Int'l Conf. on Information Processing in Sensor Networks. Nashville, 2006. 226-234. [doi: 10.1109/IPSN.2006.243751]
    [12] Jung ES, Vaidya NH. A power control MAC protocol for ad hoc networks. In: Proc. of the ACM MobiCom 2002. Westin Peachtree Plaza, 2002. 36-47. [doi: 10.1145/570645.570651]
    [13] Li YJ, Chen H, Xie R. A novel scatternet formation algorithm for bluetooth-based sensor networks. Mobile Information Systems,2011,7(2):93-106.
    [14] Sheth A, Han R. SHUSH: Reactive transmit power control for wireless MAC protocols. In: Proc. of the 1st Int'l Conf. on Wireless
    Internet. Budapest, 2005. 18-25. [doi: 10.1109/WICON.2005.29]
    [15] Zhao BH, Zhang W, Liu HC, Qu YG. Cluster partition algorithm in wireless sensor networks. Chinese Journal of Computers,2006,29(1):161-165 (in Chinese with English abstract).
    [16] Hwang LJ, Sheu ST, Shih YY, Cheng YC. Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN. In:Proc. of the 1st Int'l Conf. on Wireless Internet. Budapest, 2005. 26-32.
    [17] Zhang XB, Cheng LL, Zhu QM. SAHRC: A cluster-based routing control protocol for wireless sensor network. Journal of Electritic & Information, 2011,33(8):2013-2017 (in Chinese with English abstract). [doi: 10.3724/SP.J.1146.2010.01270]
    [18] Kwon CH, Tek RJ, Kim KH, Yoo SH. Dynamic group allocation scheme for avoiding hidden node problem in IEEE 802.15.4. In:Proc. of the 2009 Int'l Symp. on Communications and Information Technologies. Incheon, 2009. 637-638. [doi: 10.1109/ISCIT.2009.5341168]
    [19] Sheu ST, Shih YY. P-Frozen contention strategy (PFCS) for solving collision chain problem in IEEE 802.15.4 WPANs. In: Proc. of the 2006 IEEE 63rd Vehicular Technology Conf. Melbourne, 2006. 1323-1327. [doi: 10.1109/VETECS.2006.1683049]
    [20] Zheng JL, Lee MJ. A resource-efficient and scalable wireless mesh routing protocol. Ad Hoc Networks, 2007,5(6):704-718. [doi:10.1016/j.adhoc.2006.11.003]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

李拥军,谢嵘,谭晓青.基于冲突指示和分组隐藏节点冲突解析策略.软件学报,2014,25(6):1316-1327

Copy
Share
Article Metrics
  • Abstract:4965
  • PDF: 5302
  • HTML: 1313
  • Cited by: 0
History
  • Received:August 22,2012
  • Revised:August 22,2012
  • Online: August 30,2013
You are the first2044853Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063