Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
31 views8 pages

Recorded 0

Uploaded by

oma20190106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views8 pages

Recorded 0

Uploaded by

oma20190106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

recordedO

IEEE 802.11

Hidden Terminal Problem


access
in DCf mechanism
Wireless Transmission Range

Wireless domain is accompanied with many


impairments that makes it hard to distinguish the
transmission range boundaries, sometimes to the point
where each node may not be able to communicate with
every other node in the wireless network.
Sendsput this is theHTP
station

É
station
2 a m
exit
to
wasfind
a
the that the
da
offing it'll
chanteys signal
it's attenuation of
collision cha
Ses Then detectit
ableto
it won't be
The Hidden Node (Terminal) Problem
Fcomsfomcoxis.cnhappening at dest
In the figure, node 2 can communicate with both nodes 1 and 3
(within the transmission ranges of both).
Nodes 1 and 3 cannot communicate directly since the radio waves
cannot reach the full distance from 1 to 3.
From the perspective of node 1, node 3 is a "hidden" node. Also,
from the perspective of node 3, node 1 is a "hidden" node. (when
both nodes are not also in the sensing range of each other).

transmission.
Thus, if node 3 also decided to transmit to node 2 while an on-
going transmission occurs from node 1 to node 2, a collision
occurs at node 2 without the knowledge of either node 1 or 3.
DCF is a basic access mechanism

The Hidden Node (Terminal) Solution


d
IEEE 80211 Standardcreated Def access mechanism with Rts cis frameexchange

t
to save
To prevent collisions, IEEE802.11 allows stations to
use Request to Send (RTS) and Clear to Send (CTS)
HTP signals to clear out an area.

Y
the

sends 1
gender anofthis
Nt
agitation INE
EE
dat t hearhis
Its
before won't as If stingy
packet z gg
f s
g yyggg
RTS
Kut 2 hears whichboth183
CTS won'tsendanything for NAV
Sends hence
3 I
The Hidden Node (Terminal) Solution
The Hidden Node (Terminal) Solution

Node 1 has a frame to send; it initiates the process by sending an


RTS frame.
The RTS frame serves several purposes: in addition to reserving
the radio link for transmission, it silences any stations that hear it.
If the target station receives an RTS, it responds with a CTS.
Like the RTS frame, the CTS frame silences stations in the
immediate vicinity.
Once the RTS/CTS exchange is complete, node 1 can transmit its
frames without worry of interference from any hidden nodes. like
31
Hidden nodes beyond the range of the sending station are
silenced by the CTS from the receiver.
When the RTS/CTS clearing procedure is used, any frames must
be positively acknowledged.
The Hidden Node (Terminal) Solution

The multiframe RTS/CTS transmission procedure


consumes a fair amount of capacity, especially
I because of the additional latency incurred before
digEannel
transmission can commence.
contfuts
for
Bw
Usually DCF access mechanism with CTS/RTS frame
exchange is used only in high-capacity environments
and environments with significant contention on

f
transmission. For lower-capacity environments, it is not
necessary.
happens
Collision Rts frames
bet not data
Network Allocation Vector

All stations receiving RTS or CTS will set their NAV for
the given duration. explained on prov slide

difference
the

You might also like