We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Efficient Method to Avoid Hidden Node Problem in Ad-Hoc Network

by Nishu Jindal, Paramjeet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 2
Year of Publication: 2013
Authors: Nishu Jindal, Paramjeet Kaur
10.5120/13837-1413

Nishu Jindal, Paramjeet Kaur . An Efficient Method to Avoid Hidden Node Problem in Ad-Hoc Network. International Journal of Computer Applications. 80, 2 ( October 2013), 43-47. DOI=10.5120/13837-1413

@article{ 10.5120/13837-1413,
author = { Nishu Jindal, Paramjeet Kaur },
title = { An Efficient Method to Avoid Hidden Node Problem in Ad-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 2 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number2/13837-1413/ },
doi = { 10.5120/13837-1413 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:03.647421+05:30
%A Nishu Jindal
%A Paramjeet Kaur
%T An Efficient Method to Avoid Hidden Node Problem in Ad-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 2
%P 43-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ad hoc network consists of various mobile nodes which are not physicals connected to each other. Ad-hoc network is temporary based network which does not rely on the infrastructure that is it is decentralized kind of network. [1] In such network, nodes communicate each other by sending data from one node to another in multi-hop mode[2]. Multi hop refer to the state when one node communicate with its immediate node and the data has to travel through many intermediate nodes from source to destination. Generally there are two problems associated with communication one is hidden node problem other one is exposed node problem. In general scenario when two nodes send data to the same node at same then collision occurs at that node, This is known as hidden node problem. [3] Hidden node problem can be avoided by RTS/CTS mechanism. [4] To make data secure from collision i. e to prevent hidden node problem and also to reduce delay time that occurs when nodes goes to waiting state during RTS/CTS handshake if the communication occurs before the CTS timer, integrating the concept of RTR with RTS/CTS. Apart from the introduction of RTR, in this paper there are other parameters such as data size and distance preference which will further help to define the priorities for the transfer of data.

References
  1. Ashikarrehman and Pawel Gburzynski Department of Computing Science University of Alberta Edmonton, Alberta, Canada, T6G 2E8 "Hidden problems with hidden node problem" in 2006.
  2. C. -K. Toh, V. Vassiliou, G. Guichal, C. -H. Shih, "March: a medium access control protocol for multihop wireless ad hoc networks," in Proc. of 21st Century Military Communications Conference, pp. 512-516, 2000.
  3. Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri " Comparative study of Hidden node problem and solution using different techniques and protocols" journal of computing , volume 2 , issue 3, March 2010.
  4. Arunajayasurya ,Sylvie perreau, Arekdadej, Steven Gordan institute of telecommunication and research . university of south Australia "Hidden vs. Exposed Terminal Problem in Ad hoc Networks " in 2004
  5. Rajeshwar Singh, Dharmendra K Singh, Lalan Kumar Int. J. Advanced Networking and Applications 2011 "Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks
  6. Vaduvur Bharghavan Department of Electrical and Computer Science Engineering University of California. "MACAW(A media access protocol for wireless LAN)" in 1994.
  7. Mostefa Fatima Zohra, Mekkakiamaaza Zoulikha. Khelifa "Techniques of detection of the hidden node in wireless ad-hoc network" in 2011.
  8. Huei-Jiun Ju, Izhak Rubin, and Yen-Cheng Kuan "An Adaptive RTS/CTS Control Mechanism for IEEE 802. 11 MAC Protocol"
  9. Sunil Kumar, Vineet S. Raghavan, Jing Deng 2004 "Medium Access Control protocols for ad hoc wireless networks: a survey".
  10. Hrishikesh Gossain, Carlos Cordeiro, Dharma P. Agrawa, 2005, "Minimizing the Effect of Deafness and Hidden Terminal Problem in Wireless Ad Hoc Networks using Directional Antennas
  11. Huang Lu, Jie Li, and Zhongping Dong, Yusheng Ji 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks "CRDMAC: An Effective Circular RTR Directional MAC Protocol for Wireless Ad Hoc Networks".
  12. AO HAN and Weije Lu Department of Electronics and Information Engineering Huazhong University of Science and Technology (HUST)" An Improvement of MACA in Alleviating Hidden Terminal Problem in Ad-hoc Networks" in 2009
Index Terms

Computer Science
Information Sciences

Keywords

Hidden Node RTS/CTS Mechanism RTR