Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 282-286.

• Network & Communication • Previous Articles     Next Articles

Study of Hidden Node Problem in Full-duplex Enabled CSMA Networks

LIU Sheng-bo1,2,3, FU Li-qun4   

  1. Shanghai Institute of Microsystem & Information Technology,Chinese Academy of Sciences,Shanghai 200050,China1
    School of Information and Science Technology,Shanghai Tech University,Shanghai 200031,China2
    University of Chinese Academy of Science,Beijing 100049,China3
    School of Information and Science Technology,Xiamen University,Xiamen,Fujian 361005,China4
  • Online:2019-02-26 Published:2019-02-26

Abstract: Full-duplex (FD) technology enables simultaneous transmission and reception in the same band.Thus,it is expected to double spectrum efficiency of wireless networks.Full-duplexing can alleviate the hidden node problem in traditional CSMA networks.However,hidden node problem in FD CSMA networks is short of comprehensive and deep research.This paper briefly analyzed the hidden node problem and its solutions in half-duplex CSMA networks,and introduced four transmission modes in FD CSMA networks.Theoretical analysis and simulations illustrate the hidden node problem in FD CSMA networks.Finally,this paper further discussed the existing FD MAC (Medium Access Control) protocols,and proposed several important issues which need to be taken into consideration in the design of FD MAC protocols in order to reduce the hidden node problem.

Key words: CSMA, Full-duplex, Hidden node problem, MAC Protocols, Networks

CLC Number: 

  • TN925
[1]JAIN M,CHOI J I,KIM T,et al.Practical,real-time,full duplex wireless[C]∥Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.ACM,2011:301-312.
[2]CHOI J I,JAIN M,SRINIVASAN K,et al.Achieving single channel,full duplex wireless communication[C]∥Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking.ACM,2010:1-12.
[3]BHARADIA D,MCMILIN E,KATTI S.Full duplex radios[J].ACM SIGCOMM Computer Communication Review,2013,43(4):375-386.
[4]KIM D,LEE H,HONG D.A survey of in-band full-duplex transmission:From the perspective of PHY and MAC layers[J].IEEE Communications Surveys & Tutorials,2015,17(4):2017-2046.
[5]孙彦景,左海维,李松.带内全双工无线通信自干扰消除及 MAC 调度研究综述[J].电子科技大学学报,2016,45(6):873-887.
[6]SONG L,LIAO Y,BIAN K,et al.Cross-layer protocol design for CSMA/CD in full-duplex WiFi networks[J].IEEE Communications Letters,2016,20(4):792-795.
[7]TOBAGI F,KLEINROCK L.Packet switching in radio chan-nels:part II--the hidden terminal problem in carrier sense multiple-access and the busy-tone solution[J].IEEE Transactions on Communications,1975,23(12):1417-1433.
[8]WU C,LI V.Receiver-initiated busy-tone multiple access in packet radio networks[C]∥ACM SIGCOMM Computer Communication Review.ACM,1987:336-342.
[9]HAAS Z J,DENG J.Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks[J].IEEE Transactions on Communications,2002,50(6):975-985.
[10]KARN P.MACA-a new channel access method for packet radio[C]∥Amateur Radio 9th Computer Networking Conference.1990:134-140.
[11]BHARGHAVAN V,DEMERS A,SHENKER S,et al.MA-CAW:a media access protocol for wireless LAN’s[J].ACM SIGCOMM Computer Communication Review,1994,24(4):212-225.
[12]XU K,GERLA M,BAE S.How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks[C]∥Global Telecommunications Conference.2002,1:72-76.
[13]YANG X,HUANG Y F,YANG W,et al.A dual channel MAC protocol for providing high spatial reuse and channel efficiency[C]∥2009 1st International Conference on Information Science and Engineering (ICISE).IEEE,2009:3930-3935.
[14]MUQATTASH A,KRUNZ M.Power controlled dual channel (PCDC) medium access protocol for wireless ad hoc networks[C]∥INFOCOM 2003.Twenty-Second Annual Joint Confe-rence of the IEEE Computer and Communications.IEEE Societies,2003:470-480.
[15]JIANG L B,LIEW S C.Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks[J].IEEE Transactions on Mobile Computing,2008,7(1):34-49.
[16]FU L,LIEW S C,HUANG J.Effective carrier sensing in CSMA networks under cumulative interference[J].IEEE Transactions on Mobile Computing,2013,12(4):748-760.
[17]TAMAKI K,RAPTINO H A,SUGIYAMA Y,et al.Full du-plex media access control for wireless multi-hop networks[C]∥2013 IEEE 77th Vehicular Technology Conference (VTC Spring).IEEE,2013:1-5.
[18]The Network Simulator:ns3[OL].http://www.nsnam.org.
[19]JIANG L B,LIEW S C.Removing hidden nodes in IEEE 802.11 wireless networks[J].IEEE Vehicular Technology Conference,2005,62(2):1127-1131.
[20]GOYAL S,LIU P,GURBUZ O,et al.A distributed MAC protocol for full duplex radio[C]∥2013 Asilomar Conference on Signals,Systems and Computers.IEEE,2013:788-792.
[21]CHENG W,ZHANG X,ZHANG H.RTS/FCTS mechanism based full-duplex MAC protocol for wireless networks[C]∥Globecom Workshops (GC Wkshps).2013:5017-5022.
[22]THILINA K M,TABASSUM H,HOSSAIN E,et al.Medium access control design for full duplex wireless systems:challenges and approaches[J].IEEE Communications Magazine,2015,53(5):112-120.
[23]CHOI W,LIM H,SABHARWAL A.Power-controlled medium access control protocol for full-duplex WiFi networks[J].IEEE Transactions on Wireless Communications,2015,14(7):3601-3613.
[1] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[4] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[5] LI Zong-min, ZHANG Yu-peng, LIU Yu-jie, LI Hua. Deformable Graph Convolutional Networks Based Point Cloud Representation Learning [J]. Computer Science, 2022, 49(8): 273-278.
[6] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[7] SHAN Yong-feng, JIANG Rui, XU You-yun, LI Da-peng. Power Consumption Scheme Oriented to Full-duplex Multi-relay Cooperative SWIPT Networks [J]. Computer Science, 2022, 49(7): 280-286.
[8] PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296.
[9] WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423.
[10] SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440.
[11] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[12] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[13] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[14] LUO Jun-ren, ZHANG Wan-peng, LU Li-na, CHEN Jing. Survey on Online Adversarial Planning for Real-time Strategy Game [J]. Computer Science, 2022, 49(6): 287-296.
[15] YANG Tao-yu, XU Yuan-yuan, TAN Zeng-jie. Tile Partition Optimized Omnidirectional Video Coding for 6G Network [J]. Computer Science, 2022, 49(6): 66-72.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!