Code assignment for hidden terminal interference avoidance in multihop packet radio networks
IEEE/ACM Transactions on Networking (TON)
Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Kernel korner: why and how to use netlink socket
Linux Journal
An accurate technique for measuring the wireless side of wireless networks
WiTMeMo '05 Papers presented at the 2005 workshop on Wireless traffic measurements and modeling
Understanding link-layer behavior in highly congested IEEE 802.11b wireless networks
Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Insights into the hidden node problem
Proceedings of the 2006 international conference on Wireless communications and mobile computing
The BSD packet filter: a new architecture for user-level packet capture
USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings
An experimental study on the capture effect in 802.11a networks
Proceedings of the second ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks
IEEE Transactions on Mobile Computing
Inferring Queue State by Measuring Delay in a WiFi Network
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
Performance of wireless networks with hidden nodes: a queuing-theoretic analysis
Computer Communications
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
On the fidelity of 802.11 packet traces
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Thorough analysis of 802.11e star topology scenarios in the presence of hidden nodes
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Turning hidden nodes into helper nodes in IEEE 802.11 wireless LAN networks
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
The efficacy of path loss models for fixed rural wireless links
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Analyzing the hidden-terminal effects and multimedia support for wireless LAN
Computer Communications
Hi-index | 0.00 |
The negative performance impact of the presence of hidden terminals in wireless networks has been well know for decades. Despite much research in the area, many deployed networks continue to suffer a performance penalty because of hidden terminals. Ad hoc wireless networks are particularly susceptible to hidden terminal collisions because there are fewer opportunities to plan the network in a way that avoids or reduces the number of hidden terminals. Measuring the presence of hidden terminals and the impact they are having on performance is difficult, especially in a network of many nodes. Without such measurements, the users and operators of wireless networks can not tell if performance problems are caused by hidden terminals or some other problem. We introduce new methodology that can detect the presence of hidden terminals and estimate the performance impact they are causing. The methodology requires no additional hardware and is suitable for wide scale deployment and long term operation. The approach is based on in-kernel instrumentation of the wireless network stack. The design, implementation, and testing of the approach are covered. Results from in-lab testing and the measurement of a live commercial 802.11 network are also presented, including a case study where performance was significantly improved.