Hidden Terminal Management For Uplink Traffic in Rate-Controlled Wifi Networks
Hidden Terminal Management For Uplink Traffic in Rate-Controlled Wifi Networks
Hidden Terminal Management For Uplink Traffic in Rate-Controlled Wifi Networks
Abstract—This paper exposes several problems in managing rate selection performance degrades with the presence of
hidden terminals for uplink traffic in rate-controlled environ- hidden terminals. Probe-based mechanisms typically reduce
ments, and presents solutions to mitigate them. In particular, their rate when packet losses increase, which may lead either
we focus on scenarios, in which, clients are associated with an
access point (AP). The main challenge stems from the negative to rises the likelihood of collisions because of the increase of
interactions between rate-control protocols and hidden terminals. the transmission time if both transmitters have relatively the
To expose the problems, we use a recent channel estimation same SINR at the receiver, or one of the transmitters will
approach (CEA) to differentiate the reason for packet losses mostly win the medium and harshly decrease the medium
into three categories, noise, congestion and hidden terminals. access chances of the other transmitter. Even when the rate
Our testbed and simulation-based experiments show that the
accuracy of hidden terminal estimations using the CEA de- control algorithm uses channel quality measurements, these
grades as MAC-layer ACK frames are sent with relatively high are typically adversely affected by hidden terminals, and hence
transmission rates. To improve the accuracy of the CEA, the do not predict the best rates to match a given SNR level [11].
results demonstrate the necessity and cost of making the AP Finally, selecting the best rate based on SNR does not always
send ACKs based on the minimum ACK rate of all clients. We improve throughput, when losses are purely due to hidden
propose an adaptive scheme that combines both the CEA and
RTS/CTS messages. The proposed scheme increases the overall terminal collisions.
throughput of Minstrel rate-control algorithm by 60% in case To choose the most suitable transmission rate, hidden termi-
of light congested environments. We also proposed a threshold- nal detection mechanisms need to be used. For this reason, we
based adaptive RTS/CTS scheme based on the prior scheme to exploit the CEA proposed in [8], [12]. This approach classifies
handle the highly congested environments. The threshold-based the reason of packet losses as noise, congestion, or hidden
adaptive RTS/CTS scheme improves the overall throughput of the
adaptive RTS/CTS scheme and Minstrel algorithm between 20- terminals. The main idea is to send back-to-back measurement
35%. Finally, we propose and evaluate an opportunistic burst packets using MAC layer fragmentation/TXOP, and use dif-
scheme, which enforce fairness among clients. Simulation results ferent properties of the IEEE 802.11 Distributed Coordination
show that opportunistic bursting outperforms the prior schemes Function (DCF) to decide between different losses. Our paper
and Minstrel algorithm in Jain’s fairness metric (between 0.11 makes three contributions. First, we evaluate the accuracy of
and 0.38) for a realistic given scenario. It also keeps a relatively
high overall throughput. the CEA in typical rate-controlled WiFi environments with
hidden terminals. Second, we show the need and cost, for
I. I NTRODUCTION hidden terminals, of making the AP transmit ACKs to all
The hidden terminal problem is reported to cause significant clients with a rate that matches the client with the lowest data
degradation in communication in several measurement-based rate. Finally, we leverage the CEA and Network Allocation
studies of enterprise and home WiFi networks [13], [11]. To Vector (NAV) to mitigate the effect of hidden terminals in
expose the effects and understand the degree of degradation, rate-controlled WiFi environments. To mitigate the effect of
we focus on hidden terminals for uplink traffic in rate- hidden terminals, we propose three schemes: (1) adaptive
controlled WiFi networks. RTS/CTS, (2) a threshold-based adaptive RTS/CTS, and (3) an
Managing uplink traffic is gaining importance due to the opportunistic bursting algorithm. The results show that using
use of applications such as cloud storage, video gaming, the CEA and adaptive RTS/CTS scheme with the right AP
video conferencing and Internet of Things (IoT). Here, rate setup improves significantly the overall throughput of light
control is crucial to find the most suitable data transmission congested networks. The threshold-based adaptive RTS/CTS
rate based on current conditions [6]. Current rate control uses additional loss thresholds to detect situations where mea-
protocols are either probe-based mechanisms that search for surement frames experience high congestion losses, improving
the best transmission rates using packet loss as an indicator, the performance further. Finally, the opportunistic bursting
or channel-based mechanisms that use channel quality (e.g., scheme enforces fairness among clients by using bursting for
Signal to Noise Ratio - SNR) to predict the best transmission clients have low medium access chances. The results show
rates. Probe-based mechanisms are more commonly supported that the last scheme outperforms the other schemes in fairness
by wireless drivers (e.g., SampleRate [14] and Minstrel [2]) metric with keeping relatively high overall throughput.
compared to channel-based mechanisms. In either case, the The rest of the paper is organized as follows. In Section II,
0.30
Data−rate:24Mb, ack−rate:24Mp
are PCs equipped with 1 GHz VIA C3 processor, 512 MB Data−rate:24Mb, ack−rate:6Mp
Data−rate:36Mb, ack−rate:24Mp
0.25
Data−rate:36Mb, ack−rate:6Mp
of RAM, 40 GB disk. The higher specification nodes have
0.20
Intel Core 2 Duo P8400 2.26 GHz processor and 2G DDR3
RAM and Solid state drive. All nodes have two Ethernet
0.15
Pn
ports, two 802.11 a/b/g cards, and a Chassis Manager. The
0.10
wireless NIC is Atheros AR5213A [1] using the Madwifi
0.05
driver, and the antennas are multi-band 5dbi, that operate
on both 2.4Ghz & 5Ghz. The operating system is Linux 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8
3.2.0 − 32-generic. We use only one of the available wireless Hidden terminal load (Mbps)
interfaces with IEEE 802.11a[4] on channel 48 as it has the Fig. 2. Probability of noise errors, pn .
lowest interference at the time of running the experiments.
Based on a node’s role in the experiment, one of the following
modes is assigned to its wireless interface: AP for access point Standard and Unprotected methods. First, we present a testbed
, STA for station and monitor mode for a sniffer, which experiment to show that this assumption does not always
captures and stores packets for further analysis. Monitor mode hold in a rate-controlled WLAN and the solution for that.
uses the radiotap header, which records PHY parameters Then, simulation results are presented to show the cost of the
such as the Received Signal Strength (RSS). Both burst and proposed solution.
fast frame modes are disabled. Hence, a node sending
a data frame (not fragments) must wait at least DIFS plus A. Effect of Rate
backoff time before transmission. To illustrate the case when rate-controlled would cause in
We use iperf to generate UDP Unicast traffic between a accurate statistics by the CEA , we use the scenario in Fig 1. In
STA and an AP. All packets are 1940 B, and are fragmented to this scenario, two nodes, Node 1 and Node 2, are connected
two ∼ 1024 B fragments (payload plus headers). Hence, the to the same AP, but hidden from each other. Node 1 has a
second fragments are protected and can be used to calculate high rate connection to the AP, where both data and ACK
the noise error probability in Equation (1). The experiment rates are 24 Mbps. Node 2 has a weaker link to the AP and
results are presented with their 95% confidence intervals from uses the transmission rate of 6 Mbps. In this case, Node 2
6 experiment runs. Each run lasts for 60 s. may not be able to decode the ACKs sent by the AP to Node
1. Hence, even if Node 2 waits for an EIFS, its data frames
B. Simulation settings may collide with the data frames of Node 1, regardless of
We use simulation to understand more complex scenarios whether they are the first or the second packet. This clearly
that have higher node density. Our simulator is ns-3 version breaks the assumption that the second packet is collision free,
3.20. We use the model in [5] to create network topologies and affects the accuracy of the computation of the noise and
that represent the wireless link errors in a real testbed. Instead hidden terminal probabilities (i.e., ph and pn ).
of fragmentation, simulations send UDP or TCP unicast traffic Proposed solution - Lowest ACK Rate: To resolve the
in TXOP mode, as in [8], [12]. problem, we propose that the AP always sends ACKs with
We use the ns3 OnOffApplication as the traffic generator. the minimum ACK rate required by the set of its clients (e.g,
The simulation results are presented with their 95% confidence sending all ACKs at 6 Mbps in Fig 1). The proposed solution,
intervals from 10 simulation runs. Each run lasts 120 seconds. as we will see later, increases the accuracy of the CEA running
on the clients having strong SINR at the receiver. Moreover, it
IV. H IDDEN T ERMINAL D ETECTION saves the other hidden terminals (i.e., with weak SINR at the
The classification of link impairments as described in [8] receiver) from unnecessary transmission (i.e., from wasting a
and [12] is based on the assumption that it is possible to transmission attempt).
control when the second fragment/packet is protected against Experimental results: To set-up the experiment in Fig 1,
hidden terminals. This is the main difference between the we use three test-bed nodes as AP, Node 1 and Node 2. We
2016 IEEE Symposium on Computers and Communication (ISCC)
26
Lowest Ack−rate
Default Ack−rate
25
use only the basic transmission-rate (i.e., 6 Mpbs). This way,
24
we emulate the behavior of Minstrel rate control, which picks
Throughput (Mbps)
23
the best-throughput rate. Neither Node 1 nor Node 2 carrier
22
sense each other and hence, they are hidden terminals. Finally,
21
20
we verify that Node 2 can decode ACKs transmitted with the
19
basic transmission rate (i.e., 6Mbps) by the AP and not the
18
higher transmission rates.
17
2 3 4 5
To understand the performance of a hidden terminal with Number of contention nodes
the weaker link, we vary Node 2’s packet sending rate between Fig. 3. The worst case scenario where there are no hidden terminals, but a
0.2 Mbps and 1.8 Mbps, while Node 1 has always a packet slow client.
to send. All packets are sent as fragments using the Standard
method (described in Section II) and hence, second fragment
losses should only occur due to noise. Fig 2 shows pn :
5
Equation (1) measured by Node 1 as Node 2 increases its
traffic load. Note that pn needs to be correctly measured to
Throughput (Mbps)
be able to calculate hidden terminal probability ph . When the
4
Default 802.11a
Adaptive RTS/CTS + low ACK
ACK rate is selected according to Table I, we see a direct Adaptive RTS/CTS + default ACK
3
after a threshold load (0.6 Mbps for 24 Mbps and 0.8 Mbps
for 36 Mbps). Above 1 Mbps, pn goes up to ≈ 0.25 when
1 2 3 4
Node 1 uses 24 Mbps transmission rate and AP uses 12 Mbps Number of Hidden Terminal Nodes
for ACKs. When Node 1 switches to 36 Mbps, and the AP,
Fig. 4. Slow hidden terminals competing against a node with high SNR but
consequently, to 24Mbps for ACKs, we observe a lower pn . low traffic
This is because faster transmissions have a better chance to
avoid collisions.
Fig 2 also shows pn with the proposed solution of using varying SNR and insufficient measurements for hidden termi-
the lowest ACK rate. In this case, pn does not increase with nal detection. We use the Minstrel [2] rate control algorithm.
the hidden terminal load, and is a proper measure of the noise
A. Clients with Varying SNR
probability.
We simulate an asymmetric interference scenario with 2-5
B. Cost of the Lowest ACK Rate Solution clients and a single AP. One of the clients has always a high
SNR but has a low traffic demand (e.g., can transmit up to
Using the lowest used ACK rate for all clients may lead to
54 Mbps, but sends with a packet rate of 0.5 Mbps). All the
a reduction of the overall network throughput. To understand
other clients have weak links to the AP (i.e., can support only
the cost, we go back to the scenario presented in Section IV-A.
6 Mbps) but they are always backlogged. The traffic is UDP
We consider the worst case scenario when there are no hidden
with 1024 B packet size.
terminal clients but one of the clients can only send to the AP
Fig. 4 shows the overall throughput for three algorithms:
with the lowest data rate (i.e., 6 Mbps for 802.11a). The other
default 802.11a, adaptive RTS/CTS using the CEA with the
clients can send to the AP with the highest rate (i.e., 54 Mbps
default ACK rate and the CEA with the lowest ACK rate. In
for 802.11a). Fig 3 shows that the total throughput reduction
this scenario, Adaptive RTS/CTS with the default ACK rate
as the number of high-rate clients increase. In this case, the
does not bring much advantage. However, using the lowest
throughput reduction varies between 3% to 13%.
ACK rate fixes the hidden terminal detection, and spares
unnecessary transmission for the slow hidden terminal clients.
V. H IDDEN T ERMINAL M ITIGATION
Particularly, the slow rate clients read the NAV in the ACK.
Next, we evaluate the performance of different approaches thus, they save their CW of needlessly increase, which has a
for hidden terminal mitigation. We first propose to combine direct affect on their throughput.
the CEA with adaptive RTS/CTS. Here, we turn RTS/CTS on
when the hidden terminal probability is higher than a certain B. Insufficient Measurements
threshold (10% in our evaluation based on simulation results). When the channel is highly congested, it may be difficult
RTS/CTS is turned off when the hidden-terminal probability to collect enough statistics to determine the cause of packet
drops below this threshold. losses. Hidden terminal detection is affected because the CEA
All evaluations are based on simulation and consider various relies on the loss statistics of the second packet to differentiate
scenarios, which affect channel utilization. Specifically, we between hidden terminal and noise losses. However, when
simulate challenging scenarios such as hidden terminals with there is high congestion, the first packet has a higher loss
2016 IEEE Symposium on Computers and Communication (ISCC)
10 11 12 13
Default 802.11a
Adaptive RTS/CTS + loss thresh
Adaptive RTS/CTS + low ACK
Adaptive RTS/CTS + default ACK 2: C: # of ACKs received from the AP
3: Bs : Current burst size
Throughput (Mbps)
8: C ←C +1
3
1 2 3
Number of Hidden Terminal Nodes
4
9: if C < Bs − 1 then
10: Send packetC+1 with NAV covers packetC+2
Fig. 5. High congestion leads to insufficient measurements. This is detected
using two thresholds, which improves throughput. 11: else
12: if C = Bs − 1 then
TABLE II 13: Send packetC+1 with NAV ← 0
T WO LOSS RATIOS ND A DAPTIVE RTS/CTS 14: else
15: if C = Bs then
L1/2 > T hratio L1 > T hloss Case Outcome
True True High congestion RTS/CTS on 16: Bs ← max (1, Bs − K)
True False Low traffic RTS/CTS off 17: end if
False True Possibly HTs RTS/CTS off 18: end if
False False Possibly HTs RTS/CTS off
19: if B < Bmin then
20: Disable RTS messages
probability. In this case, TXOP is not reserved for second 21: end if
packets. Therefore, there will not be enough second packets, 22: C←0
degrading the accuracy of estimations. 23: end if
To address this problem, we introduce two new thresholds 24: else
to turn on RTS/CTS: T hratio and T hloss . T hratio defines 25: if C = Bs − 1 then
a threshold for the ratio of first packets to all received 26: B ← min(B + K, Bmax )
packets, L1/2 . Normally, this ratio should be 0.5, and we 27: end if
select T hratio = 0.7 for our evaluations. T hloss is the loss 28: Request medium using RTS message
ratio of first packet, L1 . Again, we select this threshold as 29: end if
0.7. Table II lists all the possible cases based on the value of
these ratios. The RTS/CTS is turned on when both ratios are
above thresholds. We simulate the scenario in the previous enabled if the used rate requires them to have a successful
section, but in this case the client with high SNR is also transmission even in the existence of another rates that can be
always backlogged, creating high congestion. Fig. 5 depicts used without RTS messages. Receiving the ACK, the client
the aggregate throughput. We observe that the lowest ACK sends the next packet within SIFS. This way, clients burst as
rate does not help much with estimations and hence, adaptive long as they have packets and they do not exceed the burst
RTS/CTS performance is not affected by ACK rate. Here, the size (Lines 7-13 in Algorithm 1).
problem is the lack of enough measurements to detect hidden In Algorithm 1, the burst size is dynamic and determined
terminals. Using the thresholds, this problem is mitigated, based on the results of transmitting the last packet in the burst.
resulting in overall increase in throughput between 20-35%. The burst size is always kept between two thresholds: Bmin
and Bmax to strike a balance between clients to access the
C. Opportunistic Burst Scheduling for Hidden Terminal Mit- medium. The prior role is to enforce fairness by allocating
igation extended time for clients that suffering severe hidden terminal
Although adaptive RTS/CTS improves performance, it does situation (Lines 15-17 and 25-27 in Algorithm 1). Here, if
incur additional overhead. Next, we propose an opportunistic the last packet in the burst (i.e, the unguarded packet) is
burst algorithm that amortizes the cost of RST/CTS messages successfully transmitted the burst size of the next transmission
by allocating more transmission time to clients with experi- will be K packets shorter until it reaches Bmin , then the RTS
encing poor channel conditions when they capture the channel. messages will be disabled. While if the last packet is not
The opportunistic burst algorithm, presented in Algorithm 1, transmitted successfully, the next burst transmission will be
is called at each Acknowledgement (ACK) reception after extended by K packets until Bs reaches Bmax .
enabling RTS massages and allocates additional TXOP based For more realistic evaluation, we simulate the indoor testbed
on the burst size Bs except the last packet in the burst. link profiles published in [5]. The testbed consists of 9 nodes.
To improve fairness, RTS messages are enabled only if the Node 4, which is reachable from the other nodes, is selected
transmitter cannot leverage from capture affect [5]. This is as the AP. Table III shows the number of hidden terminals for
different than adaptive RTS/CTS, where RTS messages are each node and the average SNR of this node at the AP. This is
2016 IEEE Symposium on Computers and Communication (ISCC)
VII. ACKNOWLEDGEMENT
Throughput (Mbps)
10
Opportunistic burst
5
802.11a (RTS/CTS enabled) Fund under Grant Numbers 10/CE/i1853 and 13/RC/2077.
4
50 75 100
Load per Client (MB)
125 150 R EFERENCES
[1] Atheros. http://www.wifi-stock.com/file/cm9 user manual.pdf.
Fig. 6. Aggregate TCP traffic throughput in simulated testbed links
[2] minstrel specification. http://madwifi-project.org/browser/madwifi/trunk/
athrate/minstrel/minstrel.txt
[3] Nitos: Network implementation testbed laboratory using open source
platforms.
a complex scenario with varying number of hidden terminals [4] IEEE standard for information technology-telecommunications and
for each client. In the evaluation, we simulate a file upload, information exchange between systems-local and metropolitan area
with file-sizes varying as 50, 75, 100, 125 and 150 MB. The networks-specific requirements - Part 11: wireless lan medium access
control (MAC) and physical layer (PHY) specifications. IEEE Std
clients choose a random number between 0 and 75 s to start 802.11-2007 (Revision of IEEE Std 802.11-1999), Jun 2007.
a file upload. Here, we set K = 1, Bmin = 3 and Bmax = 6. [5] M. Al-Bado, C. Sengul, and R. Merz. What details are needed for
Figs. 6 and 7 show the aggregate throughput achieved, wireless simulations? A study of a site-specific indoor wireless model.
In Proceedings of the INFOCOM, pages 289–297, Mar. 2012.
and Jain’s fairness among different flows, when all clients [6] S. Biaz and S. Wu. Rate adaptation algorithms for ieee 802.11 networks:
are using TCP traffic. The results show that increasing the A survey and comparison. In ISCC 2008. IEEE Symposium on, pages
upload file size above 70 MB leads to a slight decrease of the 130–136, July 2008.
[7] X. Chen, P. Gangwal, and D. Qiao. RAM: rate adaptation in mobile
overall throughput when the opportunistic bursting is used in environments. IEEE Transactions on Mobile Computing, 11(3):464–477,
comparison with default 802.11a and threshold-based adaptive March 2012.
RTS/CTS. However, Jain’s fairness metric is considerably [8] D. Giustiniano, D. Malone, D. J. Leith, and K. Papagiannaki. Measuring
transmission opportunities in 802.11 links. IEEE/ACM Transactions on
higher than any of the other models (between 0.11-0.18 for Networking, 18(5):1516–1529, Oct. 2010.
threshold-based adaptive RTS/CTS and between 0.15-0.36 for [9] J. Kim, S. Kim, S. Choi, and D. Qiao. Cara: Collision-aware rate adap-
default 802.11a, see Fig 7). The results suggest that using RTS tation for ieee 802.11 wlans. In Proceedings of the IEEE INFOCOM,
pages 1–11, April 2006.
messages and bursting for severe condition hidden terminal [10] M. Lacage, M. H. Manshaei, and T. Turletti. Ieee 802.11 rate adaptation:
nodes reduces slightly the overall throughput but affectively A practical approach. In Proceedings of the ACM MSWiM ’04, pages
improves the fairness between clients. 126–134, New York, NY, USA, 2004. ACM.
[11] K. LaCurts and H. Balakrishnan. Measurement and analysis of real-
world 802.11 mesh networks. In Proceedings of the ACM IMC ’10,
pages 123–136, 2010.
[12] D. Leith and D. Malone. Field measurements of 802.11 collision, noise
and hidden-node loss rates. In Proceedings of the 8th International
0.9
Opportunistic burst
802.11a (RTS/CTS enabled)
Adaptive RTS/CTS + loss thresh
adaptation for 802.11 wireless networks. In Proceedings of the ACM
MobiCom ’06, pages 146–157, 2006.
0.4
Default 802.11a