1. Field of the Invention
The present invention relates to a system and method for identifying potential hidden node problems in a multi-hop wireless ad-hoc communication network, such as an 802.11 network. More particularly, the present invention relates to a system and method for identifying nodes of a wireless ad-hoc communication network whose capabilities of receiving data packets can be adversely affected by hidden node problems, in order to avoid selecting paths containing those potentially problem nodes for routing data packets.
2. Description of the Related Art
In recent years, a type of mobile communications network known as an “ad-hoc” network has been developed. In this type of network, each user terminal (hereinafter “mobile node”) is capable of operating as a base station or router for the other mobile nodes, thus eliminating the need for a fixed infrastructure of base stations. Accordingly, data packets being sent from a source mobile node to a destination mobile node are typically routed through a number of intermediate mobile nodes before reaching the destination mobile node.
More sophisticated ad-hoc networks are also being developed which, in addition to enabling mobile nodes to communicate with each other as in a conventional ad-hoc network, further enable the mobile nodes to access a fixed network and thus communicate with other types of user terminals, such as those on the public switched telephone network (PSTN) and on other networks such as the Internet. Details of these types of ad-hoc networks are described in U.S. patent application Ser. No. 09/897,790 entitled “Ad Hoc Peer-to-Peer Mobile Radio Access System Interfaced to the PSTN and Cellular Networks”, filed on Jun. 29, 2001, in U.S. patent application Ser. No. 09/815,157 entitled “Time Division Protocol for an Ad-Hoc, Peer-to-Peer Radio Network Having Coordinating Channel Access to Shared Parallel Data Channels with Separate Reservation Channel,” filed on Mar. 22, 2001, now U.S. Pat. No. 6,807,165, and in U.S. patent application Ser. No. 09/815,164 entitled “Prioritized-Routing for an Ad-Hoc, Peer-to-Peer, Mobile Radio Access System”, filed on Mar. 22, 2001, now U.S. Pat. No. 6,873,839 the entire content of each of said patent applications being incorporated herein by reference.
As can be appreciated by one skilled in the art, when a node sends packetized data to a destination node, the node typically checks its routing table to determine whether the destination node is contained in its routing table. If the destination node is contained in the node's routing table, the data is transmitted via a path that leads to the destination node. If the destination node is not listed in the node's routing table, then the packet is sent to one or more other nodes listed in the node's routing table, and those other nodes determine if the destination table is listed in their routing tables. The process continues until the data packet eventually reaches the destination node.
As can further be appreciated by one skilled in the art, the “hidden node” problem is a classic problem for Medium Access Protocols (MACs) in these types of ad-hoc networks. The problem occurs when two radios (nodes) are transmitting outside the effective communication range of each other, but both are within the effective communication range of an intermediate node that is also participating in the network. If both of the two radios in the network attempt to communicate with the intermediate node at or near the same time, their signals can collide and/or cause packet corruption at the intermediate node which is the intended receiver. In this case, the two extremal nodes are “hidden” from each other.
The hidden node problem therefore reduces successful packet delivery at the intermediate node. Also, the more hidden nodes there are around the intermediate node, the more severe the packet corruption can be.
Accordingly, a need exists for a system and method for effectively and efficiently identifying nodes experiencing hidden node problems in a wireless ad-hoc communication network, so that routing through those nodes can be avoided if possible.
An object of the present invention is to provide a system and method for effectively and efficiently identifying nodes experiencing hidden node problems in a wireless ad-hoc communication network.
Another object of the present invention is to provide a system and method for locating and evaluating multiple neighbor node sets for each node, and calculating a degree of hidden nodes present at each node.
Still another object of the present invention is to provide a system and method for communicating a degree of hidden nodes present at each node as a routing advertisement for use in transmission route selection.
Still another object of the present invention is to provide a system and method for calculating at least one transmission route through a network avoiding nodes which advertise a high degree of hidden nodes present.
These and other objects of the present invention are substantially achieved by providing a system and method for identifying potential hidden node problems in a multi-hop wireless ad-hoc communication network, such as an 802.11 network. The system and method evaluates the relationship between the neighbors of each respective node to identify nodes of a wireless ad-hoc communication network whose capabilities of receiving data packets can be adversely affected by hidden node problems, in order to avoid selecting paths containing those potentially problem nodes for routing data packets.
Specifically, for each node, the system and method generates a node metric identifying the relationship between the neighbors of a node. A first neighbor node set is calculated for a node of interest, and thereafter, a neighbor node set is then calculated for each node included in the first neighbor node set. Nodes present in the first neighbor node set, but not present in each subsequent neighbor node sets, respectively, are included in a set of potentially hidden nodes about the node of interest. This value can be communicated with other nodes as a metric in a routing advertisement, so that other nodes can assess the degree of potential hidden node problems that may be experienced by that node, and can choose to avoid using that potentially problem node for routing data packets to other nodes.
These and other objects, advantages and novel features of the invention will be more readily appreciated from the following detailed description when read in conjunction with the accompanying drawings, in which:
As can be appreciated by one skilled in the art, the nodes 102,106 and 107 are capable of communicating with each other directly, or via one or more other nodes 102, 106 or 107 operating as a router or routers for data packets being sent between nodes 102, as described in U.S. Pat. No. 5,943,322 to Mayor, which is incorporated herein by reference, and in U.S. patent application Ser. Nos. 09/897,790, 09/815,157, now U.S. Pat. No. 6,807,165; and Ser. No. 09/815,164, now U.S. Pat. No. 6,873,839: referenced above. Specifically, as shown in
Each node 102, 106 and 107 further includes a memory 114, such as a random access memory (RAM), that is capable of storing, among other things, routing information pertaining to itself and other nodes 102, 106 or 107 in the network 100. In addition, certain nodes, especially nodes 102, can include a subscriber device host (not shown), which can consist of any number of devices, such as a notebook computer terminal, mobile telephone unit, mobile data unit, personal computer (PC), personal data assistant (PDA), or any other suitable device.
In addition to, voice, data and multimedia packetized data signals, the nodes 102, 106 and 107 exchange respective routing information, referred to as routing advertisements or routing table information, with each other via a broadcasting mechanism periodically, for example, when a new node 102 enters the network 100, or when existing nodes 102 in the network 100 move. A node 102, 106 or 107 will broadcast it's routing table updates, and nearby nodes 102, 106 or 107 will only receive the broadcast routing table updates if within broadcast range (e.g., radio frequency (RF) range) of the broadcasting node 102, 106 or 107. For example, assuming that nodes 102-1 and 102-6 are within the RF broadcast range of node 102-3, when node 102-3 broadcasts routing table information, the current table information is received and filed by both nodes 102-1 and 102-6. However, if nodes 102-2, 102-4 and 102-5 are beyond the broadcast range of node 102-3, these nodes will not receive the current table information broadcast.
Each node 102, 106 or 107 in the network 100 can also experience the hidden node problem as discussed in the Background section above. As will now be discussed with regard to
According to an embodiment of the present invention, the wireless ad-hoc network 100 may use certain metrics to avoid degenerate areas of the network demonstrating decreased performance. Optimally, a multi-hop ad-hoc routing network 100 can be configured so that a routing path chosen from a source node to a destination node will ensure the highest bandwidth, lowest latency, and greatest probability for packet delivery. The embodiment of the present invention enables the nodes of network 100 to establish a routing metric, which prevents the nodes from routing packets through areas of the network 100 that contain high degrees of hidden nodes. For this embodiment, the descriptive term “degree of hidden nodes” at a node of interest refers to the number of hidden nodes present about the node.
As discussed above, in a multi-hop wireless ad-hoc routing network 100, a routing advertisement transmitted by a node 102, 106 and 107 may advertise all of the other nodes 102, 106 and 107, or neighbor nodes, with which that node can directly communicate. In addition, the routing advertisement transmitted by a node 102, 106 and 107 typically advertises all of the destinations that can be reached from the node directly, and destinations that can be reached indirectly, listing the intermediate nodes to which the packet must be delivered to in order to reach the destination. As will now be described, an embodiment of the present invention examines the neighbor node routing advertisements transmitted by a node to evaluate the potential hidden problem experienced by that node.
A={a,b,c}
B={a,b,c}
C={a,b,c,d}
D={c,d}
If we consider node c as the node of interest, an example of the technique of identifying the hidden nodes about node c according to an embodiment of the present invention is as follows:
First, the embodiment of the present invention identifies all of the nodes that are neighbors to the node of interest, node c, based on the routing advertisements transmitted by node c, which in this case, includes the node set C. For each neighbor node, a comparison is made between the routing advertisements transmitted by node c and the neighbor lists at each neighbor node. Specifically, as the neighbor list is received from node c at node a, Set A is compared with Set C. As the neighbor list is received from node c at node b, Set B is compared with Set C, and as the neighbor list is received from node c at node d, Set D is compared with Set C. Based upon each comparison, the nodes of each set not shared is then determined. This is the symmetric difference of each set comparison which in this example, is as follows:
C⊕A={d}
C⊕B={d}
C⊕D={a,b}
The union of these sets represents all of the potentially hidden nodes of node c. This set of potentially hidden nodes of node c for the network shown above is known as Pc, and it contains:
Pc={a,b,d}
The number of elements in the set is the determined, which in this example is determined as |Pc|=3, which represents the number of potentially hidden nodes of node c for the network.
All elements of the potentially hidden node set Pc which are neighbors of each other, or sub-neighbors, are then determined. In this example, nodes a, b and d are elements of the potentially hidden node set Pc. Of nodes a, b and d, only nodes a and b are sub-neighbors. These nodes are now treated as a single entry a_b in the new set of hidden nodes around node c:
Hc={a_b, d}
so |Hc|=2
Therefore, the degree of hidden nodes about node c is 2.
Since nodes a, b and c are all neighbors of each other, normal coordination can occur between them and they should not attempt to access the medium simultaneously. Therefore, the hidden node contribution made by nodes a and b is reduced to the hidden node contribution of a single node since they are coordinated. The degree of hidden nodes about c (i.e. 2) represents the number of mobile nodes, or radios, that are unaware of each other and which may cause interference at node c.
In the embodiment of the present invention described above, the degree of hidden nodes of each node 102, 106 and 107 in the network 100 is determined in the manner described above. Each node then advertises it's respective metric along with its other routing information in the manner described above. Routing algorithms performed by, for example, the controller 112 of each of the nodes, can use the metric of each node to select transmission paths comprised of nodes having lower degrees of hidden nodes. This will thus minimize the likelihood that the packet will be corrupted or delayed due to the contribution of a hidden node along the route.
As can be appreciated from the above, the embodiment of the present invention can identify and help avoid routes in wireless ad-hoc routing networks that may be degenerate due to a large degree of hidden nodes along the route, as opposed to previous techniques which focused on direct measures of link quality among routes. The embodiment of the present invention can therefore predict areas of high hidden node interference in networks containing radios that cannot directly evaluate link quality.
In addition, some radio standards in use by mobile node, such as 802.11, may perform much more poorly than other standards in the presence of a high degree of hidden nodes. Specifically, the 802.11 standard, while in ad-hoc power-save mode, can experience the inability or greatly diminished capacity to transmit data in the presence of hidden nodes. In such an event, traditional direct measurements of link quality may not reflect the full degenerate condition in existence along a chosen route. Thus, it may be possible for such an area to appear to have a high capacity when in fact the synergy between the ad-hoc power-save algorithm and the hidden nodes may prevent most traffic from being successfully forwarded through the area. However, since the embodiment of the present invention discussed above can specifically identify the areas having high degrees hidden nodes, a routing algorithm may use such determinations to avoid routes through such areas, even though the areas can appear to have high node capacity.
As can be appreciated by one skilled in the art, the embodiment of the present invention can be employed in other wireless routing networks that can suffer from the classic hidden node problem, as well as to 802.11 devices in peer-to-peer mode and any other wireless device that allows direct peer-to-peer communication.
Although only a few exemplary embodiments of the present invention have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the following claims.
This application claims benefit under 35 U.S.C. §119(e) from U.S. provisional patent application Ser. No. 60/371,718 entitled “A System And Method For Identifying Potential Hidden Node Problems in Multi-Hop Wireless Ad-Hoc Networks For The Purpose Of Avoiding Such Potentially Problem Nodes In Route Selection”, filed Apr. 12, 2002, the entire contents of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4494192 | Lew et al. | Jan 1985 | A |
4617656 | Kobayashi et al. | Oct 1986 | A |
4736371 | Tejima et al. | Apr 1988 | A |
4742357 | Rackley | May 1988 | A |
4747130 | Ho | May 1988 | A |
4910521 | Mellon | Mar 1990 | A |
5034961 | Adams | Jul 1991 | A |
5068916 | Harrison et al. | Nov 1991 | A |
5231634 | Giles et al. | Jul 1993 | A |
5233604 | Ahmadi et al. | Aug 1993 | A |
5241542 | Natarajan et al. | Aug 1993 | A |
5317566 | Joshi | May 1994 | A |
5392450 | Nossen | Feb 1995 | A |
5412654 | Perkins | May 1995 | A |
5424747 | Chazelas | Jun 1995 | A |
5502722 | Fulghum | Mar 1996 | A |
5517491 | Nanni et al. | May 1996 | A |
5555425 | Zeller et al. | Sep 1996 | A |
5555540 | Radke | Sep 1996 | A |
5572528 | Shuen | Nov 1996 | A |
5615212 | Ruszczyk et al. | Mar 1997 | A |
5618045 | Kagan et al. | Apr 1997 | A |
5621732 | Osawa | Apr 1997 | A |
5623495 | Eng et al. | Apr 1997 | A |
5627976 | McFarland et al. | May 1997 | A |
5631897 | Pacheco et al. | May 1997 | A |
5644576 | Bauchot et al. | Jul 1997 | A |
5652751 | Sharony | Jul 1997 | A |
5661727 | Kermani et al. | Aug 1997 | A |
5680392 | Semaan | Oct 1997 | A |
5684794 | Lopez et al. | Nov 1997 | A |
5687194 | Paneth et al. | Nov 1997 | A |
5696903 | Mahany | Dec 1997 | A |
5701294 | Ward et al. | Dec 1997 | A |
5706428 | Boer et al. | Jan 1998 | A |
5717689 | Ayanoglu | Feb 1998 | A |
5745483 | Nakagawa et al. | Apr 1998 | A |
5781540 | Malcolm et al. | Jul 1998 | A |
5787080 | Hulyalkar et al. | Jul 1998 | A |
5794154 | Bar-On et al. | Aug 1998 | A |
5796732 | Mazzola et al. | Aug 1998 | A |
5796741 | Saito et al. | Aug 1998 | A |
5805593 | Busche | Sep 1998 | A |
5805842 | Nagaraj et al. | Sep 1998 | A |
5805977 | Hill et al. | Sep 1998 | A |
5809518 | Lee | Sep 1998 | A |
5822309 | Ayanoglu et al. | Oct 1998 | A |
5844905 | McKay et al. | Dec 1998 | A |
5845097 | Kang et al. | Dec 1998 | A |
5857084 | Klein | Jan 1999 | A |
5870350 | Bertin et al. | Feb 1999 | A |
5877724 | Davis | Mar 1999 | A |
5881095 | Cadd | Mar 1999 | A |
5881372 | Kruys | Mar 1999 | A |
5886992 | Raatikainen et al. | Mar 1999 | A |
5896561 | Schrader et al. | Apr 1999 | A |
5903559 | Acharya et al. | May 1999 | A |
5909651 | Chander et al. | Jun 1999 | A |
5936953 | Simmons | Aug 1999 | A |
5943322 | Mayor et al. | Aug 1999 | A |
5987011 | Toh | Nov 1999 | A |
5987033 | Boer et al. | Nov 1999 | A |
5991279 | Haugli et al. | Nov 1999 | A |
6028853 | Haartsen | Feb 2000 | A |
6029217 | Arimilli et al. | Feb 2000 | A |
6034542 | Ridgeway | Mar 2000 | A |
6044062 | Brownrigg et al. | Mar 2000 | A |
6047330 | Stracke, Jr. | Apr 2000 | A |
6052594 | Chuang et al. | Apr 2000 | A |
6052752 | Kwon | Apr 2000 | A |
6064626 | Stevens | May 2000 | A |
6067291 | Kamerman et al. | May 2000 | A |
6078566 | Kikinis | Jun 2000 | A |
6104712 | Robert et al. | Aug 2000 | A |
6108738 | Chambers et al. | Aug 2000 | A |
6115580 | Chuprun et al. | Sep 2000 | A |
6118788 | Kermani et al. | Sep 2000 | A |
6122690 | Nannetti et al. | Sep 2000 | A |
6130881 | Stiller et al. | Oct 2000 | A |
6130892 | Short et al. | Oct 2000 | A |
6132306 | Trompower | Oct 2000 | A |
6163699 | Naor et al. | Dec 2000 | A |
6178337 | Spartz et al. | Jan 2001 | B1 |
6192053 | Angelico et al. | Feb 2001 | B1 |
6192230 | Van Bokhorst et al. | Feb 2001 | B1 |
6208870 | Lorello et al. | Mar 2001 | B1 |
6223240 | Odenwald et al. | Apr 2001 | B1 |
6240294 | Hamilton et al. | May 2001 | B1 |
6246875 | Seazholtz et al. | Jun 2001 | B1 |
6249516 | Brownrigg et al. | Jun 2001 | B1 |
6275707 | Reed et al. | Aug 2001 | B1 |
6285892 | Hulyalkar | Sep 2001 | B1 |
6304556 | Haas | Oct 2001 | B1 |
6327300 | Souissi et al. | Dec 2001 | B1 |
6349091 | Li | Feb 2002 | B1 |
6349210 | Li | Feb 2002 | B1 |
6396814 | Iwamura et al. | May 2002 | B1 |
20010053699 | McCrady et al. | Dec 2001 | A1 |
20020067736 | Garcia-Luna-Aceves et al. | Jun 2002 | A1 |
20020122410 | Kulikov et al. | Sep 2002 | A1 |
Number | Date | Country |
---|---|---|
2132180 | Mar 1996 | CA |
0513841 | Nov 1992 | EP |
0627827 | Dec 1994 | EP |
0924890 | Jun 1999 | EP |
2683326 | Jul 1993 | FR |
WO 9608884 | Mar 1996 | WO |
WO 9724005 | Jul 1997 | WO |
WO 9839936 | Sep 1998 | WO |
WO 9912302 | Mar 1999 | WO |
WO 0034932 | Jun 2000 | WO |
WO 0110154 | Feb 2001 | WO |
WO 0133770 | May 2001 | WO |
WO 0135567 | May 2001 | WO |
WO 0137481 | May 2001 | WO |
WO 0137482 | May 2001 | WO |
WO 0137483 | May 2001 | WO |
WO 0235253 | May 2002 | WO |
Number | Date | Country | |
---|---|---|---|
60371718 | Apr 2002 | US |