Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Experimental demonstration of hidden node problem in visible light communication networks

Not Accessible

Your library or personal account may give you access

Abstract

In this paper, hardware investigations show the effects of the hidden and exposed node problems in visible light communication (VLC) networks. Furthermore, the request to send/clear to send (RTS/CTS) mechanism, as a physical layer-independent solution, is used for solving the hidden node problem in VLC networks. A VLC hardware system, called VLCIoT, which was designed and implemented in our laboratory based on PHY I of the IEEE 802.15.7 standard, is used for the physical layer. The medium access control layer of the IEEE 802.15.7 is considered for the network. We implement the multiple access protocol of the IEEE 802.15.7 and the RTS/CTS mechanism on the microcontroller of each device using the C programming language. Goodput, message loss ratio, fairness, average delay, energy efficiency, network load, frame size, number of hidden nodes, and number of contending nodes are the evaluated parameters. The results show that for the IEEE 802.15.7 increase of the hidden nodes decreases the goodput and energy efficiency and increases the message loss ratio and the average delay. But, using the RTS/CTS mechanism, the hidden nodes do not affect the goodput, the message loss ratio, the energy efficiency, and the average delay because this mechanism solves the hidden node problem. The results show that the RTS/CTS mechanism increases the saturation goodput by 300%, decreases the message loss ratio by 94%, decreases the average delay by 50%, and increases the energy efficiency by 300%. The results show that at higher network load, higher data frame size, and more contending nodes, the performance of the RTS/CTS mechanism is better. Also, in symmetric networks, in which all nodes are hidden, or no hidden node exists in the network, fairness is better than the asymmetric networks, in which some nodes are hidden while others are not.

© 2022 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Full-Duplex MAC Protocol Based on Adaptive Contention Window for Visible Light Communication

Zhong Wang, Yonghe Liu, Yaping Lin, and Shengye Huang
J. Opt. Commun. Netw. 7(3) 164-171 (2015)

IEEE 802.15.7 MAC Under Unsaturated Traffic: Performance Analysis and Queue Modeling

Kamal Adli Mehr, Sina Khoshabi Nobar, and Javad Musevi Niya
J. Opt. Commun. Netw. 7(9) 875-884 (2015)

Comprehensive Performance Analysis of IEEE 802.15.7 CSMA/CA Mechanism for Saturated Traffic

Sina Khoshabi Nobar, Kamal Adli Mehr, and Javad Musevi Niya
J. Opt. Commun. Netw. 7(2) 62-73 (2015)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (18)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (2)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.