Fig. 4From: Analysis of hidden terminal’s effect on the performance of vehicular ad-hoc networksTime frame analysis of hidden terminal collision at the receiver node to calculate the vulnerable periodBack to article page