Wireless Connectivity. Petar Popovski

Чтение книги онлайн.

Читать онлайн книгу Wireless Connectivity - Petar Popovski страница 29

Wireless Connectivity - Petar Popovski

Скачать книгу

alt="images"/>. However, a malicious user can set his device to wait for a time less than images and in this way always gain an advantage in accessing the shared medium.

      In the discussion that follows we stick to the communication model for which the communication range and the interfering range are the same. Figure 2.6(a) depicts the basic difficulty posed in carrier sensing in a multi-hop spectrum sharing setting, termed the hidden terminal problem. Zoya and Xia are not in range and thus they cannot sense each other's carriers. If Zoya starts a transmission to Yoshi, Xia thinks that the medium is still idle and starts transmission to Walt, collisions occur at Yoshi and Walt, and both packets are lost. Carrier sensing does not help here. Figure 2.6(b) depicts the standard defining scenario for a hidden terminal, where both Zoya and Xia try to send to the same receiver Yoshi, but they are hidden from each other. In Figure 2.6(c), Zoya and Xia are hidden from each other, and Yoshi is outside the range of Xia. Zoya and Xia cannot apply carrier sensing with respect to each other and can thus end in a situation where they transmit simultaneously. However, in that case only Walt experiences a collision, but not Yoshi.

      One can extend the communication model by assuming that the carrier sensing range is larger than the communication range, as already mentioned before when the carrier sensing was introduced. In a model where the carrier sensing range is larger than the communication range, the hidden terminal problem can be mitigated. Furthermore, if the carrier sensing range is sufficiently larger than the communication range, then it can happen that even if the terminals are in a multi-hop setting with respect to the communication range, they are still in a single-hop setting with respect to carrier sensing.

      Nevertheless, it is not only the absence of carrier sensing that can cause problems in a multi-hop setting. Figure 2.6(d) illustrates what is known as the exposed terminal problem. Zoya and Xia are in range, such that they can inhibit each other by using carrier sensing. Let us look at the example in Figure 2.4(b): when images arrives, Zoya is already transmitting images, such that Xia defers her transmission until one idle slot after the transmission of images is over. However, if the physical positions of the nodes are the ones depicted in Figure 2.6(d), then Xia can start transmitting while Zoya sends images and both images and images will be received correctly. In short, the exposed terminal problem is manifested by unnecessary inhibition of a terminal that can, in fact, transmit.

      Not all multi-hop settings exhibit problems with carrier sensing; the reader can verify that it works correctly for Figure 2.6(e), although Yoshi cannot be interfered by Xia.

      The

Скачать книгу