Wireless Connectivity. Petar Popovski. Читать онлайн. Newlib. NEWLIB.NET

Автор: Petar Popovski
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Техническая литература
Год издания: 0
isbn: 9781119576952
Скачать книгу
address, as we did in the probing algorithm. If Basil observes a collision in slot images, then he proceeds to resolve this collision recursively. At first, he sends a probe addressed to the sensors that have collided in the imagesth slot or, equivalently, all sensors that have self-assigned the address images. This probe is followed by a frame with images slots. Hence, the generalization is that a probe can be followed by more than a single slot. This would require generalization of the tree structure used to describe the basic probing algorithm.

      

      2.3.1 Randomization and Spectrum Sharing

      Randomization is the key ingredient for solving the problem of uncoordinated access to a shared communication medium. We have seen its use in the rendezvous problem, where randomization helps to assign roles to two half-duplex devices that would like to talk to each other. In the random access algorithms from the previous section, randomization is used to resolve the conflict among devices that are transmitting to the same receiver.

      The only way in which the two links Zoya–Yoshi and Xia–Walt can impact each other is through interference. In the framework of the collision model, if Zoya and Xia transmit simultaneously, then both Yoshi and Walt detect collisions and neither of them receives the desired packet correctly. The latter assumption is rather subtle, as if Zoya transmits and Xia is quiet, then Walt is able to overhear and receive the packet of Zoya correctly. Then why not use this overhearing to communicate coordinating messages between the two links? This is indeed possible, but in practice there can be collocated devices that are not logically connected and/or are not part of the same administrative network domain. It is thus viable to assume that data can be communicated only with a limited group of collocated nodes to which the observed node is networked, while all the other transmissions can be detected, but not used to extract data from them. However, it is important to note that if Walt is connected to Xia, but he overhears and detects packets from any arbitrary network nearby, then he may spend a substantial amount of battery energy to detect or receive packets he does not care about.

      We can detect at least two inefficiencies created by the slotted structure:

       If a packet arrives after the start of the slot, then the node needs to postpone the first transmission of the packet until the start of the next slot, even if the previous slot is idle.

       Consider the collision between and . Although the packets have not arrived at the same time, both Zoya and and Xia need to wait until the start of the next slot. Thus, the slotted structure forces them to be sent at exactly the same time, which leads inevitably to a collision.

      2.3.2 An Idle Slot is Cheap