Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-x4r87 Total loading time: 0 Render date: 2024-04-28T05:01:12.557Z Has data issue: false hasContentIssue false

5 - Mesh susceptibility

Published online by Cambridge University Press:  01 March 2010

Get access

Summary

Continuing in the spirit developed in the previous chapter, rather than looking at meshes by pursuing a linear layer-by-layer exposition of the protocol stack as in Figure 3.1, we will continue to take a more pragmatically integrated view. This chapter and the next chapter therefore look at two key aspects of mesh systems, or indeed of any communications system; these are susceptibility to interference and quality of service. PHY, MAC, routing, transport and application behaviours along with their interactions are all relevant, although this chapter on susceptibility is more related to the lower layers and Chapter 6 on the quality of service is more related to the higher layers.

We begin by looking at interference and how the mesh may react to it. We do this by firstly classifying all the various forms which interference may take.

At the physical layer the effect of interference depends on the modulation and coding in use within the mesh. Of course this is true of any communications system, but we find an important distinction is that a mesh precludes the easy use of some common modulation approaches. The reason for this is the typical lack of any centralised control within a mesh, which precludes approaches demanding synchronisation of modulation across nodes. Examples include many versions of frequency hopping.

At the MAC, the effect of interference depends on the MAC scheme in use. Once again this is true for any communications system, yet again we find an important distinction is that a mesh precludes the easy use of many common MAC approaches. This includes the common slotted schemes of FDMA, TDMA and CDMA.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Mesh susceptibility
  • Steve Methley
  • Book: Essentials of Wireless Mesh Networking
  • Online publication: 01 March 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511581021.006
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Mesh susceptibility
  • Steve Methley
  • Book: Essentials of Wireless Mesh Networking
  • Online publication: 01 March 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511581021.006
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Mesh susceptibility
  • Steve Methley
  • Book: Essentials of Wireless Mesh Networking
  • Online publication: 01 March 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511581021.006
Available formats
×