22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A<br />

Flooding for Data Delivery<br />

B<br />

H<br />

S E<br />

C<br />

I<br />

• Nodes J and K both broadcast packet P to node D<br />

• Since nodes J and K are hidden from each other, their<br />

transmissions may collide<br />

=> Packet P may not be delivered to node D at all,<br />

despite the use of flooding<br />

G<br />

F<br />

K<br />

J<br />

D<br />

M<br />

Z<br />

Y<br />

N<br />

L<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!