Petar Popovski - Wireless Connectivity

Здесь есть возможность читать онлайн «Petar Popovski - Wireless Connectivity» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Wireless Connectivity: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Wireless Connectivity»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Wireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play. The latest developments, the 5G, next-generation Wi-Fi and Internet of Things connectivity, are the key enablers for widespread digitalization of practically all industries and public sector segments. This immense development within the last three decades have been accompanied by a large number of ideas, articles, patents, and even myths. This book introduces the most important ideas and concepts in wireless connectivity and discusses how these are interconnected, whilst the mathematical content is kept minimal. The book does not follow the established, linear structure in which one starts from the propagation and channels and then climbs up the protocol layers. The structure is, rather, nonlinear, in an attempt to follow the intuition used when one creates a new technology to solve a certain problem. 
The target audience is: 
Students in electronics, communication, and networking Wireless engineers that are specialized in one area, but want to know how the whole system works, without going through all the details and math Computer scientists that want to understand the fundamentals of wireless connectivity, the requirements and, most importantly, the limitations Engineers in energy systems, logistics, transport and other vertical sectors that are increasingly reliant on wireless technology

Wireless Connectivity — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Wireless Connectivity», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

4 Unequal slots. Consider a generalization of a frame, which consists of a header, followed by communication resources. However, now assume that the communication resources are not organized into equal slots and instead the frame can contain slots with different lengths. Discuss how does this affect the type and amount of signaling bits used in the header.

5 Reservation with variable number of data slots. The analysis in Section 1.4.3is done for the case in which the number of data slots following the reservation slots is fixed. Let us now consider the case in which is variable and adapted to the actual number of resources required in the reservation slots. Assume that each of the devices can request up to resources through the reservation packets.Find the number of bits that are required in the reservation packets and the allocation packet.Using the assumptions for bit duration from Section 1.4.3, find the maximal throughput that can be offered in a given frame. NB: the maximal throughput depends on the amount of resources requested by the devices.In practical systems, the allocation packet A may not be received by some of the devices due to errors caused by noise or interference. When is the impact of not receiving A worse, when is fixed or when is variable? How do you suggest to design the system to be more robust to this type of error?

Notes

1 1The term broadcast outside of information theory is used to denote the message that is sent to all devices within the range. In that sense, the term multicast is used when the message is sent to a subset of two or more devices within the range. Hence, in this sense a broadcast is a special case of multicast. On the other hand, broadcast in an information-theoretic sense means that the transmission of a device is received by multiple devices, regardless of who the intended receiver of the message is. Thus, we can say that a transmission over a wireless medium is a broadcast, but the actual message sent may be intended as a unicast to a specific device or multicast to a group of devices.

2 2Here we conservatively assume that a device sends a reservation packet even if it has no data to send.

2 Random Access How to Talk in Crowded Dark Room In the previous chapter the - фото 169

2 Random Access: How to Talk in Crowded Dark Room

In the previous chapter, the dark room analogy was used to introduce the problem addressed by rendezvous protocols. Thinking about the same analogy, let us assume that Basil is in a dark room and some of the other people in the room want to talk to him. Basil cannot use visual cues, such as a raised hand, in order to schedule who should speak at him at a given time. Furthermore, the room is crowded, there are many other people in it, but only a few of them are active, in the sense that they want to say something to Basil at a given time instant. With this in mind, it is clearly not efficient to ask the people one by one if they have something to say, as most of them will be just silent and thus most of the time will be spent inefficiently. This observation paves the way for random access protocols , in which the reservation slots or data transmission slots are not exclusively pre-allocated to a device. The attribute “random” comes from the fact that the decision to transmit is randomized. The randomness can be caused by random packet arrival to the device. Alternatively, when the packet is already in the buffer of the device, the device can make a deliberate randomized choice to transmit or not. The dark room reflects the fact that we need to use the same wireless medium both to obtain the right to transmit data, which is a form of metadata , and to send the actual data.

Similar to the rendezvous protocol, random access is an indispensable solution when the devices need to perform an initial access . The objective of the initial access is to connect a device to the base station Basil, potentially going through a process of authentication, allocation of a temporary short address, etc. Clearly, in the case of initial access there are many, potentially infinite, number of devices that can connect, but at a given time only one or very few of them want to do that. After the initial access, the communication can either proceed as a scheduled one or, if the activity of the device is sporadic, rely again on a random access. The latter is typical for scenarios in which a massive number of small Internet of Things (IoT) devices are connected to a base station Basil. However, at a given time only a small subset of them is active; this subset is random and unknown to Basil.

The canonical scenario for random access is depicted in Figure 2.1. In this scenario, a number of uncoordinated mobile devices attempt to transmit data or control information to a common receiver.

In presenting the algorithms for random access we will keep the assumptions on the collision model established in the previous chapter: a packet is an atomic transmission unit and any overlap between two or more packets leads to collision and incorrect reception of all collided packets. We will consider two classes of random access protocols: ALOHA type and probing (also known as tree type protocols). The variant of ALOHA considered here is not the original ALOHA, but rather framed ALOHA, a variant that logically extends the reservation schemes discussed in the previous chapter.

Figure 21 Canonical scenario for random access protocols where a number of - фото 170 Figure 2.1 Canonical scenario for random access protocols, where a number of uncoordinated devices attempt to transmit in the uplink to the same receiver, which here is the base station Basil.

2.1 Framed ALOHA

The context for this discussion is in Section 1.4.3, where we introduced the reservation slots. Looking only at the expression (1.8), we can try to understand in which situation the usage of reservation slots may not lead to an efficient operation. For example, let us take the scenario in which the terminals connected to Basil are not phones, but sensors that monitor certain physical phenomena and only occasionally have data to send.

The parameters of this scenario can be described as follows. The total number of sensors картинка 171connected to Basil is large, while the number of users that have some data to send at a given frame is small. In other words, the probability that a particular sensor has data to send in a particular frame is very low. The amount of data картинка 172in a packet of each sensor is also small. Let us assume that the number картинка 173of data slots that follow the reservation slots is small and, furthermore, all картинка 174slots are full with data. In that case, using the equation (1.8), one can see that картинка 175starts to dominate in the denominator, leading to decrease in the goodput. This is an example of a case in which the resources consumed by the metadata, which include reservation slots and all the other auxiliary packets, become comparable to the amount of data that needs to be sent and the overall system efficiency drops.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Wireless Connectivity»

Представляем Вашему вниманию похожие книги на «Wireless Connectivity» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Wireless Connectivity»

Обсуждение, отзывы о книге «Wireless Connectivity» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x