Petar Popovski - Wireless Connectivity

Здесь есть возможность читать онлайн «Petar Popovski - Wireless Connectivity» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Wireless Connectivity: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Wireless Connectivity»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Wireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play. The latest developments, the 5G, next-generation Wi-Fi and Internet of Things connectivity, are the key enablers for widespread digitalization of practically all industries and public sector segments. This immense development within the last three decades have been accompanied by a large number of ideas, articles, patents, and even myths. This book introduces the most important ideas and concepts in wireless connectivity and discusses how these are interconnected, whilst the mathematical content is kept minimal. The book does not follow the established, linear structure in which one starts from the propagation and channels and then climbs up the protocol layers. The structure is, rather, nonlinear, in an attempt to follow the intuition used when one creates a new technology to solve a certain problem. 
The target audience is: 
Students in electronics, communication, and networking Wireless engineers that are specialized in one area, but want to know how the whole system works, without going through all the details and math Computer scientists that want to understand the fundamentals of wireless connectivity, the requirements and, most importantly, the limitations Engineers in energy systems, logistics, transport and other vertical sectors that are increasingly reliant on wireless technology

Wireless Connectivity — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Wireless Connectivity», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

(2.7) картинка 339

where картинка 340is the propagation speed, equal to the speed of light. We can soften the propagation assumption and enrich our collision model by assuming the following: the communication range is картинка 341, but the range within which the carrier can be sensed, called the sensing range, is larger, say картинка 342. The rationale can be drawn from the analogy with speech: as Yoshi goes away from Zoya, after some distance he can hear that she is speaking, but cannot understand the words. If Zoya and Yoshi are terminals that are situated at the opposite ends of Basil's cell, then the distance between them is картинка 343and the duration of the minislot should be chosen to be картинка 344. In practice, it gets more complicated as not all signals travel over a straight line, as some of the waves that carry wireless information are reflected and arrive later.

We remark that carrier sensing is well suited for ALOHA type protocols, where collisions are avoided. On the other hand, the random access protocols based on splitting tree are good at resolving collisions once they occur, such that the gains that CSMA introduces in splitting tree type protocols are rather modest, as the main effect of CSMA is to decrease the probability of occurrence of a collision.

2.3.3 Feedback to the Transmitter

The way we have described the system operation in Figure 2.4assumes that a transmitter, Zoya or Xia, knows perfectly if their packet has been received successfully or was subject to collision. On the other hand, collision or success is a phenomenon that occurs at the receiver, such that it is the receiver that needs to inform the transmitter about the outcome. In addition, Zoya's transmitter is half-duplex and she cannot detect the collision with Xia while transmitting, although Xia is within the communication/interfering range and her signal reaches Zoya. In fact, due to the use of half-duplex transmission, after sending the packet, Zoya should go into receiving mode. In this mode she waits for a packet from Yoshi that carries feedback to inform her whether the packet reception outcome was successful or not. This feedback packet from Yoshi, denoted by картинка 345, can, in principle, carry a single bit of information, either acknowledging (ACK) the packet reception or sending a negative ACK (NACK). The latter is sent in the case there is a collision and thus an incorrect reception. The feedback packet is, generally, much shorter than the data packet.

Figure 2.5(a)shows the transmission of the feedback packet картинка 346from Yoshi for the case when the channel is slotted. Differently from the slotted model used before, where the slot duration was equal to the packet duration, here the slot duration is longer than the duration of Zoya's packet. The remainder of the slot, after the end of Zoya's packet, is reserved for Yoshi to transmit the ACK message картинка 347, while Zoya is in a listening mode. Referring to Figure 2.4(a), Yoshi receives картинка 348successfully and sends картинка 349ACK. The packet картинка 350is not received correctly and Yoshi sends картинка 351NACK. If we assume that all nodes are in each other's communication range, then at the same time when Walt sends NACK to Xia, collision occurs at the receiver of Zoya, as well as that of Xia. As a result, Zoya does not receive the NACK. To avoid this type of situation, one can use randomized contention for sending the feedback packets, which is a contention that occurs in addition to the contention used for data packets. Nevertheless, in our communication model, Zoya can receive NACK also implicitly , through the absence of ACK. In other words, the mere existence or absence of картинка 352can be understood as a single bit of information sent from Yoshi to Zoya. If Yoshi does not receive the data packet correctly, he “sends” NACK by not transmitting Figure 25 Transmission of a feedback packet from Y - фото 353.

Figure 25 Transmission of a feedback packet from Yoshi to Zoya for a a - фото 354 Figure 2.5 Transmission of a feedback packet картинка 355from Yoshi to Zoya for (a) a slotted channel, (b) carrier sensing.

Figure 2.5(b)shows how the transmission of a feedback packet would operate in a CSMA setting. As in CSMA the basic time unit is a minislot and not a slot; we cannot say that the end of the slot is reserved for transmission of a feedback packet. Note that Yoshi, after receiving картинка 356, does not wait for an idle minislot and he immediately sends картинка 357to Zoya. Xia, and potentially other contending transmitters, will detect that the medium is busy and postpone her transmission to start after картинка 358is followed by an idle slot. We can interpret this as if the feedback packet has a higher priority over a data packet sent by another node.

This observation reveals the inherent capability of the CSMA mechanism to introduce different priority classes. In the simplest case, there can be two classes of traffic: high and low importance, respectively. Then the protocol can be designed such that a high-priority data uses a single minislot for carrier sensing, while low-priority data uses two minislots for carrier sensing. Let, for example, Zoya send a high-priority packet that corresponds to some data for critical control system managed by Yoshi, while Xia sends to Walt data from, for example, an entertainment service. After the busy medium is released, then Zoya will always be the first to start a transmission after a single idle minislot, while Xia will defer her transmission. On another note, this property of CSMA can be misused by a malicious user. For example, the CSMA protocol can be specified such that the minimum idle time before the transmission is картинка 359. However, a malicious user can set his device to wait for a time less than картинка 360and in this way always gain an advantage in accessing the shared medium.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Wireless Connectivity»

Представляем Вашему вниманию похожие книги на «Wireless Connectivity» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Wireless Connectivity»

Обсуждение, отзывы о книге «Wireless Connectivity» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x