Wireless Connectivity. Petar Popovski

Чтение книги онлайн.

Читать онлайн книгу Wireless Connectivity - Petar Popovski страница 16

Wireless Connectivity - Petar Popovski

Скачать книгу

detect the header and it subsequently takes action as instructed by the header.

      The header images is treated as an invite packet. If Basil has already images established links and cannot accommodate a new terminal, then he simply just does not send a frame with the header images. If Xia has already established a link with Basil, then she ignores this header. Otherwise, if Xia is still not connected to Basil, then one of the sequences depicted in Figure 1.7(b) occurs, where Xia sends an invite_accept packet to Basil within the slot that follows the header. In the second slot, following the one in which she transmits, Xia enters the receive state. Basil sends back a link_established packet, which also contains the number of the slot that is allocated to Xia for uplink/downlink transmission. Hence, the frame starting with images has a duration images s. Unlike the other frame types, this frame can feature both downlink and uplink data transmission. A device that has not yet established link with Basil ignores the headers images.

      If more than one device, say Xia and Walt, respond simultaneously to the same images, then Basil observes a collision and does not send back a link_established packet. Receiving no packet from Basil in the second slot after images, both Xia and Walt conclude that there has been a collision; this is because the simple collision model does not contain other sources of error. To deal with this situation, a randomization mechanism should be used, similar to the one introduced in Section 1.2: when the next images comes, Xia and Walt should flip a coin in order to decide whether to send invite_accept to the next images that they will receive.

      Figure 1.7(c) depicts a worked-out example, including all of the system elements introduced so far.

      In general, images and, in fact, in many practical systems the objective is to have images, in order to maximize the time during which the wireless channel is loaded with useful data. However, in that case, our concept of a time slot, as defined above, is ruined, as there is no single, atomic, time duration that can be used as a time slot. In order to still have a common time reference that describes the events important for the MAC protocol, we can define a slot structure as follows. Assume that the ratio of images and images can be represented as a ratio of two integers:

      (1.3)equation

      And, that is it! We have specified a very simple, but functional system with centralized MAC in which a single node (Basil) decides who will enter or leave the network, or when a device should receive or transmit. For the sake of simplicity, we have made several design choices that are sub-optimal. Each data packet contains

Скачать книгу