Wireless Connectivity. Petar Popovski

Чтение книги онлайн.

Читать онлайн книгу Wireless Connectivity - Petar Popovski страница 18

Wireless Connectivity - Petar Popovski

Скачать книгу

of link establishment and until the disconnection of the device. Furthermore, there is no need to divide the total amount of communication resources equally among the users. The latter one has already been illustrated in Figure 1.5(c), where Zoya, Yoshi, and Xia get different amounts of resources in a frame. It needs to be noted that there is no header in Figure 1.5(c), but, based on the previous discussion, the reader can easily add it. The common feature of these examples is that, once established, the allocation of communication resources is fixed for all the frames.

      At this stage is it clear that, in order to be able to flexibly allocate resources to a user, the frame header should be enriched with more bits used for control signaling. Specifically, these bits should describe how TDMA slots are allocated in the actual frame, preceded by that frame header. For simplicity, let us stick to the fact that each packet has a fixed duration images, equal to a TDMA slot, and the frame is composed of header and images TDMA slots. Using the information in the frame header, Basil should be able to allocate any TDMA slot in the frame to any user. Thus, potentially, all slots of a given frame may be allocated to Zoya.

      additional bits, where images is the maximal possible number of active users in the system. The number images is known in advance and Basil is never expected to admit more than images users. This assumption may look limiting, but is applied in practically all existing wireless systems. For example, some of the existing wireless standards impose that each device has a unique MAC identifier consisting of 48 bits, which means that the system design assumes images.

      The most important implication from the previous discussion is: any flexibility in the allocation of the communication resources corresponds to additional signaling information or metadata that needs to be communicated between the base station and the devices. Thus the flexibility can offer better use of resources, but then the overall correct operation of the protocols becomes more vulnerable to the loss or errors in the metadata.

      In order to make the most of the flexibility offered by the additional signaling bits, Basil should somehow know what is the most appropriate way to allocate the slots to the users in a given frame. For example, in an ideal case, Basil should allocate two slots to Xia only if he is certain that both slots will be filled with data to/from Xia. This is not a problem for downlink traffic from Basil to Xia, as Basil precisely knows how much data there is to send to Xia and can allocate the appropriate number of slots. More precisely, the data that can be allocated in this way should have arrived to the transmit queue of Basil before the header of the actual frame has started, such that the allocation can be announced in the header.

      But, how is this knowledge obtained by Basil? Going back to the analogy with speech, one can think of a conference scenario, in which the chairman (Basil) gives word to the individuals from the audience (devices or terminals). The first difference with the TDMA communication scenario from above is that whenever an individual speaks, not only the chairman but all the people in the audience receive the data. On the contrary, in our setting a mobile device does not communicate directly with another device. Furthermore, there is another difference with the TDMA operation described previously, which is essential for protocol operation. This is the way in which the individuals signal to the chairman whether they have an “uplink traffic”, which can be done by raising a hand or pressing a button. As already mentioned several times, a raised hand or a pressed button represent an additional communication channel. So, we stick to the dark room analogy and ask: how can we imitate the raising of a hand in a dark room in which the only way to communicate is to speak? This question leads to the idea of reservation packets.

      1.4.3 Short Control Packets and the Idea of Reservation

Скачать книгу