Wireless Connectivity. Petar Popovski

Чтение книги онлайн.

Читать онлайн книгу Wireless Connectivity - Petar Popovski страница 20

Wireless Connectivity - Petar Popovski

Скачать книгу

alt="images"/>, since the number of users might change. This is not the same as having fixed number of images data slots in a frame, since Basil can use a scheduling policy to decide how the images slots are used, as informed through the allocation packet A. However, each user should have the opportunity to voice her requirements in a frame; otherwise there should be another, pre-reservation frame to pre-reserve the reservation slots, etc. Expressions (1.6) use a rather conservative estimate of the required resources, as it is always assumed that the number of users is maximal possible. This is clearly inefficient if there are only few active users. A quick fix would be to replace images with images, the number of currently active users. However, in that case Basil needs to correctly signal this to all active users, along with the allocation of the reservation slots. There can be other ways to make a better use of the reservation slots, based on the partial knowledge that Basil may have about the traffic demands. For example, Basil may use some machine learning methods to estimate which group of users is likely to have data to send in a certain period. We will not go into detail for all possible techniques, as our purpose has been to illustrate only the most important principles. The general class of protocols that addresses the case in which the number of active user is (much) lower than the total number of users is the one of random access protocols, which is the subject of the next chapter.

      1.4.4 Half-Duplex versus Full-Duplex in TDMA

      This chapter has dealt with the problem of sharing a single wireless communication channel among multiple communication links. We have used the simplest possible communication model that captures important features of the shared wireless medium, such as broadcast and interference, where the latter is modeled as a collision. We have adopted a packet to be the atomic unit of transmission, meaning that either the whole packet is received correctly or it is completely lost. The objective has been to introduce the main ideas for sharing the channel, such as TDD and TDMA and sketch the elements of a protocol that closely approximates the practical protocols. Where relevant, we have also discussed how the full-duplex capability of the wireless devices can contribute to the design of protocols that are more efficient compared to the case of half-duplex devices.

      A classical book that introduces elements of data networking, along with rigorous models is the one by Bertsekas and Gallager [1992]. For rendezvous and link establishment procedures, the reader is referred to the operation of various standards, such as 4G LTE in Dahlman et al. [2013] (chapter 14, Access Procedures), or 802.11 Wi-Fi networks, both in ad hoc and infrastructure mode, see Standards [2016]. Besides Bertsekas and Gallager [1992], another book that offers insights into models for communication over a shared channel as well as stochastic modeling of communication traffic is Rom and Sidi [2012].

      1 State machine for a TDMA system. Describe a possible state machine through which the devices and the base station implement the protocol from Figure 1.7.

      2 An even more practical state machine. Extend the state machine from the previous model in order to make the protocol practical, such as introduction of timeout mechanisms, dealing with device mobility, etc.

      3 More than one rendezvous channel. Assume that there are different rendezvous channels. Two nodes can establish a link only if one of them sends and the other one receives on the same channel. At a given time, a device can use only one channel. Devise a strategy for establishing a link between two devices and try to compare its performance to the case when there is a single rendezvous channel. When and why would it be useful to have channels for rendezvous?

      4 Unequal slots. Consider a generalization of a frame, which consists of a header, followed by communication resources. However, now assume that the communication resources are not organized into equal slots and instead the frame can contain slots with different lengths. Discuss how does this affect the type and amount of signaling bits used in the header.

      5 Reservation with variable number of data slots. The analysis in Section 1.4.3 is done for the case in which the number of data slots following the reservation slots is fixed. Let us now consider the case in which is variable and adapted to the actual number of resources required in the reservation slots. Assume that each of the devices can request up to resources through the reservation packets.Find the number of bits that are required in the reservation packets and the allocation packet.Using the assumptions for bit duration from Section 1.4.3, find the maximal throughput that can be offered in a given frame. NB: the maximal throughput depends on the amount of resources requested by the devices.In practical systems, the allocation packet A may not be received by some of the devices due to errors caused by noise or interference. When is the impact of not receiving A worse, when is fixed or when is variable? How do you suggest to design the system to be more robust to this type of error?

      Notes

      1 1 The term broadcast outside of information theory is used to denote the message that is sent to all devices within the range.

Скачать книгу