Wireless Connectivity. Petar Popovski

Чтение книги онлайн.

Читать онлайн книгу Wireless Connectivity - Petar Popovski страница 21

Wireless Connectivity - Petar Popovski

Скачать книгу

sense, the term multicast is used when the message is sent to a subset of two or more devices within the range. Hence, in this sense a broadcast is a special case of multicast. On the other hand, broadcast in an information-theoretic sense means that the transmission of a device is received by multiple devices, regardless of who the intended receiver of the message is. Thus, we can say that a transmission over a wireless medium is a broadcast, but the actual message sent may be intended as a unicast to a specific device or multicast to a group of devices.

      2 2 Here we conservatively assume that a device sends a reservation packet even if it has no data to send.

      In the previous chapter, the dark room analogy was used to introduce the problem addressed by rendezvous protocols. Thinking about the same analogy, let us assume that Basil is in a dark room and some of the other people in the room want to talk to him. Basil cannot use visual cues, such as a raised hand, in order to schedule who should speak at him at a given time. Furthermore, the room is crowded, there are many other people in it, but only a few of them are active, in the sense that they want to say something to Basil at a given time instant. With this in mind, it is clearly not efficient to ask the people one by one if they have something to say, as most of them will be just silent and thus most of the time will be spent inefficiently. This observation paves the way for random access protocols, in which the reservation slots or data transmission slots are not exclusively pre-allocated to a device. The attribute “random” comes from the fact that the decision to transmit is randomized. The randomness can be caused by random packet arrival to the device. Alternatively, when the packet is already in the buffer of the device, the device can make a deliberate randomized choice to transmit or not. The dark room reflects the fact that we need to use the same wireless medium both to obtain the right to transmit data, which is a form of metadata, and to send the actual data.

      Similar to the rendezvous protocol, random access is an indispensable solution when the devices need to perform an initial access. The objective of the initial access is to connect a device to the base station Basil, potentially going through a process of authentication, allocation of a temporary short address, etc. Clearly, in the case of initial access there are many, potentially infinite, number of devices that can connect, but at a given time only one or very few of them want to do that. After the initial access, the communication can either proceed as a scheduled one or, if the activity of the device is sporadic, rely again on a random access. The latter is typical for scenarios in which a massive number of small Internet of Things (IoT) devices are connected to a base station Basil. However, at a given time only a small subset of them is active; this subset is random and unknown to Basil.

      The context for this discussion is in Section 1.4.3, where we introduced the reservation slots. Looking only at the expression (1.8), we can try to understand in which situation the usage of reservation slots may not lead to an efficient operation. For example, let us take the scenario in which the terminals connected to Basil are not phones, but sensors that monitor certain physical phenomena and only occasionally have data to send.

      In the extreme case there is only images sensor transmitting. Let us fix images and assume that, in a given frame, the probability that a particular sensor has data to send is images. This means that, on average, only images packet comes in a frame from the total population of images sensors. Let then the number of reservation slots be images. Recall that, in the previous chapter we had images, such that each reservation slot was deterministically and exclusively allocated to a single device (sensor). Here we have images, such that an exclusive allocation is not possible. Let us assume that, at the start of the frame, each sensor that has data to send picks randomly one of the images reservation slots and sends a reservation packet. Note that, unlike the case with deterministic allocation of reservation slots from the previous chapter, here Basil cannot know who is the sender unless its address is included in the reservation packet. Although in our example the expected number of sensors with data is images, it can happen, with a significant

Скачать книгу