Wireless Connectivity. Petar Popovski. Читать онлайн. Newlib. NEWLIB.NET

Автор: Petar Popovski
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Техническая литература
Год издания: 0
isbn: 9781119576952
Скачать книгу
slots. In order to be able to describe any of those allocations, the frame header should contain at least

      additional bits, where images is the maximal possible number of active users in the system. The number images is known in advance and Basil is never expected to admit more than images users. This assumption may look limiting, but is applied in practically all existing wireless systems. For example, some of the existing wireless standards impose that each device has a unique MAC identifier consisting of 48 bits, which means that the system design assumes images.

      The most important implication from the previous discussion is: any flexibility in the allocation of the communication resources corresponds to additional signaling information or metadata that needs to be communicated between the base station and the devices. Thus the flexibility can offer better use of resources, but then the overall correct operation of the protocols becomes more vulnerable to the loss or errors in the metadata.

      In order to make the most of the flexibility offered by the additional signaling bits, Basil should somehow know what is the most appropriate way to allocate the slots to the users in a given frame. For example, in an ideal case, Basil should allocate two slots to Xia only if he is certain that both slots will be filled with data to/from Xia. This is not a problem for downlink traffic from Basil to Xia, as Basil precisely knows how much data there is to send to Xia and can allocate the appropriate number of slots. More precisely, the data that can be allocated in this way should have arrived to the transmit queue of Basil before the header of the actual frame has started, such that the allocation can be announced in the header.

      But, how is this knowledge obtained by Basil? Going back to the analogy with speech, one can think of a conference scenario, in which the chairman (Basil) gives word to the individuals from the audience (devices or terminals). The first difference with the TDMA communication scenario from above is that whenever an individual speaks, not only the chairman but all the people in the audience receive the data. On the contrary, in our setting a mobile device does not communicate directly with another device. Furthermore, there is another difference with the TDMA operation described previously, which is essential for protocol operation. This is the way in which the individuals signal to the chairman whether they have an “uplink traffic”, which can be done by raising a hand or pressing a button. As already mentioned several times, a raised hand or a pressed button represent an additional communication channel. So, we stick to the dark room analogy and ask: how can we imitate the raising of a hand in a dark room in which the only way to communicate is to speak? This question leads to the idea of reservation packets.

      1.4.3 Short Control Packets and the Idea of Reservation