Wireless Connectivity. Petar Popovski. Читать онлайн. Newlib. NEWLIB.NET

Автор: Petar Popovski
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Техническая литература
Год издания: 0
isbn: 9781119576952
Скачать книгу
rel="nofollow" href="#fb3_img_img_431a6d94-d421-53de-963b-7db20743bd79.png" alt="images"/> is the expected number of sensors that tried to send request in the previous frames, but did not succeed due to collision. If a frame becomes sufficiently long, then we can apply the law of large numbers, by which the expected values can be approximated as the exact values. For this to be true, the random arrival process of the requests from the sensors should satisfy certain conditions, which we will not discuss in detail here. It suffices to say that, for example, Poisson arrivals of requests over a sufficiently long interval would work. Going back to (2.4), we remove the averaging bar and recast the same equation as images. Using the previous analysis on the probability of successful transmission of a request, we can express images, but since images is large, we can write images, which leads to:

      Hence, if Basil uses long frames and applies the law of large numbers, then he can have a good guess at the number of contending sensors and practically choose the reservation frame size images in an optimal way.

      (2.6)equation

      Note that, due to the absence of overhead, here the throughput is equal to the goodput. If we take images, then the throughput is conveniently expressed in packets per slot and we arrive at the well known formula for maximal throughput of a slotted ALOHA system equal to images packets per slot.

      However, what does this theoretical value of the ALOHA throughput mean for a practical system? The randomized protocol coordinates the sensor transmissions, such that each sensor eventually transmits its request successfully. The presented analysis captures the following extreme case: the total population of sensors images is very large, practically infinite, and each new request comes from a new sensor, which also means that each sensor has only one request. Such a hypothetical scenario represents the most difficult case for coordination among the sensors. In the following we provide the reasoning behind the choice of the infinite-size sensor population.

      Instead of images active sensors, each with a single request, we consider images sensors, where each sensor has images packets. The total number of packets to be sent in the system is images, which makes the overall traffic load equal to the case with images single-packet users. The following protocol is run by each sensor. The sensor Zoya applies the framed ALOHA protocol until it successfully sends her first request. After succeeding, Zoya records (a) the number of sensors images that sent their first requests successfully before Zoya, which she learns from Basil's feedback; (b) puts on hold her access until the remaining images sensors have sent their first requests successfully. Note that, after this randomized contention is finalized, Zoya has a unique number images, where images. Since every sensor applies the same protocol, each sensor has a unique token, which is a number between 1 and images. After contending to send the first request and obtaining the token, the images sensors no longer need to contend, but they are served through a TDMA frame with images slots, where, for example, the slot number images is allocated to Zoya. This is reminiscent of the use of random access as a technique for initial access, after which the transmissions are coordinated and scheduled.

      When there are images sensors with a single request each and images goes to infinity, the system throughput is images packets per slot, since the sensors need to contend indefinitely. Let