Wireless Connectivity

Wireless Connectivity
Автор книги: id книги: 1887588     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 8935,13 руб.     (98,94$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Техническая литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119576952 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Wireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play. The latest developments, the 5G, next-generation Wi-Fi and Internet of Things connectivity, are the key enablers for widespread digitalization of practically all industries and public sector segments. This immense development within the last three decades have been accompanied by a large number of ideas, articles, patents, and even myths. This book introduces the most important ideas and concepts in wireless connectivity and discusses how these are interconnected, whilst the mathematical content is kept minimal. The book does not follow the established, linear structure in which one starts from the propagation and channels and then climbs up the protocol layers. The structure is, rather, nonlinear, in an attempt to follow the intuition used when one creates a new technology to solve a certain problem.  The target audience is:  Students in electronics, communication, and networking Wireless engineers that are specialized in one area, but want to know how the whole system works, without going through all the details and math Computer scientists that want to understand the fundamentals of wireless connectivity, the requirements and, most importantly, the limitations Engineers in energy systems, logistics, transport and other vertical sectors that are increasingly reliant on wireless technology

Оглавление

Petar Popovski. Wireless Connectivity

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Wireless Connectivity. An Intuitive and Fundamental Guide

Foreword

Acknowledgments

Acronyms

1 An Easy Introduction to the Shared Wireless Medium

1.1 How to Build a Simple Model for Wireless Communication. 1.1.1 Which Features We Want from the Model

1.1.2 Communication Channel with Collisions

1.1.3 Trade-offs in the Collision Model

1.2 The First Contact

1.2.1 Hierarchy Helps to Establish Contact

1.2.2 Wireless Rendezvous without Help

1.2.3 Rendezvous with Full-Duplex Devices

1.3 Multiple Access with Centralized Control

1.3.1 A Frame for Time Division

1.3.2 Frame Header for Flexible Time Division

1.3.3 A Simple Two-Way System that Works Under the Collision Model

1.3.4 Still Not a Practical TDMA System

1.4 Making TDMA Dynamic. 1.4.1 Circuit-Switched versus Packet-Switched Operation

1.4.2 Dynamic Allocation of Resources to Users

1.4.3 Short Control Packets and the Idea of Reservation

1.4.4 Half-Duplex versus Full-Duplex in TDMA

1.5 Chapter Summary

1.6 Further Reading

1.7 Problems and Reflections

Notes

2 Random Access: How to Talk in Crowded Dark Room

2.1 Framed ALOHA

2.1.1 Randomization that Maximizes the ALOHA Throughput

2.2 Probing

2.2.1 Combining ALOHA and Probing

2.3 Carrier Sensing. 2.3.1 Randomization and Spectrum Sharing

2.3.2 An Idle Slot is Cheap

2.3.3 Feedback to the Transmitter

2.4 Random Access and Multiple Hops

2.4.1 Use of Reservation Packets in Multi-Hop

2.4.2 Multiple Hops and Full-Duplex

2.5 Chapter Summary

2.6 Further Reading

2.7 Problems and Reflections

Note

3 Access Beyond the Collision Model

3.1 Distance Gets into the Model. 3.1.1 Communication Degrades as the Distance Increases

3.1.2 How to Make the Result of a Collision Dependent on the Distance

3.2 Simplified Distance Dependence: A Double Disk Model

3.3 Downlink Communication with the Double Disk Model

3.3.1 A Cautious Example of a Design that Reaches the Limits of the Model

3.4 Uplink Communication with the Double Disk Model

3.4.1 Uplink that Uses Multi-Packet Reception

3.4.2 Buffered Collisions for Future Use

3.4.3 Protocols that Use Packet Fractions

3.5 Unwrapping the Packets

3.6 Chapter Summary

3.7 Further Reading

3.8 Problems and Reflections

Notes

4 The Networking Cake: Layering and Slicing

4.1 Layering for a One-Way Link. 4.1.1 Modules and their Interconnection

4.1.2 Three Important Concepts in Layering

4.1.3 An Example of a Two-Layer System

4.2 Layers and Cross-Layer

4.3 Reliable and Unreliable Service from a Layer

4.4 Black Box Functionality for Different Communication Models

4.5 Standard Layering Models

4.5.1 Connection versus Connectionless

4.5.2 Functionality of the Standard Layers

4.5.3 A Very Brief Look at the Network Layer

4.6 An Alternative Wireless Layering

4.7 Cross-Layer Design for Multiple Hops

4.8 Slicing of the Wireless Communication Resources

4.8.1 Analog, Digital, Sliced

4.8.2 A Primer on Wireless Slicing

4.8.2.1 Orthogonal Wireless Slicing

4.8.2.2 Non-Orthogonal Wireless Slicing

4.9 Chapter Summary

4.10 Further Reading

4.11 Problems and Reflections

Notes

5 Packets Under the Looking Glass: Symbols and Noise

5.1 Compression, Entropy, and Bit

5.1.1 Obtaining Digital Messages by Compression

5.1.2 A Bit of Information

5.2 Baseband Modules of the Communication System

5.2.1 Mapping Bits to Baseband Symbols under Simplifying Assumptions

5.2.2 Challenging the Simplifying Assumptions about the Baseband

5.3 Signal Constellations and Noise. 5.3.1 Constellation Points and Noise Clouds

5.3.2 Constellations with Limited Average Power

5.3.3 Beyond the Simple Setup for Symbol Detection

5.3.4 Signal-to-Noise Ratio (SNR)

5.4 From Bits to Symbols. 5.4.1 Binary Phase Shift Keying (BPSK)

5.4.2 Quaternary Phase Shift Keying (QPSK)

5.4.3 Constellations of Higher Order

5.4.4 Generalized Mapping to Many Symbols

5.5 Symbol-Level Interference Models

5.5.1 Advanced Treatment of Collisions based on a Baseband Model

5.6 Weak and Strong Signals: New Protocol Possibilities

5.6.1 Randomization of Power

5.6.2 Other Goodies from the Baseband Model

5.7 How to Select the Data Rate

5.7.1 A Simple Relation between Packet Errors and Distance

5.7.2 Adaptive Modulation

5.8 Superposition of Baseband Symbols

5.8.1 Broadcast and Non-Orthogonal Access

5.8.2 Unequal Error Protection (UEP)

5.9 Communication with Unknown Channel Coefficients

5.10 Chapter Summary

5.11 Further Reading

5.12 Problems and Reflections

Notes

6 A Mathematical View on a Communication Channel

6.1 A Toy Example: The Pigeon Communication Channel

6.1.1 Specification of a Communication Channel

6.1.2 Comparison of the Information Carrying Capability of Mathematical Channels

6.1.3 Assumptions and Notations

6.2 Analog Channels with Gaussian Noise

6.2.1 Gaussian Channel

6.2.2 Other Analog Channels Based on the Gaussian Channel

6.3 The Channel Definition Depends on Who Knows What

6.4 Using Analog to Create Digital Communication Channels

6.4.1 Creating Digital Channels through Gray Mapping

6.4.2 Creating Digital Channels through Superposition

6.5 Transmission of Packets over Communication Channels

6.5.1 Layering Perspective of the Communication Channels

6.5.2 How to Obtain Throughput that is not Zero

6.5.3 Asynchronous Packets and Transmission of “Nothing”

6.5.4 Packet Transmission over a Ternary Channel

6.6 Chapter Summary

6.7 Further Reading

6.8 Problems and Reflections

Note

7 Coding for Reliable Communication

7.1 Some Coding Ideas for the Binary Symmetric Channel. 7.1.1 A Channel Based on Repetition Coding

7.1.2 Channel Based on Repetition Coding with Erasures

7.1.3 Coding Beyond Repetition

7.1.4 An Illustrative Comparison of the BSC Based Channels

7.2 Generalization of the Coding Idea

7.2.1 Maximum Likelihood (ML) Decoding

7.3 Linear Block Codes for the Binary Symmetric Channel

7.4 Coded Modulation as a Layered Subsystem

7.5 Retransmission as a Supplement to Coding

7.5.1 Full Packet Retransmission

7.5.2 Partial Retransmission and Incremental Redundancy

7.6 Chapter Summary

7.7 Further Reading

7.8 Problems and Reflections

Notes

8 Information-Theoretic View on Wireless Channel Capacity

8.1 It Starts with the Law of Large Numbers

8.2 A Useful Digression into Source Coding

8.3 Perfectly Reliable Communication and Channel Capacity

8.4 Mutual Information and Its Interpretations. 8.4.1 From a Local to a Global Property

8.4.2 Mutual Information in Some Actual Communication Setups

8.5 The Gaussian Channel and the Popular Capacity Formula. 8.5.1 The Concept of Entropy in Analog Channels

8.5.2 The Meaning of “Shannon's Capacity Formula”

8.5.3 Simultaneous Usage of Multiple Gaussian Channels

8.6 Capacity of Fading Channels

8.6.1 Channel State Information Available at the Transmitter

8.6.2 Example: Water Filling for Binary Fading

8.6.3 Water Filling for Continuously Distributed Fading

8.6.4 Fast Fading and Further Remarks on Channel Knowledge

8.6.5 Capacity When the Transmitter Does Not Know the Channel

8.6.5.1 Channel with Binary Inputs and Binary Fading

8.6.5.2 Channels with Gaussian Noise and Fading

8.6.6 Channel Estimation and Knowledge

8.7 Chapter Summary

8.8 Further Reading

8.9 Problems and Reflections

Notes

9 Time and Frequency in Wireless Communications

9.1 Reliable Communication Requires Transmission of Discrete Values

9.2 Communication Through a Waveform: An Example

9.3 Enter the Frequency

9.3.1 Infinitely Long Signals and True Frequency

9.3.2 Bandwidth and Time-Limited Signals

9.3.3 Parallel Communication Channels

9.3.4 How Frequency Affects the Notion of Multiple Access

9.4 Noise and Interference

9.4.1 Signal Power and Gaussian White Noise

9.4.2 Interference between Non-Orthogonal Frequencies

9.5 Power Spectrum and Fourier Transform

9.6 Frequency Channels, Finally

9.6.1 Capacity of a Bandlimited Channel

9.6.2 Capacity and OFDM Transmission

9.6.3 Frequency for Multiple Access and Duplexing

9.7 Code Division and Spread Spectrum. 9.7.1 Sharing Synchronized Resources with Orthogonal Codes

9.7.2 Why Go Through the Trouble of Spreading?

9.7.3 Mimicking the Noise and Covert Communication

9.7.4 Relation to Random Access

9.8 Chapter Summary

9.9 Further Reading

9.10 Problems and Reflections

Notes

10 Space in Wireless Communications

10.1 Communication Range and Coverage Area

10.2 The Myth about Frequencies that Propagate Badly in Free Space

10.3 The World View of an Antenna. 10.3.1 Antenna Directivity

10.3.2 Directivity Changes the Communication Models

10.4 Multipath and Shadowing: Space is Rarely Free

10.5 The Final Missing Link in the Layering Model

10.6 The Time-Frequency Dynamics of the Radio Channel

10.6.1 How a Time-Invariant Channel Distorts the Received Signal

10.6.2 Frequency Selectivity, Multiplexing, and Diversity

10.6.3 Time-Variant Channel Introduces New Frequencies

10.6.4 Combined Time-Frequency Dynamics

10.7 Two Ideas to Deal with Multipath Propagation and Delay Spread

10.7.1 The Wideband Idea: Spread Spectrum and a RAKE Receiver

10.7.2 The Narrowband Idea: OFDM and a Guard Interval

10.8 Statistical Modeling of Wireless Channels

10.8.1 Fading Models: Rayleigh and Some Others

10.8.2 Randomness in the Path Loss

10.9 Reciprocity and How to Use It

10.10 Chapter Summary

10.11 Further Reading

10.12 Problems and Reflections

Notes

11 Using Two, More, or a Massive Number of Antennas

11.1 Assumptions about the Channel Model and the Antennas

11.2 Receiving or Transmitting with a Two-Antenna Device

11.2.1 Receiver with Two Antennas

11.2.2 Using Two Antennas at a Knowledgeable Transmitter

11.2.3 Transmit Diversity

11.3 Introducing MIMO

11.3.1 Spatial Multiplexing

11.4 Multiple Antennas for Spatial Division of Multiple Users

11.4.1 Digital Interference-Free Beams: Zero Forcing

11.4.2 Other Schemes for Precoding and Digital Beamforming

11.5 Beamforming and Spectrum Sharing

11.6 What If the Number of Antennas is Scaled Massively?

11.6.1 The Base Station Knows the Channels Perfectly

11.6.2 The Base Station has to Learn the Channels

11.7 Chapter Summary

11.8 Further Reading

11.9 Problems and Reflections

Notes

12 Wireless Beyond a Link: Connections and Networks

12.1 Wireless Connections with Different Flavors. 12.1.1 Coarse Classification of the Wireless Connections

12.1.2 The Complex, Multidimensional World of Wireless Connectivity

12.2 Fundamental Ideas for Providing Wireless Coverage

12.2.1 Static or Moving Infrastructure

12.2.2 Cells and a Cellular Network

12.2.3 Spatial Reuse

12.2.4 Cells Come in Different Sizes

12.2.5 Two-Way Coverage and Decoupled Access

12.3 No Cell is an Island

12.3.1 Wired and Wireless Backhaul

12.3.2 Wireless One-Way Relaying and the Half-Duplex Loss

12.3.3 Wireless Two-Way Relaying: Reclaiming the Half-Duplex Loss

12.4 Cooperation and Coordination

12.4.1 Artificial Multipath: Treating the BS as Yet Another Antenna

12.4.2 Distributing and Networking the MIMO Concept

12.4.3 Cooperation Through a Wireless Backhaul

12.5 Dissolving the Cells into Clouds and Fog. 12.5.1 The Unattainable Ideal Coverage

12.5.2 The Backhaul Links Must Have a Finite Capacity

12.5.3 Noisy Cooperation with a Finite Backhaul

12.5.4 Access Through Clouds and Fog

12.6 Coping with External Interference and Other Questions about the Radio Spectrum. 12.6.1 Oblivious Rather Than Selfish

12.6.2 License to Control Interference

12.6.3 Spectrum Sharing and Caring

12.6.4 Duty Cycling, Sensing, and Hopping

12.6.5 Beyond the Licensed and Unlicensed and Some Final Words

12.7 Chapter Summary

12.8 Further Reading

12.9 Problems and Reflections

Notes

Bibliography

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Petar Popovski

Department of Electronic Systems

.....

It should be noted that the number of users is a predefined value, not conveyed through the header, such that we must assume it is known by Basil and the devices. Basil acts as a central controller and each header can be treated as a command transmitted from Basil to the devices. By default, each device is in a receive state (recall the hierarchy!) in order to detect the header and it subsequently takes action as instructed by the header.

We first describe how the headers and work. A frame that starts with either of these two headers has a total duration of s. For the example in Figure 1.7(a), it is assumed that . During the link establishment process, a terminal is allocated a number between 1 and 4. Zoya is allocated the slot number 2 and if Zoya detects a header , she expects a downlink packet (of bits) in slot 2 after that header. If Zoya detects , she is allowed to transmit an uplink packet in slot 2. It should be noted that, by system design, after or is sent, then no new header from Basil can arrive within the next s.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Wireless Connectivity
Подняться наверх