Wireless connectivity : an intuitive and fundamental guide /
"Providing a holistic overview of the fundamental ideas underlying the interactions between communication layers and cross-layer communications, this book will help specialists in any one of the layers to appreciate the other layers. The information is presented systematically with fundamental...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Foreword xv
- Acknowledgments xix
- Acronyms xxi
- 1 An Easy Introduction to the Shared Wireless Medium 3
- 1.1 How to Build a Simple Model for Wireless Communication 4
- 1.1.1 Which Features We Want from the Model 4
- 1.1.2 Communication Channel with Collisions 4
- 1.1.3 Trade-offs in the Collision Model 7
- 1.2 The First Contact 9
- 1.2.1 Hierarchy Helps to Establish Contact 9
- 1.2.2 Wireless Rendezvous without Help 11
- 1.2.3 Rendezvous with Full-Duplex Devices 12
- 1.3 Multiple Access with Centralized Control 12
- 1.3.1 A Frame for Time Division 13
- 1.3.2 Frame Header for Flexible Time Division 14
- 1.3.3 A Simple Two-Way System that Works Under the Collision Model 15
- 1.3.4 Still Not a Practical TDMA System 18
- 1.4 Making TDMA Dynamic 19
- 1.4.1 Circuit-Switched versus Packet-Switched Operation 19
- 1.4.2 Dynamic Allocation of Resources to Users 20
- 1.4.3 Short Control Packets and the Idea of Reservation 22
- 1.4.4 Half-Duplex versus Full-Duplex in TDMA 24
- 1.5 Chapter Summary 25
- 1.6 Further Reading 25
- 1.7 Problems and Reflections 26
- 2 Random Access: How to Talk in Crowded Dark Room 29
- 2.1 Framed ALOHA 30
- 2.1.1 Randomization that Maximizes the ALOHA Throughput 32
- 2.2 Probing 35
- 2.2.1 Combining ALOHA and Probing 39
- 2.3 Carrier Sensing 39
- 2.3.1 Randomization and Spectrum Sharing 39
- 2.3.2 An Idle Slot is Cheap 41
- 2.3.3 Feedback to the Transmitter 43
- 2.4 Random Access and Multiple Hops 45
- 2.4.1 Use of Reservation Packets in Multi-Hop 47
- 2.4.2 Multiple Hops and Full-Duplex 47
- 2.5 Chapter Summary 48
- 2.6 Further Reading 48
- 2.7 Problems and Reflections 48
- 3 Access Beyond the Collision Model 53
- 3.1 Distance Gets into the Model 53
- 3.1.1 Communication Degrades as the Distance Increases 53
- 3.1.2 How to Make the Result of a Collision Dependent on the Distance 55
- 3.2 Simplified Distance Dependence: A Double Disk Model 57
- 3.3 Downlink Communication with the Double Disk Model 58.
- 3.3.1 A Cautious Example of a Design that Reaches the Limits of the Model 61
- 3.4 Uplink Communication with the Double Disk Model 62
- 3.4.1 Uplink that Uses Multi-Packet Reception 64
- 3.4.2 Buffered Collisions for Future Use 64
- 3.4.3 Protocols that Use Packet Fractions 66
- 3.5 Unwrapping the Packets 68
- 3.6 Chapter Summary 69
- 3.7 Further Reading 70
- 3.8 Problems and Reflections 70
- 4 The Networking Cake: Layering and Slicing 75
- 4.1 Layering for a One-Way Link 75
- 4.1.1 Modules and their Interconnection 75
- 4.1.2 Three Important Concepts in Layering 77
- 4.1.3 An Example of a Two-Layer System 78
- 4.2 Layers and Cross-Layer 79
- 4.3 Reliable and Unreliable Service from a Layer 81
- 4.4 Black Box Functionality for Different Communication Models 84
- 4.5 Standard Layering Models 86
- 4.5.1 Connection versus Connectionless 87
- 4.5.2 Functionality of the Standard Layers 88
- 4.5.3 A Very Brief Look at the Network Layer 89
- 4.6 An Alternative Wireless Layering 91
- 4.7 Cross-Layer Design for Multiple Hops 92
- 4.8 Slicing of the Wireless Communication Resources 94
- 4.8.1 Analog, Digital, Sliced 94
- 4.8.2 A Primer on Wireless Slicing 96
- 4.8.2.1 Orthogonal Wireless Slicing 96
- 4.8.2.2 Non-Orthogonal Wireless Slicing 98
- 4.9 Chapter Summary 100
- 4.10 Further Reading 100
- 4.11 Problems and Reflections 100
- 5 Packets Under the Looking Glass: Symbols and Noise 105
- 5.1 Compression, Entropy, and Bit 105
- 5.1.1 Obtaining Digital Messages by Compression 106
- 5.1.2 A Bit of Information 106
- 5.2 Baseband Modules of the Communication System 107
- 5.2.1 Mapping Bits to Baseband Symbols under Simplifying Assumptions 108
- 5.2.2 Challenging the Simplifying Assumptions about the Baseband 109
- 5.3 Signal Constellations and Noise 110
- 5.3.1 Constellation Points and Noise Clouds 110
- 5.3.2 Constellations with Limited Average Power 113
- 5.3.3 Beyond the Simple Setup for Symbol Detection 114
- 5.3.4 Signal-to-Noise Ratio (SNR) 116.
- 5.4 From Bits to Symbols 117
- 5.4.1 Binary Phase Shift Keying (BPSK) 117
- 5.4.2 Quaternary Phase Shift Keying (QPSK) 118
- 5.4.3 Constellations of Higher Order 119
- 5.4.4 Generalized Mapping to Many Symbols 122
- 5.5 Symbol-Level Interference Models 123
- 5.5.1 Advanced Treatment of Collisions based on a Baseband Model 124
- 5.6 Weak and Strong Signals: New Protocol Possibilities 126
- 5.6.1 Randomization of Power 127
- 5.6.2 Other Goodies from the Baseband Model 129
- 5.7 How to Select the Data Rate 130
- 5.7.1 A Simple Relation between Packet Errors and Distance 130
- 5.7.2 Adaptive Modulation 132
- 5.8 Superposition of Baseband Symbols 134
- 5.8.1 Broadcast and Non-Orthogonal Access 135
- 5.8.2 Unequal Error Protection (UEP) 137
- 5.9 Communication with Unknown Channel Coefficients 138
- 5.10 Chapter Summary 141
- 5.11 Further Reading 142
- 5.12 Problems and Reflections 142
- 6 A Mathematical View on a Communication Channel 147
- 6.1 A Toy Example: The Pigeon Communication Channel 147
- 6.1.1 Specification of a Communication Channel 149
- 6.1.2 Comparison of the Information Carrying Capability of Mathematical Channels 150
- 6.1.3 Assumptions and Notations 151
- 6.2 Analog Channels with Gaussian Noise 151
- 6.2.1 Gaussian Channel 152
- 6.2.2 Other Analog Channels Based on the Gaussian Channel 152
- 6.3 The Channel Definition Depends on Who Knows What 154
- 6.4 Using Analog to Create Digital Communication Channels 158
- 6.4.1 Creating Digital Channels through Gray Mapping 158
- 6.4.2 Creating Digital Channels through Superposition 161
- 6.5 Transmission of Packets over Communication Channels 163
- 6.5.1 Layering Perspective of the Communication Channels 163
- 6.5.2 How to Obtain Throughput that is not Zero 164
- 6.5.3 Asynchronous Packets and Transmission of "Nothing" 167
- 6.5.4 Packet Transmission over a Ternary Channel 169
- 6.6 Chapter Summary 171
- 6.7 Further Reading 171
- 6.8 Problems and Reflections 172
- 7 Coding for Reliable Communication 177.
- 7.1 Some Coding Ideas for the Binary Symmetric Channel 177
- 7.1.1 A Channel Based on Repetition Coding 177
- 7.1.2 Channel Based on Repetition Coding with Erasures 179
- 7.1.3 Coding Beyond Repetition 181
- 7.1.4 An Illustrative Comparison of the BSC Based Channels 182
- 7.2 Generalization of the Coding Idea 183
- 7.2.1 Maximum Likelihood (ML) Decoding 187
- 7.3 Linear Block Codes for the Binary Symmetric Channel 188
- 7.4 Coded Modulation as a Layered Subsystem 192
- 7.5 Retransmission as a Supplement to Coding 194
- 7.5.1 Full Packet Retransmission 195
- 7.5.2 Partial Retransmission and Incremental Redundancy 197
- 7.6 Chapter Summary 199
- 7.7 Further Reading 199
- 7.8 Problems and Reflections 199
- 8 Information-Theoretic View on Wireless Channel Capacity 203
- 8.1 It Starts with the Law of Large Numbers 203
- 8.2 A Useful Digression into Source Coding 204
- 8.3 Perfectly Reliable Communication and Channel Capacity 207
- 8.4 Mutual Information and Its Interpretations 209
- 8.4.1 From a Local to a Global Property 209
- 8.4.2 Mutual Information in Some Actual Communication Setups 211
- 8.5 The Gaussian Channel and the Popular Capacity Formula 214
- 8.5.1 The Concept of Entropy in Analog Channels 214
- 8.5.2 The Meaning of "Shannon's Capacity Formula" 215
- 8.5.3 Simultaneous Usage of Multiple Gaussian Channels 217
- 8.6 Capacity of Fading Channels 219
- 8.6.1 Channel State Information Available at the Transmitter 219
- 8.6.2 Example: Water Filling for Binary Fading 221
- 8.6.3 Water Filling for Continuously Distributed Fading 222
- 8.6.4 Fast Fading and Further Remarks on Channel Knowledge 223
- 8.6.5 Capacity When the Transmitter Does Not Know the Channel 225
- 8.6.5.1 Channel with Binary Inputs and Binary Fading 225
- 8.6.5.2 Channels with Gaussian Noise and Fading 229
- 8.6.6 Channel Estimation and Knowledge 230
- 8.7 Chapter Summary 232
- 8.8 Further Reading 233
- 8.9 Problems and Reflections 233
- 9 Time and Frequency in Wireless Communications 237.
- 9.1 Reliable Communication Requires Transmission of Discrete Values 237
- 9.2 Communication Through a Waveform: An Example 239
- 9.3 Enter the Frequency 242
- 9.3.1 Infinitely Long Signals and True Frequency 242
- 9.3.2 Bandwidth and Time-Limited Signals 245
- 9.3.3 Parallel Communication Channels 247
- 9.3.4 How Frequency Affects the Notion of Multiple Access 248
- 9.4 Noise and Interference 250
- 9.4.1 Signal Power and Gaussian White Noise 250
- 9.4.2 Interference between Non-Orthogonal Frequencies 252
- 9.5 Power Spectrum and Fourier Transform 255
- 9.6 Frequency Channels, Finally 258
- 9.6.1 Capacity of a Bandlimited Channel 259
- 9.6.2 Capacity and OFDM Transmission 261
- 9.6.3 Frequency for Multiple Access and Duplexing 261
- 9.7 Code Division and Spread Spectrum 263
- 9.7.1 Sharing Synchronized Resources with Orthogonal Codes 263
- 9.7.2 Why Go Through the Trouble of Spreading? 265
- 9.7.3 Mimicking the Noise and Covert Communication 268
- 9.7.4 Relation to Random Access 269
- 9.8 Chapter Summary 270
- 9.9 Further Reading 270
- 9.10 Problems and Reflections 270
- 10 Space in Wireless Communications 275
- 10.1 Communication Range and Coverage Area 276
- 10.2 The Myth about Frequencies that Propagate Badly in Free Space 278
- 10.3 The World View of an Antenna 280
- 10.3.1 Antenna Directivity 280
- 10.3.2 Directivity Changes the Communication Models 282
- 10.4 Multipath and Shadowing: Space is Rarely Free 283
- 10.5 The Final Missing Link in the Layering Model 286
- 10.6 The Time-Frequency Dynamics of the Radio Channel 288
- 10.6.1 How a Time-Invariant Channel Distorts the Received Signal 288
- 10.6.2 Frequency Selectivity, Multiplexing, and Diversity 291
- 10.6.3 Time-Variant Channel Introduces New Frequencies 292
- 10.6.4 Combined Time-Frequency Dynamics 295
- 10.7 Two Ideas to Deal with Multipath Propagation and Delay Spread 296
- 10.7.1 The Wideband Idea: Spread Spectrum and a RAKE Receiver 297
- 10.7.2 The Narrowband Idea: OFDM and a Guard Interval 299.
- 10.8 Statistical Modeling of Wireless Channels 300
- 10.8.1 Fading Models: Rayleigh and Some Others 301
- 10.8.2 Randomness in the Path Loss 303
- 10.9 Reciprocity and How to Use It 303
- 10.10 Chapter Summary 305
- 10.11 Further Reading 305
- 10.12 Problems and Reflections 305
- 11 Using Two, More, or a Massive Number of Antennas 309
- 11.1 Assumptions about the Channel Model and the Antennas 310
- 11.2 Receiving or Transmitting with a Two-Antenna Device 311
- 11.2.1 Receiver with Two Antennas 311
- 11.2.2 Using Two Antennas at a Knowledgeable Transmitter 313
- 11.2.3 Transmit Diversity 314
- 11.3 Introducing MIMO 315
- 11.3.1 Spatial Multiplexing 317
- 11.4 Multiple Antennas for Spatial Division of Multiple Users 319
- 11.4.1 Digital Interference-Free Beams: Zero Forcing 320
- 11.4.2 Other Schemes for Precoding and Digital Beamforming 322
- 11.5 Beamforming and Spectrum Sharing 325
- 11.6 What If the Number of Antennas is Scaled Massively? 327
- 11.6.1 The Base Station Knows the Channels Perfectly 328
- 11.6.2 The Base Station has to Learn the Channels 329
- 11.7 Chapter Summary 331
- 11.8 Further Reading 331
- 11.9 Problems and Reflections 331
- 12 Wireless Beyond a Link: Connections and Networks 335
- 12.1 Wireless Connections with Different Flavors 335
- 12.1.1 Coarse Classification of the Wireless Connections 335
- 12.1.2 The Complex, Multidimensional World of Wireless Connectivity 337
- 12.2 Fundamental Ideas for Providing Wireless Coverage 339
- 12.2.1 Static or Moving Infrastructure 340
- 12.2.2 Cells and a Cellular Network 341
- 12.2.3 Spatial Reuse 343
- 12.2.4 Cells Come in Different Sizes 345
- 12.2.5 Two-Way Coverage and Decoupled Access 347
- 12.3 No Cell is an Island 348
- 12.3.1 Wired and Wireless Backhaul 348
- 12.3.2 Wireless One-Way Relaying and the Half-Duplex Loss 349
- 12.3.3 Wireless Two-Way Relaying: Reclaiming the Half-Duplex Loss 351
- 12.4 Cooperation and Coordination 355
- 12.4.1 Artificial Multipath: Treating the BS as Yet Another Antenna 355.
- 12.4.2 Distributing and Networking the MIMO Concept 357
- 12.4.3 Cooperation Through a Wireless Backhaul 359
- 12.5 Dissolving the Cells into Clouds and Fog 360
- 12.5.1 The Unattainable Ideal Coverage 360
- 12.5.2 The Backhaul Links Must Have a Finite Capacity 362
- 12.5.3 Noisy Cooperation with a Finite Backhaul 363
- 12.5.4 Access Through Clouds and Fog 364
- 12.6 Coping with External Interference and Other Questions about the Radio Spectrum 366
- 12.6.1 Oblivious Rather Than Selfish 366
- 12.6.2 License to Control Interference 367
- 12.6.3 Spectrum Sharing and Caring 369
- 12.6.4 Duty Cycling, Sensing, and Hopping 371
- 12.6.5 Beyond the Licensed and Unlicensed and Some Final Words 372
- 12.7 Chapter Summary 374
- 12.8 Further Reading 374
- 12.9 Problems and Reflections 375
- Bibliography 377
- Index 381.