Connecting the Internet of Things by Anil Kumar & Jafer Hussain & Anthony Chun
Author:Anil Kumar & Jafer Hussain & Anthony Chun
Language: eng
Format: epub
ISBN: 9781484288979
Publisher: Apress
Best Effort Wi-Fi
Wi-Fi is spoken of as a âbest effortâ protocol. What does this mean and how does this affect the user experience for Wi-Fi?
Earlier, we described the advantages of the original Aloha net: a simple approach for sending data from geographically dispersed terminals without the need for a complex and potentially expensive network management capability. If a device has a packet to send, it sends the packet over the shared radio channel and waits for an acknowledgment from the destination that the packet was received correctly; if the acknowledgment is not received over a specified period of time, the device assumes that its packet was affected by a collision with the packet from another device and resends the original packet.
Wi-Fi versions up to Wi-Fi 5 used this âbest effortâ approach called Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA): a device with data to send listens to the shared radio channel to see if any other devices were sending packets and if the channel is clear, it sends its message; if another device is sending data, then wait a random time after the channel clears before sending a message.48
Note that Ethernet LAN uses a similar approach called Carrier Sense Multiple Access with Collision Detection (CSMA-CD). In the case of Ethernet, the device is able to monitor the shared medium and determine if its transmitted packet was affected by the packet from another device in the network.
It is apparent that the âbest effortâ approach, while simple and easy to implement, has limitations compared to a managed network: latency (the time the packet is sent to the time the packet is received correctly at the destination) is variable. This lack of determinism is an issue for time-sensitive applications such as controlling robots and production machinery in factories or augmented reality where data are overlaid on a real-time image. Later we will discuss techniques for mitigating these latency and determinism issues.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(6692)
Robo-Advisor with Python by Aki Ranin(6619)
Offensive Shellcode from Scratch by Rishalin Pillay(5540)
Ego Is the Enemy by Ryan Holiday(4670)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4326)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4011)
Python for ArcGIS Pro by Silas Toms Bill Parker(3633)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3337)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3160)
Speed Up Your Python with Rust by Maxwell Flitton(3115)
Liar's Poker by Michael Lewis(3090)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3089)
Extreme DAX by Michiel Rozema & Henk Vlootman(3061)
Agile Security Operations by Hinne Hettema(3023)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3010)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3007)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2980)
Cryptography Algorithms by Massimo Bertaccini(2892)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2877)
