Connecting the Internet of Things by Anil Kumar & Jafer Hussain & Anthony Chun
Author:Anil Kumar & Jafer Hussain & Anthony Chun
Language: eng
Format: epub
ISBN: 9781484288979
Publisher: Apress
Best Effort Wi-Fi
Wi-Fi is spoken of as a âbest effortâ protocol. What does this mean and how does this affect the user experience for Wi-Fi?
Earlier, we described the advantages of the original Aloha net: a simple approach for sending data from geographically dispersed terminals without the need for a complex and potentially expensive network management capability. If a device has a packet to send, it sends the packet over the shared radio channel and waits for an acknowledgment from the destination that the packet was received correctly; if the acknowledgment is not received over a specified period of time, the device assumes that its packet was affected by a collision with the packet from another device and resends the original packet.
Wi-Fi versions up to Wi-Fi 5 used this âbest effortâ approach called Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA): a device with data to send listens to the shared radio channel to see if any other devices were sending packets and if the channel is clear, it sends its message; if another device is sending data, then wait a random time after the channel clears before sending a message.48
Note that Ethernet LAN uses a similar approach called Carrier Sense Multiple Access with Collision Detection (CSMA-CD). In the case of Ethernet, the device is able to monitor the shared medium and determine if its transmitted packet was affected by the packet from another device in the network.
It is apparent that the âbest effortâ approach, while simple and easy to implement, has limitations compared to a managed network: latency (the time the packet is sent to the time the packet is received correctly at the destination) is variable. This lack of determinism is an issue for time-sensitive applications such as controlling robots and production machinery in factories or augmented reality where data are overlaid on a real-time image. Later we will discuss techniques for mitigating these latency and determinism issues.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4131)
Ego Is the Enemy by Ryan Holiday(3991)
Offensive Shellcode from Scratch by Rishalin Pillay(3673)
Exploring Deepfakes by Bryan Lyon and Matt Tora(3261)
Robo-Advisor with Python by Aki Ranin(3044)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(2874)
Speed Up Your Python with Rust by Maxwell Flitton(2852)
Liar's Poker by Michael Lewis(2812)
Agile Security Operations by Hinne Hettema(2806)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(2806)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(2804)
Extreme DAX by Michiel Rozema & Henk Vlootman(2790)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2741)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(2732)
Python for ArcGIS Pro by Silas Toms Bill Parker(2646)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2642)
Cryptography Algorithms by Massimo Bertaccini(2627)
Incident Response Techniques for Ransomware Attacks by Oleg Skulkin(2627)
Distributed .NET with Microsoft Orleans by Bhupesh Guptha Muthiyalu Suneel Kumar Kunani(2627)