To network micro:bits, we use custom micro:bit radio to radio communication. When one hears the word radio, what comes to mind is the radio that blasts out tunes from your favourite radio broadcasting channel. But, a radio, or a radio transceiver (transmitter/receiver), is used in communications to generate and receive radio waves that contain information such as audio, video or digital data. And all micro:bits have built-in radios 1.
Each chapter presents interesting challenges in radio communications and networking with micro:bits. After every few chapters, there's an exciting game to look forward to! In the programming sections, you will use the JavaScript Blocks Editor to develop solutions to overcome those challenges 2.
Writing this book, we have assumed no knowledge of radio communications or networking. However, we assume that you have written programs with a micro:bit. For example, we expect that you are familiar with variables, if-then-else statements, and loops. The activities in each chapter will provide ample opportunity to put this knowledge into practice.
Table of contents
- Communication over Wires
- Wireless and Broadcast Communication
- Group communication
- Game 1: Shakey Donkey
- Unicast communication: One to One
- Two-way unicast
- Game 2: Rock, paper, scissors over the radio
- Handling Errors: Retransmissions
- Handling Errors: Acknowledgements
- Game 3: Battleship over Radio
Pages : | 73 |
Size : | 13.6 MB |
Downloads: | 90 |
Created: | 2022-02-03 |
License: | CC BY-SA |
Author(s): | Cigdem Sengul, Anthony Kir |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about Networking with the Micro:bit
This is an ongoing effort to develop an open-source networking textbook that could be used for an in-depth undergraduate or graduate networking courses.
Download free course An Introduction to Computer Networks, pdf file on 896 pages by by Peter L Dordal.
Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro
Download free course Linux Network Administrator's Guide, pdf file on 507 pages by Olaf Kirch, Terry Dawson.
An Introduction to Computer Networks, a free and open general-purpose computer-networking ..., download free Computer Networks tutorial in PDF (896 pages) created by Peter L Dordal .