Hybrid media access control method based on collaborative collision decomposition

A conflict resolution and hybrid technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of wasting time slots and unable to eliminate idle time slots

Inactive Publication Date: 2009-04-01
PLA UNIV OF SCI & TECH
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Admittedly, the transmission strategy based on the channel gain value also cannot eliminate the occurrence of idle time slots (that is, all conflicting nodes back off at the same time, resulting in waste of time slots), so it is necessary to select relay nodes to eliminate idle time slots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid media access control method based on collaborative collision decomposition
  • Hybrid media access control method based on collaborative collision decomposition
  • Hybrid media access control method based on collaborative collision decomposition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A hybrid media access control method based on cooperative conflict resolution in a wireless network, the implementation process of which is as follows:

[0066] Step 1: Time-division duplexing is adopted, and the channel is time-slotted. The settings are as follows: the channel is divided into equal-length time slots in time, and the system periodically sends beacon frames. Two adjacent beacon frames construct a superframe. superframe contains time slots, N O Take an integer between 1 and 8. The beacon frame is used for broadcasting system messages, timing and synchronization. Each time slot is set with a listening sub-slot at the head, a confirmation sub-slot at the end, and a transmission sub-slot in the middle. After the listening sub-slot, confirmation sub-slot and transmission sub-slot, a protection sub-slot follows respectively,

[0067] Step 2: The non-competing service node sends the non-competing service data frame by using the time division multiple access ...

Embodiment 2

[0107] The method of the present invention is aimed at the time division duplex system, but it can also be applied to the frequency division duplex system. Example 2 takes Figure 6 As an example, the resolution process of a 6-node conflict is introduced in detail, and the resolution process of conflicts of other numbers is similar.

[0108] The non-competing service node in the method of the present invention adopts the time division multiple access mode, and the system first specifies an allocation time slot with a period of 5 time slots for a non-competition service node, and the allocated time slot number is broadcasted by a beacon frame. Next, consider the transmission process of competing services. First, the competing service node sends a connection request, and the access point allocates an orthogonal pilot sequence to the node, and rejects the node's connection request if the orthogonal pilot sequence has been allocated. Then, the nodes that have established the con...

Embodiment 3

[0146] The performance of the method of the invention is examined here. Assuming that the arrival of data packets of competing service nodes obeys the Poisson distribution, the total arrival rate is λ packet per time slot, which belongs to the fixed rate service, all nodes use the same modulation order, and the competing service nodes and access points have sufficient buffer space. The channel is block fading, that is, the channel state in one time slot is quasi-static, and the channel state in adjacent time slots is irrelevant.

[0147] First define the system throughput, which is defined as the average number of data packets that can be successfully received in a unit time slot. The standard slotted ALOHA throughput is R 时隙ALOHA (λ)=λe -λ .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mixed media access control method of a wireless network. System channels are of time slot, and time slots with fixed cycle are distributed to non-competitive business nodes, non-competitive business data frame is transmitted in the mode of time division multiple access. Competitive business nodes transmit competitive business data frame in the competitive time slots by using the method of random competitive access. After the competitive business data frames conflict, the competitive business nodes send the competitive business data frame again under the condition that the estimated gain value of the channels is more than or equal to a given threshold. Or else the competitive business data is forwarded by a relay node; an access point buffers the signals received before, and realizes the data frame separation by methods of serial interference cancellation and minimum mean-square error detection. At the same time, a superimposed pilot channel estimation method is used by the competitive business data, no additional time slot is needed in the method, thus being convenient for orthogonal design. The method is suitable for the unexpected properties of competitive businesses and the cyclical properties of non-competitive businesses, and the mixed transmission of the two businesses can be supported.

Description

technical field [0001] The invention relates to a medium access control method in a wireless network, in particular to a hybrid medium access control method based on cooperative conflict resolution. Background technique [0002] Media Access Control (MAC) methods with high channel utilization and low overhead have always been one of the important goals in wireless network design. The traditional media access control technologies are Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA). The protocol overhead is low, but they are not suitable for burst services. In order to support bursty traffic, people have developed a variety of random access (RA) technologies, including slotted ALOHA, carrier sense / collision avoidance (CSMA / CA), tree methods (including binary tree method, three-point tree method and first-come-first-served (FCFS) method, etc.) and four-step handshake protocol (RTS-CTS-Data-ACK) and so on....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L45/851
Inventor 潘成康蔡跃明张余杨炜伟徐友云
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products