Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for guaranteeing transmission quality of security monitoring data in wireless local area network

A technology for data transmission quality and security monitoring, applied in network traffic/resource management, wireless communication, electrical components, etc., can solve problems such as congestion, flow interruption, packet loss, etc., achieve optimal utilization, improve transmission quality, reduce delay and The effect of packet loss rate

Inactive Publication Date: 2010-03-17
北京携远天成技术有限公司
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. The bandwidth of each node of the wireless network based on contention access using DCF cannot be precisely controlled, and different network topologies have a great impact on the network bandwidth, resulting in a wide gap in the bandwidth of each node, and the topology of the wireless security monitoring network depends on specific requirements. Decisions are made in various forms, so the traditional wireless control strategy is not suitable for the engineering implementation of wireless security
[0006] 4. The wireless communication bandwidth is unstable, and the traditional device control strategy cannot intelligently adjust the data communication volume. When the data volume is too large, there will be congestion, flow interruption or packet loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guaranteeing transmission quality of security monitoring data in wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] Such as figure 1 As shown, the method for realizing security monitoring data quality assurance in a wireless local area network includes the following steps:

[0039] 1. After power on, the wireless node completes registration with the AP, and at the same time reports node configuration information to the AP, such as node priority, node total code stream size, etc. The total code stream size of a node refers to the code stream size allowed by the node, that is, the maximum code stream of the node, which can be used for the access point to set the initial bandwidth of each node.

[0040] 2. The AP detects the signal strength of each node, and calculates the peak communication rate of each node during each communication with the node; when setting the bandwidth of each node for the first time, set the node according to the saved node configuration information table and bandwidth configuration strategy. Fixed bandwidth; the variables in the node configuration information table...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for guaranteeing the transmission quality of security monitoring data in a wireless local area network, belonging to the wireless security monitoring field. The methodof the invention comprises the following steps: 1) wireless nodes register at the access point of the wireless device and provide the configuration information containing the priority of the wirelessnodes to the access point of the wireless device; 2) the access point of the wireless device initializes the bandwidth of each wireless node; 3) access point of the wireless device monitors the communication bandwidth of the wireless nodes and the uplink bandwidth of the access point and judges whether the uplink bandwidth is sufficient or not according to the monitoring result; 4) if not, the bandwidth allocation is performed according to the priority of the wireless nodes; and 5) the wireless nodes automatically regulate the data stream according to the obtained bandwidths. Compared with the prior art, the method of the invention optimizes the network resource, reduces the delay and packet loss rate of data transmission and greatly improves the transmission quality of security monitoring data.

Description

Technical field [0001] The invention relates to a method for ensuring the transmission quality of security monitoring data, in particular to a method for ensuring the transmission quality of security monitoring data in a wireless local area network, and belongs to the field of wireless security monitoring. Background technique [0002] With the further popularization of wireless networks, the application of security monitoring systems based on wireless networks has become more and more widespread. Security monitoring data transmission usually has bandwidth, time delay and data loss rate requirements, but the current wireless network with its own uneven bandwidth does not provide the necessary data transmission quality adjustment mechanism for this. It is embodied in the following aspects: [0003] 1. Network bandwidth, that is, the amount of data that the network can transmit per second. The greater the bandwidth, the more data can be transferred. Although the bandwidth of the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/22H04W72/10H04W72/12
Inventor 徐锦林
Owner 北京携远天成技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products