Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access method of opportunistic cognitive multi-carrier link layer protocol

A link layer protocol and access method technology, applied in the access field of opportunistic cognitive multi-carrier link layer protocol, can solve the problem of relatively large fluctuations in the probability of successful channel access

Inactive Publication Date: 2010-06-23
ZHEJIANG UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of designing channel selection and access, the probability of successful channel access fluctuates greatly, and it takes a long time for the user's preferred channel list to become stable. enter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method of opportunistic cognitive multi-carrier link layer protocol
  • Access method of opportunistic cognitive multi-carrier link layer protocol
  • Access method of opportunistic cognitive multi-carrier link layer protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] Such as figure 1 As shown, each unauthorized node has three states, perception, access and transmission, and the three states have fixed time overhead, respectively T s ,T a ,T t . The node first perceives the available channel information, enters the access state after sensing the available channel, and starts to transmit and send data after successfully competing for the channel, otherwise it waits for the next sensing time slot.

[0053] Such as figure 2 As shown, in the process of link negotiation, A and B are a pair of transmitting and receiving nodes, and C is an adjacent node of B. At the perception time T s Within, nodes A and B perceive multiple available idle subcarriers; when node A needs to send data to node B, node A obtains the number of subcarriers that compete for access according to the proportion of business demand is n t . Subsequently, node A selects the largest n according to the Access Probability List (APL) table t Each access subcarrier ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access method of an opportunistic cognitive multi-carrier link layer protocol. Each unauthorized user perceives the using state of the carrier, an initial access probability table is generated according to various user service requirements, the sending and receiving parties choose the access channel to establish links according to the access probability table, and the access probability table is updated according to collision probability initiated in the earlier stage. In addition, the invention provides a time-frequency two-dimensional signaling exchange mode in the link negotiation process, which solves the problem of information asymmetry of the sending and receiving parties and effectively avoids the problem of hidden terminal. By fully utilizing the time-frequency two-dimensional factors, the access method has the advantages that the resources of the system are utilized to a greater degree, the collision frequency is reduced, the success probability of node access is improved, and the access method has good practical value.

Description

technical field [0001] The invention relates to the field of wireless cognitive communication, in particular to an access method of an opportunistic cognitive multi-carrier link layer protocol. Background technique [0002] 802.11DCF (Distributed Coordinate Function) is an access strategy designed on the premise that multiple users share a single channel. The access method is simple and feasible, and is widely used in the 802.11 protocol; when there are When multiple channels are available, the user can use the access mode of OFDMA to access multiple channels to complete the communication. Using multiple channels can achieve higher network throughput than using a single-channel protocol. [0003] The multi-channel link layer access protocol of a single transceiver generally considers that the number of nodes is the same as the number of available channels, and each node only selects one of the channels when competing for channels. At the same time, the sending and receivin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/00H04W48/08H04W76/02H04L27/26
Inventor 李雪娇张朝阳王培雅姜松陈少磊陈晓明张建敏林泽陈淑保王秋芳唐颖
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products