Check patentability & draft patents in minutes with Patsnap Eureka AI!

Resource Allocation Method for Two-Phase Connectionless Protocol with Conflict Detection

A technology of connectionless protocol and conflict detection, which is applied in the direction of network traffic/resource management, wireless communication, electrical components, etc., can solve problems such as lack, and achieve the effect of less performance loss

Active Publication Date: 2020-06-26
重庆珂荧科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, on the method optimization of TSCLA3, the existing technology is still in a state of deficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource Allocation Method for Two-Phase Connectionless Protocol with Conflict Detection
  • Resource Allocation Method for Two-Phase Connectionless Protocol with Conflict Detection
  • Resource Allocation Method for Two-Phase Connectionless Protocol with Conflict Detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and therefore are only examples, rather than limiting the protection scope of the present invention.

[0035] The method process of the present invention is as figure 1 As shown, the specific steps are as follows:

[0036] S1: Based on the conflict detection function, determine the leading number n of the scheduling request successfully sent in the current access cycle s,SR (i) and the number of time-frequency resource blocks allocated for data transmission R data (i);

[0037] S2: Obtain the number R of time-frequency resource blocks allocated to scheduling requests in the current access cycle and the previous access cycleSR (i) and R SR (i-1);

[0038] S3: According to Determine the number of time-frequency...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a two-stage connectionless protocol resource allocation method with conflict detection, which specifically includes the following steps: S1: Based on the conflict detection function, determine the leading number n of the scheduling request successfully sent in the current access cycle s,SR (i) and the number of time-frequency resource blocks allocated for data transmission R data (i); S2: Obtain the number R of time-frequency resource blocks allocated to scheduling requests in the current access cycle and the previous access cycle SR (i) and R SR (i-1); S3: The number of time-frequency resource blocks allocated to the scheduling request according to the determination of the next access period, where Δ(i)=n s,SR (i)‑R data (i) represents the difference between the number of successfully sent scheduling request preambles in the current access cycle and the number of time-frequency resource blocks allocated for data transmission, Δ(i‑1) represents the difference in the previous access cycle, and i represents the access The serial number of the cycle. The effect is: the complexity of the two-phase connectionless access protocol that needs to feed back the three-state information of the scheduling request is compromised, and the optimal resource allocation without the estimation of the number of users is realized with less performance loss.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a two-stage connectionless protocol resource allocation method with conflict detection. Background technique [0002] Massive machine type communications (mMTC, massive machine type communications) is one of the three typical application scenarios defined by the fifth generation of mobile communications. A massive low-power wide-area coverage technology proposed by the application scenario faces technical challenges such as massive connections, ultra-low power consumption, wide-area coverage and deep coverage, and mutual triggering of signaling and data. When a large number of machine type devices (MTD, machine type devices) enter the network synchronously in a short period of time, their business model will show obvious instantaneous burst characteristics, which will cause severe traffic overload or network congestion on the bearer network, especially when resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/04H04W72/04
CPCH04W28/04H04W72/044H04W72/20
Inventor 简鑫王芳宋健方伟蒋欣谭晓衡曾孝平胡鑫张军会刘宇昊
Owner 重庆珂荧科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More