Alarm information transmission method for conflict-free random access
A technology of information transmission and random access, applied in wireless communication, advanced technology, climate sustainability, etc., can solve the problem of long delay in the transmission of alarm information, and achieve fast connection, avoid reconnection, and reduce transmission delay. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] This embodiment provides a conflict-free random access alarm information transmission method, such as figure 2 shown, including:
[0044] S1: The cellular system uses the preamble to construct a preamble sequence with a length of X; the cellular system includes M preambles, N detectors and a base station; the number of alarm event levels of each detector is T;
[0045] S2: Establish the mapping relationship between the detector serial number and its alarm event level and the preamble sequence, and transmit the mapping relationship to each detector;
[0046] S3: When the detector detects an alarm event, it records the alarm event level, and randomly selects a preamble to send to the base station;
[0047] S4: After receiving the preamble, the base station sends the first response information to the detector, and authorizes the first uplink time-frequency resource block in the first response information;
[0048] S5: After receiving the first response information, the ...
Embodiment 2
[0054] This embodiment provides a conflict-free random access alarm information transmission method, including:
[0055] S1: The cellular system uses the preamble to construct a preamble sequence with a length of X; the cellular system includes M preambles, N detectors and a base station; the number of alarm event levels of each detector is T;
[0056] The M preambles are orthogonal to each other. Since the preambles are orthogonal to each other, different preamble sequences will not collide, so that collisions can be avoided, and further data collisions will not occur in step S7.
[0057] There is a constraint relationship between the detector, the preamble, the alarm event level and the length of the preamble sequence, and the constraint relationship is:
[0058] M X ≥NT
[0059] In the formula, M represents the number of preambles, X represents the length of the preamble sequence, N represents the number of detectors, and T represents the number of alarm event levels of t...
Embodiment 3
[0075] This embodiment uses specific data to explain an alarm information transmission method for random access without conflict. There is a base station in a cellular system, two orthogonal preambles m 1 , m 2 , 4 detectors, the number of alarm event levels of each detector is 2, and the length of the constructed preamble sequence is 3, that is, M=2, X=3, N=4, T=2; using two orthogonal The preamble constructs a preamble sequence of length 3, then there are 2 3 There are 4 detectors, the number of alarm event levels of each detector is 2, there are 4*2 alarm information, and the preamble sequence and the alarm information are in one-to-one correspondence, the corresponding relationship is as follows Figure 5 As shown, taking the emergency situation of detector 1 and 1 as an example: f(1,1)={m 1 , m 2 , m 3 }, at this time m 1 , m 2 , m 3 both m 1 , then f(1, 1)={m 1 , m 1 , m 1 }.
[0076] In the specific implementation process, the detector detects the alarm even...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


