CN104125653B - A kind of cut-in method of terminal ad hoc network - Google Patents

A kind of cut-in method of terminal ad hoc network Download PDF

Info

Publication number
CN104125653B
CN104125653B CN201310146695.XA CN201310146695A CN104125653B CN 104125653 B CN104125653 B CN 104125653B CN 201310146695 A CN201310146695 A CN 201310146695A CN 104125653 B CN104125653 B CN 104125653B
Authority
CN
China
Prior art keywords
priority
terminal
access
signal
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310146695.XA
Other languages
Chinese (zh)
Other versions
CN104125653A (en
Inventor
蒋伯峰
孙鹏
黄其华
郑磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinwei Telecom Technology Inc
Original Assignee
Beijing Xinwei Telecom Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinwei Telecom Technology Inc filed Critical Beijing Xinwei Telecom Technology Inc
Priority to CN201310146695.XA priority Critical patent/CN104125653B/en
Publication of CN104125653A publication Critical patent/CN104125653A/en
Application granted granted Critical
Publication of CN104125653B publication Critical patent/CN104125653B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes a kind of cut-in method of terminal ad hoc network, including:A senders:Access frame detectable signal is sent in the random site of the free timeslot listened to or systemic presupposition position, the signal of other-end is received in other periods of the time slot;If access failure, access is re-initiated after waiting for a period of time at random;If being successfully accessed, take the time slot and send service message.B recipient:The detectable signal of synchronizing information and other-end is received, generates local dynamic routing table;The service message for carrying out other-end is received, judges the information object address for this terminal, then processing locality;If destination address is other-end, the service message is forwarded.

Description

A kind of cut-in method of terminal ad hoc network
Technical field
The present invention relates to wireless communication, more particularly to a kind of cut-in method of terminal ad hoc network.
Background technology
Wireless Mesh technology using 802.X.X as representative is current research hotspot and emphasis, this kind of Wireless Mesh technology Get up for Internet wireless access and application development, its typical case is mainly manifested in city specific region, answers The scenes such as miscellaneous block, buildings are inside and outside, Office Area, in family room and individual periphery.In this application environment, each node is normal For the movement of fixed or low speed, the change of network topology structure is slow, and based on business is accessed with Internet, voice etc. implements business Be in a manner of VoiP based on.On technology is realized, physical layer is identical with PMP, only does the route processing for Mesh in MAC.
In the scene such as tactical communication and rescue and relief work, business often using cluster voice, short data real time multicast service as It is main, and to meet each access point the needs of communicating on the move, therefore the change in topology of network is fast, the business real-time of carrying By force, the covering to single-hop requires high.Existing terminal ad hoc network can not meet the demand.
The content of the invention
The present invention proposes a kind of cut-in method of terminal ad hoc network, includes the following steps:
A senders:
A.1 access frame detectable signal is sent in the random site of the free timeslot listened to or systemic presupposition position, at this Other periods of time slot receive the signal of other-end;
If a.2 access failure, access is re-initiated after waiting for a period of time at random;If being successfully accessed, when taking this Gap sends service message;
B recipient:
B.1 the detectable signal of synchronizing information and other-end is received, generates local dynamic routing table;
B.2 the service message for carrying out other-end is received, judges the information object address for this terminal, then processing locality;If Destination address is other-end, then forwards the service message.
Preferably, a.1 step further includes:If high-priority service, then Gao You is superimposed on access frame signal synchronous head First level business seizes mark;If receiving other-end carries the access frame signal that high-priority service seizes mark, tie Shu Benci is accessed.
Preferably, step a.2 in failure can be:If detecting conflict, find other free timeslots and send again Frame detectable signal is accessed, if detecting conflict twice in succession, then it is assumed that access failure;It is described be successfully accessed for:In the sky Two continuous frames do not detect conflict in idle gap, then it is assumed that are successfully accessed.
Further, detectable signal is further superimposed user identity information;User identifier size and the user of the terminal are excellent First level is consistent;Wherein priority can be User Priority, service priority or service priority and User Priority.
Preferably, b.1 step further includes:Recipient receives from mutually two and above terminal of hidden node each other at the same time Detectable signal when, the relatively low terminal of instruction priority accesses again;The instruction in the relatively low terminal of priority by sending The position of detectable signal, which is sent, avoids indication signal to complete;It can be user identifier extreme higher position 1 wherein to avoid indication signal Detectable signal.
Cut-in method proposed by the present invention avoids access negotiations process, and terminal can be made quickly to seize channel, meets special The high demand of the requirement of real-time that very communicates.
Brief description of the drawings
The resource division of Fig. 1 OFDM/TDMA and physical frame signal schematic representation;
The resource division of Fig. 2 GMSK/TDMA/FDMA and physical frame signal schematic representation;
Fig. 3 accesses frame signal schematic diagram;
Fig. 4 access procedure schematic diagrames;
The application scenarios schematic diagram of Fig. 5 hidden nodes;
Fig. 6 traffic frame form schematic diagrams;
Fig. 7 on-demand routing protocol schematic diagrames.
Embodiment
Below by taking McWiLL terminals as an example, with reference to attached drawing, the specific implementation to the present invention is described in further detail.Should System and method in specific embodiment can support the non-stop layer Real-Time Cluster business that maximum 8 is jumped, and the use in group service Family has priority, 8 jump when group service turn-on time be less than 50mS, propagation delay time is less than 200mS, meets Real-Time Cluster The needs of voice command scheduling call;The non-stop layer real-time Data Transmission for supporting maximum 8 to jump, the access of data service when 8 jump Time is less than 50mS, and unidirectional maximum delay is less than 100mS, and two-way maximum delay is less than 200mS;The non-stop layer for supporting maximum 8 to jump The real-time Transmission of point-to-point voice and video, when 8 jump, transmission delay is less than 200mS.
Ad hoc network terminal can realize two kinds of operating modes of terminal by way of replacing software, i.e. end under McWiLL Node in end and ad hoc network.The replacement of operating mode can be manual mode or automated manner.
First, application scenarios describe
Seek and seek following combat unit field operation commander, emergency repair, field work.Support real-time concentrated speech business, Support short data, picture transfer and data transfer.In the environment of having GPS/DB supports, there is provided mutual positional information, with The form dynamic marked on a map is presented.By the ability of data transfer, entirety situation information is shared.The terminal of ad hoc network, can pass through The form realization of radio network gateway and interconnecting for McWiLL networks.Therefore terminal ad hoc network can regard that McWiLL networks exist as A kind of extension of network edge.
2nd, physical layer
Using 5MHz × 10mS or 1MHz × 10mS as a resource block, this resource block is divided into mutually orthogonal 8 or 4 A independent sub-block.Each independent sub-block is the minimum transfer resource that each terminal is seized in a manner of intercepting competition, and terminal exists After robbing the transfer resource that account for the free time, the information of this terminal is sent.The information of this terminal is the base band code stream that local user produces Plus the base band code stream forwarded for other-end, the code stream of synthesis is eating dishes without rice or wine to send in the form of single user.In view of the road that floods By or part Flood routing use, launch the pattern with broadcast, channel coding is proposed with 1/2 convolutional code.
When selecting 5MHz radio frequency bandwidths, using the modulation system of OFDM, the division of resource block, such a work are carried out with TDMA Mode more stresses meeting the needs of transmission bandwidth.It is as shown in Figure 1 using the resource division of OFDM/TDMA and frame structure.10ms For 1 frame, 1 frame is divided into 8 time slots, and each time slot includes the protection interval and 63uS synchronous heads of 97uS.It is reserved in protection interval 7uS is as transmitting-receiving translation and protection, and 90uS is distance protection, and the distance of 90uS is expected to the needs for meeting 13Km transmission ranges. 8 time slots can be merged into 4 time slots, maximum hop count is 4 at this time.When two time slots merge, load transmittability expands one Times, synchronous head and transmitting-receiving Transition Guard interval become one, and distance protection interval is then expanded to 187uS, corresponding maximum transmitted Distance 28Km.
It is simultaneous based on TDMA progress resource divisions using the GMSK modulation mode of permanent envelope when selecting 1MHz radio frequency bandwidths Care for FDMA.In the case where terminal uses identical power amplifier, transmission power reason of the transmission power than OFDM@5MHz of GMSK@1MHz By above can high 19dB.Using GMSK/TDMA/FDMA resource division and frame structure as shown in Fig. 2, in frame format synchronous head and Load is identical, other are identical with 5MHz.
Ad hoc network can synchronously use three kinds of modes, one is using global positioning system or dipper system(GPS/BD) Synchronize, in it can receive the environment of GPS/BD, by GPS/BD can obtain terminal positional information and system it is exhausted To time reference.It can be synchronized from the pulse per second (PPS) obtained using GPS/BD, while the positional information obtained using GPS/BD, The positional information of collaborators can be presented.Such as fruit product, in design, selection has the DB modules of emission mode, can be with profit With the SMS function of BD, short message communication is carried out in the environment of without other transmission means;Secondly sent using relevant range synchronous When target mode realize the calibration of terminal 10mS time references;The third mode is mutual using the synchronizing signal sent, terminal Between carry out time reference locking.
Terminal is before information is sent, if not receiving the synchronizing signal of other-end, is carried out by oneself local clock The transmission of signal, the synchronizing signal which sends are exactly the kind sub-clock in self-organization network, are received in the net of synchronizing signal Other-end is synchronous with the seed synchronizing signal, it is impossible to directly receives the terminal of the seed synchronizing signal, then receives other-end The synchronizing signal of forwarding is simultaneously synchronized with received signal.
Resource block is split by the way of m-sequence is sent on a timeline, this m-sequence has modulated the information of 2bit, High-priority service is represented respectively to rob and the important information such as frequency pattern sequence number.The signal power of this m-sequence transmitting is high and spreads Gain is big, therefore this m-sequence is with wireless link budget measurement, the whole network broadcast message hair between synchronization, time slot mark, 2 points Send, terminal wakes up, economize on electricity, business is shared, receiver gain adjusts, receiver frequency offset correction, realizes receiver coherent demodulation etc. Function.
The either radio frequency bandwidth of the radio frequency bandwidth of 1MHz or 5MHz, synchronous head are sent with the bandwidth of 1MHz, used Length is 63 m-sequence, a length of 1uS during chip, takes the time of 63uS altogether.The synchronous head of different time-gap uses different m sequences Row, so while synchronous head is searched for, it will also be appreciated that the sequence number of time slot used.On the m-sequence of 63, the superposition of mould two two The m-sequence of a 31 bit length, to using it is synchronous when the 63uS times and power transmission 2bit information, represent respectively:00 Gao You First level business is seized, and receives this mark, and all terminals, which are paused on the time slot taken, sends 2 frames, waits high-priority service Accessed again again after access, continue business after access.01st, 10,11 frequency pattern sequence number is represented.It is not superimposed the letter of this 2bit Breath, then be normal synchronous head.
For the system of 5MHz bandwidth, the transmission power of synchronous head is higher 7dB than the power of Traffic Channel, the m of 63 bit lengths Sequence de-spreading gain is up to 18dB, and the link budget of synchronous head is penetrated than the link budget of Traffic Channel using 5MHz theoretically High 25dB is wanted during bandwidth, high 18dB is wanted when using 1MHz radio frequency bandwidths.Link budget measurement is carried out using synchronous head, is being adopted Isolation more than identical services time slot 20dB can be measured during with 5MHz radio frequency bandwidths, can be surveyed when using 1M radio frequency bandwidths To the isolation of more than 15dB.There is the measurement result of identical services time slot isolation, it is possible to multiplexing time slot.It was initially believed that adopt With the modulation scheme of OFDM, to reach the ability of transmission 16QAM, it is necessary to the isolation of 20db, and GMSK needs the isolation of 15dB Degree.
The power saving design of terminal, when no signal needs to send in a network, terminal is in sleep state, before only having at this time The low noise work at end, if transmitting a signal to for other-end is come, the signal of low noise output can be higher than some threshold value, Using this status signal, wake up terminal and received and completed other relevant operations.If it exceeds regular hour terminal Do not wake up, then terminal can wake up according to the timing of oneself, and the interval of timing can need to carry out according to different Set.Terminal will receive the signal of GPS/BD after being waken up, and carry out location updating and clock alignment.
In not enough power supply, the transmission power of this nodal terminal can be reduced.Transmission power is reduced equivalent to have adjusted road Measured by the link budget of most critical in table, network can reduce the portfolio for needing the node to forward automatically according to route, also generation Table has other nodes in network to share energy, achievees the purpose that the whole network balancing energy.Point-to-point transmission link in routing table Quality, should select high-order modulating as far as possible, so in the case where transmission power is constant, when shortening communication as far as possible Between.
Therefore, synchronous head is with wireless link budget measurement, the whole network broadcast message hair between synchronization, time slot mark, 2 points Send, terminal wakes up, economize on electricity business shares this six major functions.It is, of course, also possible to synchronous head adjusts receiver gain, has realized Into receiver frequency offset correction, coherent demodulation of receiver etc. is realized.
3rd, terminal access procedure
In order to reach the requirement of 50mS business fast speed access systems, terminal is devised while receiving, is directly judged empty Not busy frame, is judged as the time slot of idle frame in terminal, directly transmits the spreading code sequence for carrying user identifier or avoiding mark, Since spread spectrum sequence has very high spreading gain, can accurately and conveniently be detected in the Business Stream of normal communication, And there is the link budget more much higher than normal communications traffic, the scope of bigger can be detected, so as to ensure what is quickly accessed Solve the problems, such as hidden terminal in self-organization network at the same time.
The terminal accessed is needed, is known which time slot is idle when 10mS complete signals are received.In the case where connecing Access frame is sent at the free timeslot of the next 10mS frames come, access frame signal schematic diagram is as shown in Figure 3.Frame is accessed random Position(The angle that the random site simplifies from Project Realization, can define 8 fixed time points, when realizing only this 8 Random probing is carried out on a regular time point)Upper transmission collision detection signal, collision detection signal duration 64uS, using m sequences The mode of row mould two plus Walsh codes, designs 64 bit lengths, and 8 × 8 Walsh carries the user identity information of 1 byte.So receive Side is known that this time slot of what user occupancy of what time slot, is carried for dynamic routing after synchronizing signal, detectable signal is received For routeing required relevant information.The identification information of user takes 7bit, if by the extreme higher position 1 in 1 byte, is having Each other avoidance instruction is accessed to be used for doing in the scene of hidden node.
The access procedure of terminal is as shown in Figure 4.The detectable signal duration 64uS of frame is accessed, only accounts for the one of a time slot very little Part, on the period that the time slot is not sent, receives the signal of other-end, is determined whether according to the situation for receiving signal Access interference, if it find that there is access interference(It has received the collision detection signal of other-end transmission)Show to be accessed Collision, continues to, and finds other free timeslots.If not detecting access interference, connect in next 10mS after supervention Enter frame, the detectable signal in this access frame equally randomly generates.If having detected collision, free timeslot is continually looked for, Repeat access procedure.If there is collision twice in succession, it is believed that access failure, waits for a period of time accessed again at random.Such as The access frame of fruit twice in succession does not detect collision, then it is assumed that can normally take the time slot, be successfully accessed.If always The time slot of free time cannot be found, then it is assumed that network is in full load condition, this thing receives 10mS always if general business Frame, until finding idle frame.If high-priority service, then high-priority service is superimposed on synchronous head and seizes mark, into Row high priority seizes access.Conflict probe signal is different according to the design requirement of product, can also use the side of frequency spreading code division Formula is sent.
It is as shown in Figure 5 for the application scenarios schematic diagram of hidden node each other.Node A and node the B phase due to landform The signal of other side can not be received between mutually, our node A and node B are referred to as mutual hidden node at this time.But node A and section Point B has good wireless signal transmission passage with node C, at this time if node A and node B are enterprising in identical time slot respectively Row access, this time slot are accessed without other nodes again, it may appear that node A and node B can be accessed normally, but actually two nodes The signal sent respectively can collide at node C, cause node C to be properly received and forwarding information.Node C is being received Node A and node B is respectively after the access frame that same time slot is sent, it should can receive two detectable signals, node C can at this time With the priority ranking according to user identifier, indicate that the user of low priority accesses again.The method of operation is that node C is in A, B The next frame for the time slot that two nodes are chosen at the same time, sends the position of detectable signal in the terminal to be avoided, sends and avoid instruction Signal, it is by the detectable signal for up to putting 1 in user identifier to avoid indication signal.The low node of priority, conflicts doing The avoidance indication signal of node C transmissions can be received during detection, low priority user reselects free timeslot and is accessed at this time, High-priority users then normally access.If the quantity of mutual hidden node is more than two, by same processing method.
4th, network routing Design thinking
The core of network route is to establish the dynamic routing table that a similar MAC table is maintained with dynamic, dynamic routing table Mutual transmission renewal can be carried out, in the state of network underloading to make the dynamic routing table on single-point as far as possible The dynamic routing table of the whole network state can be reflected by improving into.The visual use environment setting of frequency of renewal.
Dynamic routing table includes the physical identification number of node, to the network of maximum 120 nodes, can use 1 byte (8)To identify, this mark is the unique identifying number of physical node in network.Wherein 8~127 this 120 user identifiers are given Using user, 0~7 this 8 be identified as system special identifier, represent different cluster groups.User identifier is suitable by from small to large Sequence arranges priority, and 00H represents limit priority cluster group, and 08H represents highest priority user.
Routing table calculates mutual distance according to the longitude and latitude position of GPS/BD each terminal measured, can be with According to the intensity for receiving synchronous head signal, mutual link budget is calculated, there is mutual position, it is particularly mutual Between link budget, physics route algorithm just have basis.To the section of not mutual position and link budget data Point, can only use the most simple and sane algorithm that floods, i.e., by received signal broadcast transmission.
Routing table is 128 × 128 matrix, each element is used for describing link state in matrix, and the state is by connecing The power for receiving synchronizing signal judges, is described using 4 bytes.It is wherein two high:00 represents no measured value, and 01 represents link shape State is poor, and 10 represent that link state is good, and 11 represent that link state is outstanding;Low two are temporarily reserved bit.First sketch on diagonal The state of this node is stated, including:Busy-idle condition, routing table dynamic more new record.Busy therein can be from each nodal cache Situation reflect.Real-Time Cluster business is high-priority service, and system design, which has, supports 8 groups of concurrent abilities, Mei Gejie Point is not in the case where transmitting other messaging services(Or pause sends storage forwarding class business), it is ensured that group service It is unobstructed.
The business frame format of ad hoc network frame head and load two parts as shown in fig. 6, be made of.Frame head includes:The source of 7bit User identifier, targeted customer's mark of 7bit, the type of service of 2bit and the transmission frame number record of 3bit.The service identification of 2bit Respectively:00 represents group service, and 01 represents single call service, and 10 represent video traffic, and 11 represent data service.In group service In, 0~7 represents 8 different cluster groups in targeted customer's mark.The frame number of 3bit has two effects, one is eliminating network On the flooding that is likely to occur.When receiving node repeatedly receives the transmission frame of same forwarding, i.e., with identical original subscriber's mark, Identical targeted customer's mark, then show the transmission time jumped in maximum 8(80mS)Inside there are duplicate packages, the duplicate packages that will be received Abandon.The second is realize the business packet sequencing of destination node.In self-organization network, there are different business packets to walk different transmission roads The situation in footpath, causes destination node received data packet out of order, sets the frame count of 3bit, can equivalent to a Buffer has been To utilize the order of this Buffer adjustment received data packets.
The route of group service after that is, terminal receives, is identified, to one's name using the simple method that floods according to cluster group Group business, voice packet is taken off, hands to local vocoder also original sound.It is not belonging to the cluster bag of oneself group, forwarding. Design supports that 8 speech businesses are concurrent, disclosure satisfy that all groups work at the same time.
When multiple users independently initiate PTT from the mutual network without direct radio path to seize(It is almost same When), each receiving node can receive multiple same group of group service bags from not homologous address, and each node is by limit priority by industry Business takes out and is reduced into sound.The user seized to carrying out PTT, while seizing, can also receive other users and send Same group of PTT service bag, press and receive source node node identification number compared with this section, if receiving same group less than this node Information, continues PTT originating traffics.If receiving the same group of group service higher than this node, using sound or vibrations or The mode of word reminds the user traffic access of this group of high priority, and operator should unclamp PTT keys at this time, releases PTT hairs Speech phase, into paying attention to the class state.
When node has received high priority bank, equally should using have prompting or without prompting by the way of, be directly entered height Priority group pays attention to the class state.
The routing mode that the route of data service is aided in using local node.According to the purpose in the received data packet of terminal Address, determines whether to be sent to the data of this node, if so, just taking off data packet, no longer forwards.If it is not, will Decide whether to forward according to the routing table of this node.It can find whether have with destination node can from the routing table of this node With the link of arrival, if so, then on behalf of forwarding.If it is not, can according to the busy-idle condition of this node, decide whether with The mode to flood is sent out, not busy then send out, busy then do not send out.The busy-idle condition of this node can be according to the situation of this node Dai Fa data queues It is fixed.Sky is the spare time, and it is busy to have queuing.
To point-to-point speech business and video traffic, the routing mode of the above can be used, on-demand routing can also be used, On-demand routing protocol schematic diagram is as shown in Figure 7.There is a dialing before business initiation to point-to-point speech business and video traffic Process, using the process of dialing by the way of flooding to destination node send route request information.Destination node is receiving After route request information, according to the routing condition recorded in route request information, optimal route is selected in a plurality of route.Choosing Fixed Optimization route message returns to origin node by destination node again, and business packet afterwards is transmitted by this route.
Routing algorithm is the algorithm that present node participates in.The present nodes such as the state of user, service priority, type of service All it is known that and these information do not change generally in Web vector graphic, or the frequency frequency of change is very low, sharp to greatest extent With these information and the dynamic routing table of present node is combined, just can optimize route.
Terminal data business external interface uses the Ethernet interface and Ethernet protocol of standard, and IP agreement is realized in terminal Agency.
System and method proposed by the present invention have carried out special design in physical layer, especially make full use of synchronous head to believe Number synchronization, time slot mark, wireless link budget measurement between 2 points, the whole network broadcast message is sent, terminal wakes up, economize on electricity, business Share this six major functions.It is, of course, also possible to synchronous head adjustment receiver gain, realization complete receiver frequency offset correction, it is real Coherent demodulation of existing receiver etc..Synchronous head uses long sequence spread spectrum code, its link budget is far above service transmission channel, therefore Can be more succinct solve the problems, such as hidden terminal in self-organization network.
The special designing of physical layer makes system easily to be obtained comprising inter-node link quality during work Routing table, coordinate the routing table message in cycle, compared with other systems design, specific by physical layer synchronization head sets Meter, can obtain the network routing table of the whole network, so as to solve with network size to increase in self-organization network with low-down network cost Add, the problem of efficiency drastically declines.
On the basis of tentatively network routing table is established, system can effectively solve cluster and data multicast service is using Flood algorithm when the problem of flooding so that system still can be very good to support real-time industry in the case of larger network size Business.To point-to-point service, due to that there are a routing table, existing achievement in research can be utilized, effectively optimize the performance of network.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should all be included in the protection scope of the present invention.

Claims (15)

1. a kind of cut-in method of terminal ad hoc network, it is characterised in that include the following steps:
A senders:
A.1 access frame detectable signal is sent in the random site of the free timeslot listened to or systemic presupposition position, in the time slot Other periods receive other-end signal;
If a.2 access failure, access is re-initiated after waiting for a period of time at random;If being successfully accessed, time slot hair is taken Send service message;
B recipient:
B.1 the detectable signal of synchronizing information and other-end is received, generates local dynamic routing table;
B.2 the service message for carrying out other-end is received, judges the service message destination address for this terminal, then processing locality; If destination address is other-end, the service message is forwarded.
2. according to the method described in claim 1, it is characterized in that, a.1 the step further comprises:If high priority industry Business, then superposition high-priority service seizes mark on access frame signal synchronous head;If receiving other-end carries Gao You First level business seizes the access frame signal of mark, then terminates this access.
3. according to the method described in claim 1, it is characterized in that step a.2, the access failure is:If detecting conflict, Then find other free timeslots and send access frame detectable signal again, if detecting conflict twice in succession, then it is assumed that access is lost Lose;It is described be successfully accessed for:Two continuous frames do not detect conflict on the free timeslot, then it is assumed that are successfully accessed.
4. according to the method described in claim 1, it is characterized in that, the detectable signal is further superimposed user identity information.
5. the according to the method described in claim 4, it is characterized in that, User Priority of the user identifier size and the terminal Unanimously.
6. according to the method described in claim 1, it is characterized in that, b.1 the step further comprises:Recipient receives at the same time From mutually each other the detectable signal of two of hidden node and the above terminal when, the relatively low terminal of instruction priority accesses again.
7. according to the method described in claim 6, it is characterized in that, the instruction is visited by being sent in the relatively low terminal of priority The position for surveying signal sends avoidance indication signal to complete.
8. the method according to the description of claim 7 is characterized in that the avoidance indication signal is user identifier extreme higher position 1 Detectable signal.
9. according to the method described in claim 6, it is characterized in that, the priority be User Priority or service priority, Or service priority and User Priority.
10. according to the method described in claim 9, it is characterized in that, recipient compares service priority first, if business is preferential Level is identical to compare User Priority again;Or, recipient compares User Priority first, if User Priority is identical to compare business again Priority.
11. according to the method described in claims 1 to 10 any one, it is characterised in that the terminal is SCDMA terminals, with 5MHz × 10mS or 1MHz × 10mS is a resource block, and each resource block is divided into the independent son of mutually orthogonal 8 or 4 again Block, each independent sub-block are the minimum transfer resource that terminal is seized.
12. according to the method for claim 11, it is characterised in that this method further includes:Resource division is carried out using TDMA: 10ms is 1 frame, and 1 frame includes 8 time slots, and each time slot includes the protection interval and 63uS synchronous heads of 97uS;Or, 1 frame include 4 Time slot, each time slot include the protection interval and 63uS synchronous heads of 187uS.
13. according to the method for claim 12, it is characterised in that the synchronous head is made of the m-sequence of 63 bit lengths, Different time-gap uses 63 different bit length m-sequences.
14. according to the method for claim 13, it is characterised in that the synchronous head further comprises:In the m sequences of 63 bit lengths The m-sequence that 2 31 bit lengths are superimposed on row transmits 2 bit informations, is respectively used to instruction high-priority service and seizes and frequency pattern Sequence number.
15. according to the method for claim 12, it is characterised in that the detectable signal duration 64uS, is superimposed using m-sequence The mode of Walsh codes, Walsh codes carry user identity information.
CN201310146695.XA 2013-04-25 2013-04-25 A kind of cut-in method of terminal ad hoc network Expired - Fee Related CN104125653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310146695.XA CN104125653B (en) 2013-04-25 2013-04-25 A kind of cut-in method of terminal ad hoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310146695.XA CN104125653B (en) 2013-04-25 2013-04-25 A kind of cut-in method of terminal ad hoc network

Publications (2)

Publication Number Publication Date
CN104125653A CN104125653A (en) 2014-10-29
CN104125653B true CN104125653B (en) 2018-05-11

Family

ID=51770882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310146695.XA Expired - Fee Related CN104125653B (en) 2013-04-25 2013-04-25 A kind of cut-in method of terminal ad hoc network

Country Status (1)

Country Link
CN (1) CN104125653B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899942B (en) * 2015-12-18 2020-02-14 北京信威通信技术股份有限公司 Control method for broadcast information cycle transmission
CN111757532B (en) * 2019-03-27 2022-08-30 大唐移动通信设备有限公司 Method, device and node for detecting and resolving synchronous channel conflict of wireless ad hoc network
CN111953441B (en) * 2019-05-15 2021-09-10 大唐移动通信设备有限公司 Synchronization method and device
CN113055133B (en) * 2021-03-11 2022-10-14 宸芯科技有限公司 Hybrid automatic repeat request HARQ response method, device, equipment and medium
CN116249077B (en) * 2023-02-27 2023-10-20 北京云智软通信息技术有限公司 Method and device for acquiring communication routing state of working group member

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717879A (en) * 2002-10-25 2006-01-04 哈里公司 Method and device for establishing links in an ad hoc wireless system
CN101137230A (en) * 2007-09-30 2008-03-05 东南大学 Time-division synchronous CDMA and mobile self-organizing network combined dual-busy tone media access method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7580394B2 (en) * 2002-11-27 2009-08-25 Nokia Corporation System and method for collision-free transmission scheduling in a network
US7729321B2 (en) * 2007-02-21 2010-06-01 Itt Manufacturing Enterprises Inc. Nearly collision-free channel access system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717879A (en) * 2002-10-25 2006-01-04 哈里公司 Method and device for establishing links in an ad hoc wireless system
CN101137230A (en) * 2007-09-30 2008-03-05 东南大学 Time-division synchronous CDMA and mobile self-organizing network combined dual-busy tone media access method

Also Published As

Publication number Publication date
CN104125653A (en) 2014-10-29

Similar Documents

Publication Publication Date Title
CN104125617B (en) A kind of system and method for mobile terminal ad hoc network
CN104125619B (en) A kind of method for routing of terminal ad hoc network
Parkvall et al. 5G NR release 16: Start of the 5G evolution
Rajendran et al. Energy-efficient, application-aware medium access for sensor networks
JP4219809B2 (en) Network with several sub-networks
CN101616479B (en) The method and apparatus that time synchronized is carried out in TDMA multi-hop wireless networks
KR100695074B1 (en) Time synchronizing method in wireless sensor networks
CN104125653B (en) A kind of cut-in method of terminal ad hoc network
CN110167099A (en) A kind of Ad Hoc suitable for narrowband condition is by method and system
CN106535207B (en) One kind miniaturization multi-service wireless ad hoc network system
KR101303649B1 (en) Method of multi-hop communication based on distributed medium access control
CN101247339B (en) Method for centralized resource reservation management in mobile wireless sensor network
JP5366920B2 (en) Wireless communication system, wireless communication method, and wireless communication program
CN102386991B (en) Timeslot interchange operating method for time division multiple address access system in wireless mobile self-organized network
CN102572907A (en) Wireless communication mode of industrial information corridor
CN108289051A (en) The method for carrying out sequential scheduling in the mesh network
CN101247156B (en) Data synchronization implementing method
WO2013183020A1 (en) Method of transmission between nodes of a manet communication network operating on an hf band with tdma sharing of the radio channel
US10742260B2 (en) Synchronizing unicast traffic
CN1889561B (en) Synchronous and asynchronous MAC protocol smooth transient method in distributing network
Kim et al. Latency bounded and energy efficient MAC for wireless sensor networks
Mohamadi et al. Performance evaluation of TSCH-minimal and orchestra scheduling in IEEE 802.15. 4e networks
Li et al. Research on medium access control of mobile ad hoc network based on frequency hopping communication
CN101601324A (en) Wireless non-cellular network
Vattikuti et al. Towards bandwidth efficient TDMA frame structure for voice traffic in MANETs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20191121

Granted publication date: 20180511

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20200710

Granted publication date: 20180511

PD01 Discharge of preservation of patent
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180511

Termination date: 20200425

CF01 Termination of patent right due to non-payment of annual fee