CN113068207B - Computer network security management method and system based on wireless communication system - Google Patents
Computer network security management method and system based on wireless communication system Download PDFInfo
- Publication number
- CN113068207B CN113068207B CN202110369910.7A CN202110369910A CN113068207B CN 113068207 B CN113068207 B CN 113068207B CN 202110369910 A CN202110369910 A CN 202110369910A CN 113068207 B CN113068207 B CN 113068207B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- base station
- relay mobile
- response
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a computer network security management method based on a wireless communication system, which comprises the following steps: collecting computer network security information by the first mobile terminal and the second mobile terminal; a first mobile terminal sends a request message of a side link communication resource pool to a base station; sending a side link communication resource pool request message to the base station by the second mobile terminal; allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message; allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message; in response to receiving the allocated sidelink communication resource pool, transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool.
Description
Technical Field
The present invention relates to the field of computer security technologies, and in particular, to a computer network security management method and system based on a wireless communication system.
Background
The computer network security means that the confidentiality, integrity and usability of data are protected in a network environment by using network management control and technical measures.
The prior art CN107959690A discloses a software-defined network-based DDoS attack cross-layer cooperative defense method, which aims to solve the problems that the communication pressure of a southbound interface and a control layer is too large and the calculation pressure of an SDN controller is too large. The technical scheme includes that a DDoS attack cross-layer cooperative defense framework based on the SDN and composed of a data layer and a control layer is constructed, the data layer conducts coarse grain detection on data flow to obtain DDoS attack abnormal flow data, and the control layer conducts fine grain detection on the DDoS attack abnormal flow data.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention aims to provide a computer network security management method and system based on a wireless communication system, which can overcome the defects of the prior art.
In order to achieve the above object, the present invention provides a computer network security management method based on a wireless communication system, which is characterized in that the computer network security management method based on the wireless communication system comprises the following steps:
collecting computer network security information by the first mobile terminal and the second mobile terminal;
a first mobile terminal sends a request message of a side link communication resource pool to a base station;
sending a side link communication resource pool request message to the base station by the second mobile terminal;
allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources, if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
sending, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, the base station sends a first MACCE to the relay mobile terminal, wherein the first MACCE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
in response to transmitting the first MACCE to the relay mobile terminal, transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
computer network security information is sent by the relay mobile terminal to the base station over the second coincident set and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
determining, by the relay mobile terminal, whether there is further data to be transmitted to the base station in response to transmitting the computer network security information to the base station on the second conforming set in the first time period;
if the relay mobile terminal judges that data to be sent to the base station exist, the relay mobile terminal sends a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be sent to the base station is smaller than the first threshold and larger than the second threshold, the base station sends a second MACCE to the relay mobile terminal, wherein the second MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the second MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second coincident set and a second set of subcarriers in a second time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than the first threshold and larger than the second threshold, the base station sends a third MACCE to the relay mobile terminal, wherein the third MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the third MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period, wherein the carriers in the third set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the third set of subcarriers in the first time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station judges whether the size of the computer network security information is larger than a second threshold;
if the size of the computer network safety information is judged to be smaller than the second threshold, the base station sends a fourth MACCE to the relay mobile terminal, wherein the fourth MACCE indicates the relay mobile terminal to communicate with the base station at a third subcarrier interval to the relay mobile terminal, and the third subcarrier interval is smaller than the second subcarrier interval;
in response to sending the fourth MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the fourth set of subcarriers in the first time period.
The invention provides a computer network security management system based on a wireless communication system, which is characterized in that the computer network security management system based on the wireless communication system comprises:
means for collecting computer network security information by the first mobile terminal and the second mobile terminal;
means for sending, by a first mobile terminal, a sidelink communication resource pool request message to a base station;
means for sending, by the second mobile terminal, a sidelink communication resource pool request message to the base station;
means for allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
means for allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
means for transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for transmitting, by the second mobile terminal, second sidelink control information to the relay mobile terminal over the first time period and the first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for monitoring, by the second mobile terminal, for sidelink control information sent by other mobile terminals over a second time period in the sidelink communication resource pool and the first set of frequency resources in response to sending the second sidelink control information to the relay mobile terminal over the first time period in the sidelink communication resource pool and the first set of frequency resources;
means for transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for transmitting, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to transmitting the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
means for sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communications resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
means for transmitting, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
means for transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
a unit for sending a first MACCE to the relay mobile terminal by the base station if it is determined that the size of the computer network security information is greater than a first threshold, wherein the first MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a first subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period in response to transmitting the first MACCE to the relay mobile terminal, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station over the second set of coincidences and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on the second conforming set in the first time period;
a unit for transmitting a scheduling request to the base station by the relay mobile terminal if it is determined that there is more data to be transmitted to the base station;
means for transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
means for determining, by the base station, whether a size of the data to be transmitted to the base station is greater than a first threshold in response to receiving the size of the data to be transmitted to the base station;
means for sending, by the base station, a second MACCE to the relay mobile terminal if it is determined that the size of the data to be sent to the base station is less than a first threshold and greater than a second threshold, wherein the second MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period in response to transmitting a second MACCE to the relay mobile terminal, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second set of subcarriers and a second set of symbols in a second time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
means for sending, by the base station, a third MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is less than the first threshold and greater than a second threshold, wherein the third MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period in response to transmitting a third MACCE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the third set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a second threshold in response to receiving the size of the computer network security information;
a unit configured to send, by the base station, a fourth MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is smaller than the second threshold, where the fourth MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, where the third subcarrier interval is smaller than the second subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period in response to transmitting a fourth MACCE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
Compared with the prior art, the invention has the following advantages that the computer network security is more and more emphasized along with the rise and popularization of online shopping, online payment and online banking. It is desirable to have a method and system for collecting and rapidly uploading network security information in real time. Aiming at the requirements of the prior art, the application provides a computer network security management method and system based on a wireless communication system.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention. As shown in the figure, the method of the present invention comprises the steps of:
step 101: collecting computer network security information by the first mobile terminal and the second mobile terminal;
step 102: a first mobile terminal sends a request message of a side link communication resource pool to a base station;
step 103: sending a side link communication resource pool request message to the base station by the second mobile terminal;
step 104: allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
step 105: allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
step 106: in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
step 107: in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
step 108: in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
step 109: transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources, if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
sending, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, the base station sends a first MACCE to the relay mobile terminal, wherein the first MACCE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
in response to transmitting the first MACCE to the relay mobile terminal, transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
computer network security information is sent by the relay mobile terminal to the base station over the second coincident set and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
determining, by the relay mobile terminal, whether there is further data to be transmitted to the base station in response to transmitting the computer network security information to the base station on the second conforming set in the first time period;
if the relay mobile terminal judges that data to be sent to the base station exist, the relay mobile terminal sends a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be sent to the base station is smaller than the first threshold and larger than the second threshold, the base station sends a second MACCE to the relay mobile terminal, wherein the second MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the second MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second coincident set and a second set of subcarriers in a second time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station determines whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than the first threshold and larger than the second threshold, the base station sends a third MACCE to the relay mobile terminal, wherein the third MACCE indicates the relay mobile terminal to communicate with the base station at a second subcarrier interval to the relay mobile terminal, and the second subcarrier interval is smaller than the first subcarrier interval;
in response to sending the third MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period, wherein the carriers in the third set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the third set of subcarriers in the first time period.
In a preferred embodiment, the computer network security management method based on the wireless communication system comprises the following steps:
in response to receiving the size of the computer network security information, the base station judges whether the size of the computer network security information is larger than a second threshold;
if the size of the computer network safety information is judged to be smaller than the second threshold, the base station sends a fourth MACCE to the relay mobile terminal, wherein the fourth MACCE indicates the relay mobile terminal to communicate with the base station at a third subcarrier interval to the relay mobile terminal, and the third subcarrier interval is smaller than the second subcarrier interval;
in response to sending the fourth MACCE to the relay mobile terminal, sending, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
in response to receiving the downlink control information, computer network security information is sent by the relay mobile terminal to the base station on the second coincident set and the fourth set of subcarriers in the first time period.
The invention provides a computer network security management system based on a wireless communication system, which is characterized in that the computer network security management system based on the wireless communication system comprises:
means for collecting computer network security information by the first mobile terminal and the second mobile terminal;
means for sending, by a first mobile terminal, a sidelink communication resource pool request message to a base station;
means for sending, by the second mobile terminal, a sidelink communication resource pool request message to the base station;
means for allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
means for allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
means for transmitting, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for transmitting, by the second mobile terminal, second sidelink control information to the relay mobile terminal over the first time period and the first set of frequency resources in the sidelink communication resource pool in response to receiving the allocated sidelink communication resource pool;
means for monitoring, by the second mobile terminal, for sidelink control information sent by other mobile terminals over a second time period in the sidelink communication resource pool and the first set of frequency resources in response to sending the second sidelink control information to the relay mobile terminal over the first time period in the sidelink communication resource pool and the first set of frequency resources;
means for transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for transmitting, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to transmitting the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
means for sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communications resource pool in response to sending the second sidelink control information to the relay mobile terminal on the second set of frequency resources;
means for transmitting, by the relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
means for transmitting, by the base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
a unit for sending a first MACCE to the relay mobile terminal by the base station if it is determined that the size of the computer network security information is greater than a first threshold, wherein the first MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a first subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a first set of subcarriers in a first time period in response to transmitting the first MACCE to the relay mobile terminal, wherein carriers in the first set of subcarriers have a first subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station over the second set of coincidences and the first set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on the second conforming set in the first time period;
a unit for transmitting a scheduling request to the base station by the relay mobile terminal if it is determined that there is more data to be transmitted to the base station;
means for transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
means for transmitting, by the relay mobile terminal, to the base station, a size of data to be transmitted to the base station in response to receiving the second uplink grant;
means for determining, by the base station, whether a size of the data to be transmitted to the base station is greater than a first threshold in response to receiving the size of the data to be transmitted to the base station;
means for sending, by the base station, a second MACCE to the relay mobile terminal if it is determined that the size of the data to be sent to the base station is less than a first threshold and greater than a second threshold, wherein the second MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a second set of subcarriers in a second time period in response to transmitting a second MACCE to the relay mobile terminal, wherein the carriers in the second set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, data to be transmitted to the base station on a second set of subcarriers and a second set of symbols in a second time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a first threshold in response to receiving the size of the computer network security information;
means for sending, by the base station, a third MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is less than the first threshold and greater than a second threshold, wherein the third MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, wherein the second subcarrier spacing is less than the first subcarrier spacing;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a third set of subcarriers in a first time period in response to transmitting a third MACCE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the third set of subcarriers in the first time period in response to receiving the downlink control information.
In a preferred embodiment, a computer network security management system based on a wireless communication system comprises:
means for determining, by the base station, whether the size of the computer network security information is greater than a second threshold in response to receiving the size of the computer network security information;
a unit configured to send, by the base station, a fourth MACCE to the relay mobile terminal if it is determined that the size of the computer network security information is smaller than the second threshold, where the fourth MACCE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, where the third subcarrier interval is smaller than the second subcarrier interval;
means for transmitting, by the base station, downlink control information to the relay mobile terminal on a first conforming set and a fourth set of subcarriers in a first time period in response to transmitting a fourth MACCE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
means for transmitting, by the relay mobile terminal, computer network security information to the base station on the second coincident set and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.
Claims (4)
1. A computer network security management method based on a wireless communication system is characterized by comprising the following steps:
collecting computer network security information by the first mobile terminal and the second mobile terminal;
a first mobile terminal sends a request message of a side link communication resource pool to a base station;
sending a side link communication resource pool request message to the base station by the second mobile terminal;
allocating, by the base station, a sidelink communication resource pool to the first mobile terminal in response to receiving the sidelink communication resource pool request message;
allocating, by the base station, a sidelink communication resource pool to the second mobile terminal in response to receiving the sidelink communication resource pool request message;
in response to receiving the allocated sidelink communication resource pool, sending, by the first mobile terminal, first sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to receiving the allocated sidelink communication resource pool, sending, by the second mobile terminal, second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool;
in response to sending second sidelink control information to the relay mobile terminal over a first time period and a first set of frequency resources in the sidelink communication resource pool, monitoring, by the second mobile terminal, sidelink control information sent by other mobile terminals over a second time period and a first set of frequency resources in the sidelink communication resource pool;
transmitting, by the second mobile terminal, a repetition of the second sidelink control information to the relay mobile terminal over a third time period in the sidelink communication resource pool and the second set of frequency resources if the sidelink control information transmitted by the first mobile terminal is heard over the second time period in the sidelink communication resource pool and the first set of frequency resources,
sending, by the first mobile terminal, computer network security information to the relay mobile terminal on a first set of frequency resources in a sidelink communications resource pool in response to sending the first sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by the second mobile terminal, computer network security information to the relay mobile terminal on a second set of frequency resources in the sidelink communication resource pool in response to sending the second sidelink control information to the relay mobile terminal on the first set of frequency resources;
sending, by a relay mobile terminal, a scheduling request to the base station in response to receiving the computer network security information;
transmitting, by a base station, a first uplink grant to the relay mobile terminal in response to receiving the scheduling request;
sending, by a relay mobile terminal, a size of the computer network security information to the base station in response to receiving the first uplink grant;
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be larger than a first threshold, sending a first MAC CE to the relay mobile terminal by the base station, wherein the first MAC CE indicates the relay mobile terminal to communicate with the base station at a first subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols and a first set of subcarriers in a first time period, wherein carriers in the first set of subcarriers have a first subcarrier spacing, in response to transmitting a first MAC CE to the relay mobile terminal;
sending, by the relay mobile terminal, the computer network security information to the base station over the second set of symbols and the first set of subcarriers in the first time period in response to receiving the downlink control information.
2. The computer network security management method based on a wireless communication system according to claim 1, wherein the computer network security management method based on a wireless communication system comprises the steps of:
determining, by the relay mobile terminal, whether there is more data to send to the base station in response to sending the computer network security information to the base station on a second set of symbols in a first time period;
if the relay mobile terminal judges that data to be transmitted to the base station exist, the relay mobile terminal transmits a scheduling request to the base station;
transmitting, by the base station, a second uplink grant to the relay mobile terminal in response to receiving the scheduling request;
transmitting, by a relay mobile terminal to the base station, a size of the data to be transmitted to the base station in response to receiving the second uplink grant;
in response to receiving the size of the data to be transmitted to the base station, determining, by the base station, whether the size of the data to be transmitted to the base station is greater than a first threshold;
if the size of the data to be transmitted to the base station is judged to be smaller than a first threshold and larger than a second threshold, transmitting a second MAC CE to the relay mobile terminal by the base station, wherein the second MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier spacing, and the second subcarrier spacing is smaller than the first subcarrier spacing;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols and a second set of subcarriers in a second time period, wherein the carriers in the second set of subcarriers have a second subcarrier spacing, in response to transmitting a second MAC CE to the relay mobile terminal;
transmitting, by the relay mobile terminal, the data to be transmitted to the base station on a second set of symbols and a second set of subcarriers in a second time period in response to receiving the downlink control information.
3. The computer network security management method based on a wireless communication system according to claim 2, wherein the computer network security management method based on a wireless communication system comprises the steps of:
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a first threshold;
if the size of the computer network security information is judged to be smaller than a first threshold and larger than a second threshold, sending a third MAC CE to the relay mobile terminal by the base station, wherein the third MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a second subcarrier interval, and the second subcarrier interval is smaller than the first subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols in a first time period and a third set of subcarriers in response to transmitting a third MAC CE to the relay mobile terminal, wherein carriers in the third set of subcarriers have a second subcarrier spacing;
sending, by the relay mobile terminal, the computer network security information to the base station on the second set of symbols and the third set of subcarriers in the first time period in response to receiving the downlink control information.
4. The computer network security management method based on a wireless communication system according to claim 3, wherein the computer network security management method based on a wireless communication system comprises the steps of:
in response to receiving the size of the computer network security information, judging, by the base station, whether the size of the computer network security information is greater than a second threshold;
if the size of the computer network security information is judged to be smaller than a second threshold, transmitting, by the base station, a fourth MAC CE to the relay mobile terminal, wherein the fourth MAC CE indicates to the relay mobile terminal that the relay mobile terminal should communicate with the base station at a third subcarrier interval, wherein the third subcarrier interval is smaller than the second subcarrier interval;
transmitting, by a base station, downlink control information to the relay mobile terminal on a first set of symbols in a first time period and a fourth set of subcarriers in response to transmitting a fourth MAC CE to the relay mobile terminal, wherein the carriers in the fourth set of subcarriers have a second subcarrier spacing;
sending, by the relay mobile terminal, the computer network security information to the base station on the second set of symbols and the fourth set of subcarriers in the first time period in response to receiving the downlink control information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110369910.7A CN113068207B (en) | 2021-04-07 | 2021-04-07 | Computer network security management method and system based on wireless communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110369910.7A CN113068207B (en) | 2021-04-07 | 2021-04-07 | Computer network security management method and system based on wireless communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113068207A CN113068207A (en) | 2021-07-02 |
CN113068207B true CN113068207B (en) | 2022-01-28 |
Family
ID=76566157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110369910.7A Active CN113068207B (en) | 2021-04-07 | 2021-04-07 | Computer network security management method and system based on wireless communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113068207B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113543344B (en) * | 2021-07-27 | 2022-02-15 | 西安交通大学医学院第一附属医院 | Internet of things-based critical patient information acquisition method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104488244A (en) * | 2013-03-22 | 2015-04-01 | 华为技术有限公司 | Uplink data transmission method and apparatus |
CN110830952A (en) * | 2018-08-10 | 2020-02-21 | 中兴通讯股份有限公司 | Resource allocation method and device for direct link in Internet of vehicles |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017055157A1 (en) * | 2015-10-01 | 2017-04-06 | Sony Corporation | Telecommunications apparatuses and methods |
CN108370561B (en) * | 2015-12-30 | 2021-02-12 | 华为技术有限公司 | Link resource request method, user equipment and base station |
US11665730B2 (en) * | 2017-01-09 | 2023-05-30 | Interdigital Patent Holdings, Inc. | Relay for wireless communication system |
EP3609259A4 (en) * | 2017-05-11 | 2020-04-01 | LG Electronics Inc. -1- | Method and apparatus for allocating sidelink resource using relay ue in wireless communication system |
WO2019136626A1 (en) * | 2018-01-10 | 2019-07-18 | Zte Corporation | Methods, apparatus and systems for device-to-device communications |
CN110381463B (en) * | 2018-04-12 | 2021-02-26 | 维沃移动通信有限公司 | Method and equipment for transmitting sidelink information |
US20200146048A1 (en) * | 2018-11-01 | 2020-05-07 | Lg Electronics Inc. | Deactivation of configured grant |
US11985717B2 (en) * | 2019-02-14 | 2024-05-14 | Lg Electronics Inc. | Handling minimum required communication range in sidelink communication |
CN112367618A (en) * | 2020-10-30 | 2021-02-12 | 南通新飓计算机信息科技有限公司 | Passenger positioning information transmission method and system for intelligent rail transit |
CN112616135A (en) * | 2021-01-11 | 2021-04-06 | 南通新飓计算机信息科技有限公司 | Intelligent building monitoring command transmission method and transmission system based on inter-equipment communication |
-
2021
- 2021-04-07 CN CN202110369910.7A patent/CN113068207B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104488244A (en) * | 2013-03-22 | 2015-04-01 | 华为技术有限公司 | Uplink data transmission method and apparatus |
CN110830952A (en) * | 2018-08-10 | 2020-02-21 | 中兴通讯股份有限公司 | Resource allocation method and device for direct link in Internet of vehicles |
Also Published As
Publication number | Publication date |
---|---|
CN113068207A (en) | 2021-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2879106B1 (en) | Method and system for emergency alerts in a cellular system | |
CN112203336B (en) | Wireless access control method, device and system | |
CN108419290B (en) | Paging monitoring method, device, terminal, base station, system and storage medium | |
EP3780688B1 (en) | Method and apparatus for restricting access of terminal device | |
CN108093089B (en) | Paging monitoring method, device, system and storage medium | |
EP2874367B1 (en) | Call authentication method, device, and system | |
CN113068207B (en) | Computer network security management method and system based on wireless communication system | |
US20230239693A1 (en) | Association control method and related apparatus | |
WO2016019551A1 (en) | Power control method, communication system and related device | |
CN109803456B (en) | Method and device for requesting to recover connection | |
AU2019254040B2 (en) | Method for secure handling of early data transmission | |
CN113099539A (en) | Big data transmission method and system for intelligent mine management | |
WO2017185896A1 (en) | Scheduling information processing and delivering method, device, system, and storage medium | |
CN110087338B (en) | Method and equipment for authenticating narrowband Internet of things | |
CN111314909A (en) | Method and system for transmitting industrial park prevention and control monitoring information | |
CN112953694A (en) | Method for uploading big data to block chain system | |
CN109246847A (en) | Method for network access and system | |
CN106454776B (en) | Pseudo base station protection method and device | |
CN112954674B (en) | Remote data security encryption method and system | |
CN110958637A (en) | Quick response method and system for intelligent cell | |
CN105554727B (en) | Mobile phone card security verification method, mobile phone card security verification device and terminal | |
CN104994225A (en) | Short message sending control method and short message sending control device | |
CN109803260A (en) | Refuse cut-in method, apparatus and system | |
CN110621035A (en) | Beam failure recovery method, base station and user equipment | |
CN113519173B (en) | Wireless device and network node for verifying device class and corresponding method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220429 Address after: 067000 14 / F, xiaerdao Hezi Bida business office building, Shuangqiao District, Chengde City, Hebei Province Patentee after: Chengde North Network Communication Engineering Co.,Ltd. Address before: 067000 No. 2 College Road, Chengde High-tech Industrial Development Zone, Hebei Province Patentee before: Hebei Petroleum University of Technology |
|
TR01 | Transfer of patent right |