CN101541043B - Method for ensuring reliability of 802.16MAC layer supporting service differentiation - Google Patents

Method for ensuring reliability of 802.16MAC layer supporting service differentiation Download PDF

Info

Publication number
CN101541043B
CN101541043B CN2009101036387A CN200910103638A CN101541043B CN 101541043 B CN101541043 B CN 101541043B CN 2009101036387 A CN2009101036387 A CN 2009101036387A CN 200910103638 A CN200910103638 A CN 200910103638A CN 101541043 B CN101541043 B CN 101541043B
Authority
CN
China
Prior art keywords
data
ack
slot
mini
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009101036387A
Other languages
Chinese (zh)
Other versions
CN101541043A (en
Inventor
李云
魏登宇
刘占军
刘期烈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN2009101036387A priority Critical patent/CN101541043B/en
Publication of CN101541043A publication Critical patent/CN101541043A/en
Application granted granted Critical
Publication of CN101541043B publication Critical patent/CN101541043B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for ensuring the reliability of an 802.16MAC layer supporting service differentiation in a demanding protection way, relating to the field of communication. The invention adopts the technical proposal as follows: the service type is determined as a real time service or a non-real time service according to a connection identifier; three-time handshake process stipulated by IEEE802.16 protocol is executed to the tolerable real time service with time delay t less than time delay t ACK caused by data validation; and improved three-way handshake process is executed to the tolerable real time service or non-real time service with the time delay t more than the time delay t ACK caused by data validation, and received data is validated. The method can conduct data validation according to the service type, thus ensuring the reliability of data, reducing the error rate, improving the network throughput, and promoting the development and application of wireless Mesh network technology.

Description

The 802.16MAC layer method for ensuring reliability that supporting business is distinguished
Technical field
The present invention relates to the communications field, relate in particular to 802.16 MAC layer working method.
Background technology
Along with wireless Internet fast development in the world, and the increase of types of network services and user be to the growth of bandwidth demand, and wireless access wide band technology becomes the focus that people pay close attention to, and has become the main flow of communication industry.The MAC layer of IEEE 802.16 is supported 2 kinds of network topology modes: traditional point-to-multipoint (PMP) pattern and netted (Mesh) pattern.
The PMP pattern is the principal mode of wireless access, adopts time division broadcast (TDM) mode to carry out transfer of data at down link, and the mode that adopts multiple access (DAMA) as required to combine with TDMA or OFDM in up link.PMP pattern and at present cellular communication system such as gsm system, 3-G (Generation Three mobile communication system) are similar, employing be centralized control mechanism, each base station (BS) is responsible for the communication of all subscriber stations (SS) in a sub-district.In the PMP pattern, business is divided into four types: unsolicited grant service (UGS), real-time polling service (rtPS), non-real-time polling service (nrtPS) and Best-Effort service (BE), and defined comparatively complete QoS mechanism.
The Mesh pattern is for the physical environment that adapts to 2 ~ 11GHz frequency range and different business demand and a kind of structure that designs, it occurs with the form of mobile Ad hoc peer-to-peer network, can constitute multi-hop wireless network transmission data on a small scale between the subscriber station (SS), not need the centralized control of BS.Satisfy in the military communication for broadband data transmission, support end-to-end IP, support voice and video information, support not to adopt GPS but can reach the positioning requirements of corresponding accuracy equally.Robustness, flexibility and high speed data transfers are the key characters of Mesh pattern.The Mesh pattern can provide sufficiently high message transmission rate simultaneously by jumping through a series of intermediate nodes so that long end-to-end communication distance to be provided.Compare to the distance between the receiving terminal with transmitting terminal, distance between each node (every jumping) is shorter relatively, each jumping can be finished the message transmission rate more much higher than direct communication, can support high data rate equally thereby make in the end-to-end communication system of long distance.In the Mesh pattern, each node only need transmit very short distance, and transmitted power is less relatively, thereby greatly reduces intrasystem interference and make more crypto set of channeling.In addition, transmit data owing to can jump through intermediate node, the Mesh pattern make signal can the cut-through thing and the obturator of local network set up healthy and strong route.In the Mesh pattern, business only is divided into two types: real time business and non-real-time service.
At present, be tending towards ripe based on the research of PMP pattern, and also be in the research and development stage based on the Mesh pattern.Existing research based on the Mesh pattern mainly concentrates on modulation, chnnel coding, channel allocation, aspects such as mobile management, also do not have correlative study that reliability is discussed and guarantee problem, as document: IEEEStd.802.16-2004, IEEE Standard for Local and Metropolitan AreaNetworks Part 16:Air Interface for Fixed Broadband Wireless AccessSystems.2004 discloses the wireless access wide band technology based on IEEE 802.16, standard criterion according to IEEE802.16 is carried out three-way handshake process, thereby connect, in three-way handshake process, do not consider the influence of type of service to connecting, the reliability of communication is not high, at the IEEE802.16MAC layer method for ensuring reliability of a kind of supporting business differentiation of the problems referred to above.
Summary of the invention
It is lower based on data transmission credibility in the IEEE802.16 BWA to the present invention is directed to prior art, and the problem that the error rate is high has designed the method for ensuring reliability that a kind of supporting business is distinguished.The technical scheme that the present invention solves the problems of the technologies described above is, designs a kind of MAC layer method for ensuring reliability of distinguishing based on the IEEE802.16 supporting business, and this method connects according to type of service, carries out data validation, thereby has guaranteed the reliability of data.Specifically comprise the steps 1) the judgement type of service; 2) carry out different three-way handshake process according to different types of service; 3) after data transmit, determine whether to carry out data validation according to different types of service.Judge that according to connection identifier (CID CID type of service Priority/Class still is non-real-time polling service nrtPS for real-time polling service rtPS, determine that thus type of service is real time business or non-real-time service, work as Priority/Class=rtPS, be the real time business type, this business enters the real time business formation; Work as Priority/Class=nrtPS, be the non-real-time service type, this business enters the non-real-time service formation; For real time business, judge that further whether professional tolerable time delay t is greater than the time delay t that is caused by data validation ACK, as t<t ACK, carry out the three-way handshake process of IEEE802.16 agreement regulation, and do not need the data of receiving are confirmed; As t>t ACK, perhaps non-real-time service is carried out improved three-way handshake process, and confirms receiving data, sends confirmation ACK in the mini-slot of data burst, and the mini-slot that will send ACK in three-way handshake process is reserved out.Specifically comprise, distribute the mini-slot that sends ACK in advance, promptly in distributed scheduling message MSH-DSCH message, add the information of the number of expression ACK, add a data confirmation letter unit again and describe confirmation information unit ACK IE; After requesting node sent request of data, authorization node distributed the mini-slot that sends data, and distributed the mini-slot that sends data validation ACK; Generate corresponding cell Grant IE of affirmation and ACK IE and send to requesting node; Duplicate the authorization message among the ACK IE, send ACK IE, finish the three-way handshake process after the improvement.For example, the information of wherein representing the ACK number is 6 bits, can be inserted into the 31st bit to the 36 bits of original MSH-DSCH message, and distributing the IE of ACK mini-slot is 40 bit informations, can be added on the last of MSH-DSCH.Data send the back, and whether needs are confirmed according to the type judgment data of business, and real time business generally do not need to confirm, when the tolerable time delay t of real time business greater than the time delay t that causes by data validation ACKThe time, also can carry out the data validation of real time business, non-real-time service need carry out data validation.Requesting node sends data at the mini-slot of the transmission data of authorizing to authorization node, and authorization node sends ACK at the mini-slot of the transmission data validation ACK that authorizes to requesting node after Data Receiving finishes.
The present invention can carry out data validation according to type of service, thereby has guaranteed the reliability of data, reduces the error rate, improves network throughput, promotes the development and the application of wireless Mesh netword technology.
Description of drawings
Fig. 1 802.16MAC layer Mesh mesh network structure
The three-way handshake process of Fig. 2 802.16 standard codes
Fig. 3 overview flow chart of the present invention
Three-way handshake process and data after Fig. 4 the present invention improves send, the affirmation process
Embodiment
The objective of the invention is to be method for ensuring reliability, to promote the performance of wireless Mesh netword based on a kind of supporting business differentiation of the network design of IEEE802.16Mesh pattern.For the ease of understanding technical scheme of the present invention, at first the channel access mechanism of IEEE802.16 and the foundation of three-way handshake process are simply described below.
The IEEE802.16 agreement is released by IEEE 802 working groups, define the air interface specification of wireless MAN (WMAN), developed the wireless access physical layer (hereinafter to be referred as " PHY layer ") and the medium access control layer (hereinafter to be referred as " MAC layer ") of (2~66) GHz frequency bands.The MAC layer of IEEE802.16 agreement provides a kind of new network topology structure---Mesh mesh network structure.Mesh adopts time division multiplexing mode, does not have the branch of strict up-downgoing.Accordingly, the Mesh frame adopts time-multiplexed frame structure, is made up of control subframe and data burst two parts, as shown in Figure 1.The control subframe is divided into several slots (slot) unit, and each time slot is exactly one " transmission opportunity (transmission opportunity) ".The length of control subframe is fixed, equal MSH-CTRL-LEN * 7 an OFDM symbol (symbol), wherein parameter MSH-CTRL-LEN represents the number of slot, is provided by " network description symbol information unit (Network Descriptor IE) " among the network configuration message MSH-NCFG.The control subframe is divided into network control subframe and scheduling controlling subframe again, the network control subframe is used to carry out network control, send network insertion message MSH-NENT and network configuration message MSH-NCFG, major function is to create and keep consistent between different system, comprises the control information etc. of selection, node and link of connection, the link of managing network node.
In each network control subframe, have only first time slot to be used to transmit MSH-NENT, remaining (MSH-CTRL-LEN-1) individual time slot all is used to transmit MSH-NCFG.The transmission of network control period of sub-frame, the transmission cycle is that (scheduling-frame * 4+1), wherein parameter s cheduling-frame is provided by the Network Descriptor IE in the MSH-NCFG message.The scheduling controlling subframe mainly sends centralized scheduling message MSH-CSCH and distributed scheduling message MSH-DSCH, is used for the distribution to resource quantity on the link, finishes the coordinated scheduling that inter-system data sends.By using the scheduling controlling subframe to decide the bandwidth resource allocation of Radio Link between the node, be about to concrete time slot allocation and give each subscriber station (SS) in the network or SS node by obtaining the time slot that this frame obtains to transmit and receive data.
Mesh distributed scheduling utilization three-way handshake (three-way handshaking) process of IEEE802.16 is set up and is sent the preceding connection of data, and its process as shown in Figure 2.
The present invention is on the basis of prior art standard IEEE 802.16 three-way handshake process, difference according to type of service is carried out different three-way handshake process, improve the reliability of network by the mode of the data that transmit being carried out professional class validation, the 802.16MAC layer reliability of the traffic differentiation that provides support guarantees, realizes the optimization to network performance.
Before sending data, carry out three-way handshake process according to different types of service and connect, mainly comprise three parts: 1) judge type of service; 2) carry out different three-way handshake process according to different types of service; 3) after data transmit, determine whether to carry out data validation according to different types of service.Its overall procedure as shown in Figure 3.Specifically comprise the steps, judge that the type of service in the Mesh pattern is real time business or non-real-time service, according to type of service business is deposited into corresponding formation respectively, real time business enters the real time business formation, and non-real-time service enters the non-real-time service formation; Carry out different three-way handshake process according to different types of service; Finish data and send the back whether needs are confirmed according to the type judgment data of business, real time business is because real-time is extremely strong, thus data generally do not need to confirm, when the tolerable time delay t of real time business greater than the time delay t that causes by data validation ACKThe time, also can carry out the data validation of real time business.And non-real-time service is not strong because of real-time, and quality requirement is high, so data need to confirm.
Below at accompanying drawing and instantiation implementation process of the present invention is specifically described.
1. judgement type of service
Business Stream is made of connection identifier (CID (CID) sign, has comprised type of service (Priority/Class) among the CID.In 802.16 Mesh pattern, business is divided into real time business and non-real-time service.Real time business mainly comprises the networking telephone (VoIP), Web TV (IPTV), video request program (VOD) etc., and non-real-time service mainly comprises ATM, FTP, internet access etc.If type of service is real time business, i.e. Priority/Class=rtPS; If type of service is non-real-time service, i.e. Priority/Class=nrtPS.If real time business enters the real time business formation, if non-real-time service enters the non-real-time service formation.When described business is real time business and can't stand time-delay when being caused by data validation, carry out the three-way handshake process of 802.16 agreements regulation, and after receiving data, do not need to confirm.When described business is a real time business, and the tolerable time delay t of real time business is greater than the time delay t that is caused by data validation ACKThe time or when described business be that non-real-time service is carried out the improved three-way handshake process of the present invention, after receiving data, non-real-time service is needed confirm data, real time business is then confirmed as requested.
2. carry out three-way handshake process according to type of service
2.1 when business is real time business and can't stand the time delay that is caused by data validation
As Priority/Class=rtPS and t<t ACK, showing that this type of service is real time business and can't stand the time delay that is caused by data validation, this business is carried out the three-way handshake process of 802.16 agreements regulation, and the data of receiving is not confirmed.Be illustrated in figure 2 as the three-way handshake process schematic diagram of 802.16 agreements regulation, comprise request, answer, confirm three phases.
(1) request.The requesting node of data to be sent uses MSH-DSCH message " request cell (Request IE) " chain line (Link ID) to be described, to send size of data (Demand Level) and to send the number information such as (Demand Persistence) that data continue frame.In this process, requesting node also can or send the information that receives simultaneously in which mini-slot or transmission or reception with oneself and be added among " available cell (the Availability IE) " of MSH-DSCH message, sends to authorization node.
(2) reply.After authorization node is received request, the mini-slot that can be used for sending from available cell search request node, and distribute suitable mini-slot (minislot) in conjunction with the mini-slot that self can receive, at last with particular location (the initial frame number Start FrameNumber that comprises the mini-slot of distribution of the mini-slot that distributes, the original position Minislot Start of the mini-slot that distributes in one frame, the mini-slot that distributes in one frame is counted Minislot Range etc.) be added to MSH-DSCH message " confirm to reply to requesting node in the cell (Grant IE; direction=1; show it is to issue the requesting party).
(3) confirm.Requesting node duplicates authorization message after receiving Grant IE (direction=1), sends Grant IE (direction=0 shows it is to issue the authorized party) and finishes three-way handshake process as confirmation.
Realize the scheduling and the distribution of mini-slot in the data burst by three-way handshake process.
2.2 non-real-time service, maybe can tolerate the real time business of the time delay that causes by data validation
As Priority/Class=rtPS and t>t ACKShow that this business is real time business and requires to influence little by the time delay that data validation causes to the real time business real-time, work as Priority/Class=nrtPS, show that above-mentioned business is a non-real-time service, carry out the three-way handshake process after the present invention shown in Figure 4 improves, in order to guarantee reliability of data transmission, node should be confirmed the data of receiving after receiving data, promptly sends ACK and represents to receive data.
The time delay t that causes by data validation ACKMainly be made up of two parts, a part is normal three-way handshake process t Three-way, data transmission procedure t DataWith data validation process t Ack, another part is n the three-way handshake n*t that carries out again owing to do not receive data validation Three-way, data send n*t DataWith data validation n*t Ack, as the formula (1):
t ACK=(t three-way+t data+t ack)+n*(t three-way+t data+t ack) (1)
For the business that will carry out data validation, will distribute the mini-slot that sends ACK in advance, below describe with an instantiation, we can add the number that 6 bit informations are represented ACK in MSH-DSCH message, be inserted into original the 31st bit to the 36 bits, in distributed scheduling message MSH-DSCH, add an IE who distributes the ACK mini-slot, add 40 bit informations (data validation cell) and describe ACK IE, be inserted in last 40 bits of MSH-DSCH message, amended MSH-DSCH message format is as shown in table 1, and the MSH-DSCH_ACK_IE form of interpolation is as shown in table 2.
The amended MSH-DSCH message format of table 1
Statement Size Note
MSH-DSCH_Message_Format(){
Management?Message?Type=41 8 bits
Coordination?Flag 1 bit
Grant/Request?Flag 1 bit
Sequence?counter 6 bits
No.Requests 4 bits
No.Availabilities 4 bits
No.Grants 6 bits
No.ACKs 6 bits The number of ACK
reserved 2 bits
if(Coordination?Flag==0)
MSH-DSCH_Scheduling_IE() Variable
for(i=0;i<No_Requests;++i)
MSH-DSCH_Request_IE() 16 bits
for(i=0;i<No_Availabilities;++i)
MSH-DSCH_Availability_IE() 32 bits
for(i=0;i<No_Grants;++i)
MSH-DSCH_Grant_IE() 40 bits
for(i=0;i<No_ACKs;++i)
MSH-DSCH_ACK_IE() 40 bits The data validation cell
}
Particularity according to 802.16, promptly data send in the mini-slot of data burst, and the distribution of mini-slot is realized by three-way handshake process by the MSH-DSCH message of controlling subframe.But in 802.16 agreements, three times by MSH-DSCH message of the mini-slot of only having stipulated to send data are reserved alternately, do not stipulate how ACK sends.Therefore, the present invention considers that confirmation ACK also sends in the mini-slot of data burst, and the mini-slot that will send ACK in three-way handshake process is also reserved out.We add an IE who distributes the ACK mini-slot in distributed scheduling message MSH-DSCH, table 2 is depicted as the form of the ACK IE of interpolation, and the concrete implication expressed of correlative wherein.
The MSH-DSCH_ACK_IE form that table 2 adds
Statement Size Note
MSH-DSCH_ACK_IE(){
Link?ID 8 bits With the link identifier of authorizing relevant neighbor node
Start?Frame?number 8 bits Minimum 8 of the start frame of the transmission ACK mini-slot that expression is authorized
Minislot?start 8 bits The original position of the transmission ACK mini-slot of authorizing in one frame
Minislot?range 8 bits The mini-slot number of the transmission ACK that authorizes
Direction 1 bit The sending direction of ACK IE, 0 expression ACK mini-slot license confirmation, direction are requesting node-authorization nodes, 1=represents that the mandate of ACK mini-slot, direction are authorization node-requesting nodes
Persistence 3 bits The lasting frame number of the transmission ACK mini-slot of authorizing, 0=cancellation reservation, the single frame of 1=, 2=2 frame, 3=4 frame, 4=8 frame, 5=32 frame, 6=128 frame, 7=transmit up to cancellation always or reduce
Channel 4 bits Logical channel number, the i.e. logic number of physical channel
}
On the MSH-DSCH_ACK_IE form basis of adding, carry out three-way handshake process, connect.After Figure 4 shows that the IE that in MSH-DSCH, adds a distribution ACK mini-slot, carry out the process that three-way handshake process and data send, confirm.After requesting node sends request of data, the mini-slot that mini-slot that authorization node can be used for sending in conjunction with requesting node among the Availability IE and authorization node can be used for receiving distributes the mini-slot that sends data, simultaneously mini-slot that can be used for receiving in conjunction with requesting node among the Availability IE and the authorization node mini-slot that can be used for sending distributes the mini-slot that sends data validation ACK, and generates corresponding confirmation information unit Grant IE (direction=1) and ACKIE (direction=1) sends to requesting node.Requesting node duplicates authorization message after receiving Grant IE (direction=1), sends Grant IE (direction=0).Simultaneously, duplicate the authorization message among the ACK IE (direction=1), send ACK IE (direction=0), finish the three-way handshake process after the improvement.Afterwards, requesting node sends data at the mini-slot of the transmission data of authorization node to authorization node.Authorization node sends ACK at the mini-slot of the transmission data validation ACK that authorizes to requesting node after Data Receiving finishes.
Concrete mini-slot is allocated as follows:
If the mini-slot that requesting node can be used for sending among the Availability IE is:
minislots?available?for?transmission?of?request?node={R 1,R 2,……,R m} (2)
Wherein, R iI the mini-slot that can be used for sending for requesting node.
The mini-slot that authorization node can be used for receiving is:
minislots?available?for?reception?of?authorization?node={A 1,A 2,……,A n} (3)
Wherein, A iI the mini-slot that can be used for receiving for authorization node.
The mini-slot that then effectively sends data is:
minislots_for_data={R 1,R 2,……,R m}∩{A 1,A 2,……,A n}
={D 1,D 2,……,D j} (4)
Wherein, D iFor effectively sending i mini-slot of data.
If demand_level 1For sending the required mini-slot number of data, j is the mini-slot number that effectively sends data.If
Figure G2009101036387D00091
Judge then whether formula (5) (6) is set up: if formula (5) establishment, then Random assignment demand_level 1Individual mini-slot sends data validation to authorization node; If formula (6) is set up, then return the distribution failure information.If
Figure G2009101036387D00092
Then return the distribution failure information.
demand_level 1≤j (5)
demand_level 1>j (6)
If the mini-slot that requesting node can be used for receiving among the Availability IE is:
minislots?available?for?reception?of?request?node={R’ 1,R’ 2,……,R’ m} (7)
Wherein, R ' iI the mini-slot that can be used for receiving for requesting node.
The mini-slot that authorization node can be used for sending is:
minislots?available?for?transmission?of?authorization?node={A’ 1,A’ 2,……,A’ n} (8)
Wherein, A ' iI the mini-slot that can be used for sending for authorization node.
The mini-slot that then effectively sends ACK is:
minislots_for_ack={R’ 1,R’ 2,……,R’ m}∩{A’ 1,A’ 2,……,A’ n}
={ACK 1,ACK 2,……,ACK k} (9)
Wherein, ACK iFor effectively sending i the mini-slot of ACK.
If demand_level 2For sending the required mini-slot number of ACK, k is the mini-slot number that effectively sends ACK.
If
Figure G2009101036387D00101
Judge then whether formula (10) (11) is set up: if formula (10) establishment, then Random assignment demand_level 2Individual mini-slot sends data validation to authorization node, and the data validation time is after data send; If formula (11) is set up, then return the distribution failure information.If
Figure G2009101036387D00102
Figure G2009101036387D00103
Then return the distribution failure information.
demand_level 2≤k (10)
demand_level 2>k (11)
3. data validation stage
Data send the back, and whether needs are confirmed according to the type judgment data of business, real time business (being Priority/Class=rtPS) is because real-time is extremely strong, so data generally do not need to confirm, when the tolerable time delay t of real time business greater than the time delay t that causes by data validation ACKThe time, also can carry out the data validation of real time business.And non-real-time service (being Priority/Class=nrtPS) is not strong because of real-time, and quality requirement is high, so data need to confirm that node sends information A CK and represents to receive data.
The above; only be better embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with the people of this technology in disclosed technical scope; conversion that can obtain easily and replacement all should be included in the protection category of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.The present invention can guarantee the reliability of data, is widely used in wireless Mesh netword.

Claims (5)

1. the 802.16MAC layer method for ensuring reliability of supporting business differentiation is characterized in that determine that according to connection identifier (CID type of service is real time business or non-real-time service, real time business enters the real time business formation, and non-real-time service enters the non-real-time service formation; For tolerable time delay t less than the time delay t that causes by data validation ACKReal time business, carry out the three-way handshake process of IEEE802.16 agreement regulation; For tolerable time delay t greater than the time delay t that causes by data validation ACKReal time business, or non-real-time service, carry out improved three-way handshake process, described improved three-way handshake process is specially: add the information that the ACK number is confirmed in expression in distributed scheduling message MSH-DSCH, and distribute data affirmation cell is described confirmation information unit ACK IE; After requesting node sent request of data, authorization node distributed the mini-slot that sends data, and distributed the mini-slot that sends data validation; Generate corresponding confirmation information unit, and send to requesting node; Requesting node is received the authorization message in the duplicate ack information unit of back, sends confirmation information unit to authorization node, and confirms receiving data.
2. method according to claim 1 is characterized in that, the time delay t that is caused by data validation ACKComprise two parts, a part is normal three-way handshake process time delay t Three-way, data transmission delay t DataWith data validation time delay t Ack, another part is n the three-way handshake process time delay n*t that carries out again owing to do not receive data validation Three-way, data transmission delay n*t DataWith data validation time delay n*t Ack, that is: t ACK=(t Three-way+ t Data+ t Ack)+n* (t Three-way+ t Data+ t Ack).
3. method according to claim 1 is characterized in that, sends confirmation ACK in the mini-slot of data burst, and the mini-slot that will send ACK in improved three-way handshake process is reserved out.
4. method according to claim 1 is characterized in that, the information of expression ACK number is 6 bits, is inserted into the 31st bit to the 36 bits of MSH-DSCH message, and the information of confirmation information unit is 40 bits, adds the last of MSH-DSCH message to.
5. method according to claim 1, it is characterized in that, requesting node sends data at the mini-slot that authorize to send data to authorization node, and authorization node sends confirmation at the mini-slot of the transmission data validation of authorizing to requesting node after Data Receiving finishes.
CN2009101036387A 2009-04-17 2009-04-17 Method for ensuring reliability of 802.16MAC layer supporting service differentiation Expired - Fee Related CN101541043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101036387A CN101541043B (en) 2009-04-17 2009-04-17 Method for ensuring reliability of 802.16MAC layer supporting service differentiation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101036387A CN101541043B (en) 2009-04-17 2009-04-17 Method for ensuring reliability of 802.16MAC layer supporting service differentiation

Publications (2)

Publication Number Publication Date
CN101541043A CN101541043A (en) 2009-09-23
CN101541043B true CN101541043B (en) 2011-01-26

Family

ID=41123955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101036387A Expired - Fee Related CN101541043B (en) 2009-04-17 2009-04-17 Method for ensuring reliability of 802.16MAC layer supporting service differentiation

Country Status (1)

Country Link
CN (1) CN101541043B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848029B (en) * 2010-03-18 2012-11-07 北京交通大学 Interactive method of MAC (Media Access Control) layer and radio-frequency head
CN101848032B (en) * 2010-05-07 2014-05-07 中国科学院计算技术研究所 Conflict avoidance-based dispatching method for wireless MESH network
CN101848550B (en) * 2010-05-07 2012-11-21 中国科学院计算技术研究所 Conflict avoidance-based dispatching method for wireless MESH network
CN103379665B (en) 2012-04-28 2017-04-19 华为技术有限公司 Method and device for establishing association between station and access point

Also Published As

Publication number Publication date
CN101541043A (en) 2009-09-23

Similar Documents

Publication Publication Date Title
CN1941666B (en) Method and system for realizing bandwith distribution and dispatch management
CN100579024C (en) Intermediate-transferring system and method for allocating and scheduling band width
RU2444852C2 (en) Method based on scheduling connection with support of differentiated services in multi-interval wireless networks
CN101155395B (en) Band width distribution method, system and device based on wireless system
CN106793128A (en) A kind of channel wireless radio multi Mesh network TDMA resource allocation methods
Luo et al. QoS-aware scheduling over hybrid optical wireless networks
CN101610594A (en) Dynamic layered PMP/Mesh hybrid network system and superframe structure thereof based on TD-OFDMA
US8385247B2 (en) Communication systems and methods with resource management for overlapping multicast and broadcast service zones
CN101541043B (en) Method for ensuring reliability of 802.16MAC layer supporting service differentiation
CN101631063B (en) Competition window adjustment mechanism method and system based on positions and congestion conditions
CN101064640B (en) Method, system and node for transmitting data in distributed non-collaboration grid network
CN101808371B (en) IEEE802.16 Mesh network resource pre-reservation method for supporting multi-hop resource pre-reservation
US8942154B2 (en) Method, BM-SC and base station for multiplexing MBMS services in MBSFN
CN101094216B (en) Method and system for coordinating resources of multimedia broadcast / multicast services between adjacent sectors
CN101043694B (en) Communication system and communication method fusing mobile communications network and video broadcasting network
CN101496350B (en) MAC protocol for centrally controlled multichannel wireless local area networks
CN103052072A (en) Method for realizing dynamic channel resource allocation by superframe and allocation of hybrid network
CN100429958C (en) Bandwidth reserved media access control method for private wireless network
Makarevitch Distributed scheduling for WiMAX mesh network
Jiménez-Soria et al. Coordinated multicast/unicast transmission on 5g: a novel approach for linear broadcasting
CN100515115C (en) Bandwidth competition method for WiMax system
CN104640226B (en) Multiple services resource regulating method and device are based under a kind of cognition relay system
CN101754284B (en) Resource control method and system
Wang et al. An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks
Wang et al. Improving the data scheduling efficiency of the ieee 802.16 (d) mesh network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110126

Termination date: 20140417