CN102571675B - Method for optimizing hidden terminal based on physical layer interference information - Google Patents

Method for optimizing hidden terminal based on physical layer interference information Download PDF

Info

Publication number
CN102571675B
CN102571675B CN201210026300.8A CN201210026300A CN102571675B CN 102571675 B CN102571675 B CN 102571675B CN 201210026300 A CN201210026300 A CN 201210026300A CN 102571675 B CN102571675 B CN 102571675B
Authority
CN
China
Prior art keywords
node
interference
data
signal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210026300.8A
Other languages
Chinese (zh)
Other versions
CN102571675A (en
Inventor
王璐
伍楷舜
倪明选
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou HKUST Fok Ying Tung Research Institute
Original Assignee
Guangzhou HKUST Fok Ying Tung Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou HKUST Fok Ying Tung Research Institute filed Critical Guangzhou HKUST Fok Ying Tung Research Institute
Priority to CN201210026300.8A priority Critical patent/CN102571675B/en
Publication of CN102571675A publication Critical patent/CN102571675A/en
Application granted granted Critical
Publication of CN102571675B publication Critical patent/CN102571675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a communication method for solving problems due to a hidden terminal in a wireless network based on a wireless interference cancellation technique and a node full-duplex mode. Under a wireless local area network physical layer, wireless network nodes are coded into special interference signals by an OFDM (Orthogonal Frequency Division Multiplexing) technology, and overlapped into data signals in the air by means of ''attachment''. The control information and the data information can be transmitted in parallel, thus, the resource consumption on control information can be saved. The nodes for receiving the data information can remove the interference signals by an interference canceling technology in order to obtain the original data. The node for receiving the control information can demodulate the control signal from the mixed signal by an energy detecting technology, so as to obtain the physical address of the node which is transmitting in a collision domain, as well as establishing a relative node list. By inquiring the transmitting state and the receiving state of adjacent nodes, the node can determine whether it is the hidden terminal, so as to avoid transmission of conflict data and increase channel utilization rate.

Description

A kind of method for optimizing hidden terminal of physically based deformation layer interfere information
Technical field
The present invention relates to a kind of communication means solving hidden terminal problem in wireless network based on air interference cancellation technology and network node full-duplex mode.The transmission disturbance that the method can avoid concealed terminal in wireless network to cause effectively, thus improve channel utilization, increase aggregate network throughput.The invention belongs to wireless communication technology field.
Background technology
Concealed terminal is the classic problem in wireless network.Concealed terminal refers to the node in the coverage receiving contact outside the coverage of sending node.Concealed terminal may send data to identical receiving node owing to can't hear the transmission of sending node, causes data in the conflict of receiving node place.Because sending node after conflicting wants the data of retransmission collisions, it reduce the utilance of channel.The method in the past solving concealed terminal increases monitoring scope.But, increase the deterioration that monitoring scope can cause again a difficult problem for another classics, i.e. exposed terminal problem.Exposed terminal problem refers to the node in the coverage of sending node in receiving node coverage.Exposed terminal is because hearing the transmission of sending node and delayed delivery.But in fact this node is outside the communication range of receiving node, its transmission can not cause conflict, this introduces unnecessary time delay.
The essential reason that concealed terminal occurs is the transmission state cannot stating oneself because of receiving node, causes other nodes cannot obtain enough control informations and judges.Therefore, how under the condition not affecting primary data information (pdi) bandwidth, to obtain enough control informations, and the transmission state of oneself is the key issue that the present invention will solve to make receiving node effectively state.
Communications jamming art is applied to military field the earliest.Use jamming device to launch suitable interference electromagnetic wave, just can destroy and upset the radio communication of enemy.Communications jamming art can be divided into spot jamming and barrage jamming by spectrum width.Wherein spot jamming is the Communication Jamming that compacting enemy one determines channel.Interference spectrum width only accounts for a channel width, overlaps exactly with signal spectrum, and interfering energy can all for suppressing this channel, and interference power utilance is high.If recipient can obtain the feature of interference signal, even if so also can primary signal be recovered when disturbed, interference cancellation techniques that Here it is.Suppose can receive two kinds of signals, interference signal y recipient " and the primary signal y ' of disturbed signal:
y’[t]=H A[t]x A[t]+H B[t]x B[t]+w[t]
y”[t]=H B[t]x B[t]+w[t]
Wherein H icorresponding channel impulse response, x a[t] represents primary signal, x b[t] represents interference signal, and w [t] represents white Gaussian noise.So, at known y " and y ', x a[t] can be expressed as:
x A [ t ] = y i ′ [ t ] - y i ′ ′ [ t ] H A
By this interference cancellation techniques, we not only can eliminate interference, obtain original data message x a[t], but also can be artificial utilize interference signal x b[t] carries a certain amount of control information.The technology of indispensability of the present invention that Here it is, this technology can save the resource consumption of control information, assists mac-layer protocol to solve concealed terminal and exposed terminal problem by the additional control information of physical layer.
Full-duplex communication is also called two-way simultaneous communication, the information interaction approach that the both sides namely communicated can send simultaneously and receive information.The communication pattern of full duplex is very universal in cable network, but because signals in wireless communications decay is very serious, full-duplex communication can cause the signal strength signal intensity of transmission data completely different with the signal strength signal intensity receiving data, thus the normal reception of impact.The full-duplex mode of radio node is by implementing not allow the signal processing technology of the sound oneself listening oneself solve this difficult problem.Its basic thought is by with filter, removes the transmission data entered in receiving circuit, thus makes receiving node can get rid of the interference of oneself transmission data, receives the data of other nodes exactly.By the full-duplex mode of radio node, we can make receiving node while receiving data, state the transmission state of oneself, make the solution of hidden terminal problem become possibility.
Application number is 200710031832.X, and the date of application is that the domestic application for a patent for invention on November 30th, 2007 discloses a kind of method solving multi-jumping wireless self-network grouping concealed terminal and exposed terminal problem.The method regulation sending node has four kinds of states: free time, competition, wait-receiving mode CTS and transmission data; Receiving node only has two states: idle and wait-receiving mode data.The method is the generation that control sending node and receiving node conversion between these states avoid conflict.The method does not save the data channel bandwidth shared by control signal.And the loss of control packet also can cause other problems.Control information is encoded into interference signal by the present invention, can when not taking data bandwidth transmission of control signals, effectively solve concealed terminal and exposed terminal problem.
Application number is 200810018282.2, and the date of application is a kind of method that the domestic application for a patent for invention on May 23rd, 2008 discloses that foreign peoples of solution puts AD HOC network concealed terminal.The method finally thoroughly solves the problem of the concealed terminal of foreign peoples's point by the sequential that design is strict in MAC layer.Being that each node is equipped with two emission interfaces in network layer, being operated in non-interfering two channels, making each node form a larger sensing region by utilizing the advantage of high-performance node.Adopt the method for cross layer design in MAC layer, the topology information of the surroundings nodes perceived in application network layer, adopt shortest path first to ask for the route that multi-hop returns CTS and ACK, and CTS is multicasted to concealed terminal to stop its access channel.The data channel bandwidth that the method is not still saved shared by control signal.And the arrangement of sequential have impact on the efficiency of transmission of AD HOC.Control signal of the present invention and data-signal are without scheduling, and transmission, coding, decoding are flexibly.Node at the transmission of control signals when not taking data bandwidth, can solve concealed terminal and exposed terminal problem effectively.
Application number is 200680025803.6, and the applying date is that the domestic application for a patent for invention on June 8th, 2006 discloses a kind of method, device and the computer program that prevent hidden node problem.This product receives transmission request CC-RST from source node, comprises the Reservation duration value of instruction transmission reservation required time length.Adjust timer afterwards, other nodes must be prevented and equal to transmit request/transmission response time of shaking hands in the cycle (NAV) of channel.When CC-RTS is rejected, receive second CC-RTS with the Reservation duration value being zero.When CC-RTS is accepted, NAV is extended to the residue duration of the reservation duration of original CC-RTS frame.The method is also avoid concealed terminal according to scheduling, does not save the data channel bandwidth shared by control signal.Control signal of the present invention and data-signal are without scheduling, and transmission flexibly.Node at the transmission of control signals when not taking data bandwidth, can solve concealed terminal and exposed terminal problem effectively.
Summary of the invention
The technical problem to be solved in the present invention is, when not affecting original data signal bandwidth, for network node obtains enough control informations, order wants the node sending data to have the ability to judge whether oneself is concealed terminal, thus avoids concealed terminal node to cause conflict because sending data.Further, while solution concealed terminal, exposed terminal node can be utilized to carry out parallel join, improve radio network information channel utilance with this, increase aggregate network throughput.
The present invention is intended to design a kind of method that node can be made to obtain enough control informations, and node oneself is judged, and whether the transmission of oneself is concealed terminal, and does not affect original data bandwidth.After knowing above information, the node as concealed terminal just can be avoided sending data to current receiving node, thus avoids unnecessary conflict.And exposed terminal can be utilized to carry out concurrent transmission as the node of exposed terminal, thus increase the parallel join number in network, increase aggregate network throughput.
The module that the present invention comprises is: physical layer full duplex sending/receiving module, interference add-on module, interference detection module, Interference Cancellation module, MAC layer channel determination module and conflict-solving module.
For hidden terminal problem, the key of dealing with problems is that receiving node can state oneself accepting state.This just requires that receiving node can send some control informations while reception data, and namely, node will have full-duplex mode.Developing rapidly of radio jamming technologies makes the full duplex module of wireless network node become possibility.The present invention adopts full duplex radio network node, makes receiving node can send simple control information while reception data, indicates it oneself is receiving node with this.
Interference add-on module is responsible for interfere information to be encoded into control information, and is sent in air.Interference add-on module utilizes OFDM (the Orthogonal frequency-division multiplexing of physical layer, OFDM) technology, can make the node carrying out transfer of data, or the MAC Address of oneself is encoded in artificial interference signal by victim's node.Wherein victim refers to oneself and does not carry out any transfer of data, is but covered by the transfer of data of other nodes, causes oneself cannot sending or receive any data.Whole channel distribution is some subcarriers by OFDM, and subcarrier grouping being represented frequency band for sending, receiving expression frequency band and expression frequency band of being injured by the present invention further.Each frequency band comprises m subcarrier, and top-down number consecutively is 0 to m-1.The MAC Address of sender, recipient and victim is less than the integer value h of m with the mode boil down to one of Hash, then corresponding sending/receiving represents that the subcarrier being numbered h in frequency band carries a narrow-band interference signal and represents binary " 1 ".The interference signal of this particular modulation because comprising transmission, receive and the MAC Address of victim's node, and be called as annex control information.
In order to ensure in distributed network, node can detect annex control signal at any time, interference add-on module adopts a kind of mode of the interference that circulates, make on each symbol of OFDM and carry identical annex control signal, even if node does not start to detect in the starting point of transfer of data like this, still complete control signal can be obtained.Circulation interference ensure that the normal operation of distributed network, and interference signal carries out modulation and demodulation independent of data message, and namely same node transmits or demodulated data signal and control signal respectively.
At control signal receiving terminal, interference detection module utilizes energy detector to detect conciliates the control information be contained in annex control signal of stealthily substituting.The interference signal of arrowband is compared baseband data signals and is contained higher energy.When comprising relatively high signal energy in nodal test to a certain subcarrier, this subcarrier has on very large probability and carries narrow-band interference signal.Therefore can solve corresponding hash value, thus obtain the node listing of current transmission.
Interference Cancellation module helps data signal recipients to eliminate interference signal, reduces and demodulates original data signal.The training sequence of OFDM contains channel estimating symbol, and theoretical according to signal correlation, the channel estimation value of a certain subcarrier can be calculated by the estimated value of its adjacent sub-carrier.Therefore this module only uses a part of subcarrier estimated channel, and residue subcarrier is then used for recording interference signal intensity.Interference signal, according to the interference signal intensity recorded in training sequence, is offset by the mixed signal received by data signal recipients, just can obtain original data-signal.
Node obtains current sending node list, receiving node list and victim Node list by interference detection module.Posterior nodal point utilize network layer routing table to obtain one hop neighbor table.According to transmission node list and a hop neighbor table, whether node utilizes MAC layer determination module to decide oneself is concealed terminal or exposed terminal.Its concrete steps are specific as follows: if current all neighbours are not within receiving node list, so this node is concealed terminal scarcely.Further, if the receiving node of this node is not within victim Node or sending node list, even if so this node is exposed terminal and channel is now occupied, this node also can carry out transfer of data, and does not worry the generation that conflicts.
Channel distribution is gone out sub-fraction by conflict-solving module, specially for ACK transmits.Like this, the transmission of ACK and transfer of data just can parallel transmissions, not only can improve the efficiency of transfer of data and exchange, and avoid data and ACK when exposed terminal and clash.Conflict-solving module effectively make use of the advantage of multicarrier, improves channel utilization.
The present invention is based on wireless network node full-duplex mode, utilize interference to add and cancellation technology and radio node full-duplex mode, the beneficial effect that can reach is as follows:
Transmitted in parallel and receiving node control information flexibly and data-signal, make data-signal and control signal transmit simultaneously and can not mutually disturb, do not affect the bandwidth of original data signal;
The nodal information coding effectively will transmitted, ensures to monitor the control signal that node simply and fast can decode needs at any time;
The control signal that mac-layer protocol effectively utilizes physical layer carries out the judgement of concealed terminal and exposed terminal, thus accurately and fast avoid the conflict that concealed terminal brings, and utilize exposed terminal to carry out concurrent transmission, reduce unnecessary conflict and network delay, increase channel utilization.
It should be noted that, the present invention is based on Orthodoxy Frequency Division Multiplex platform, but also can correspondingly expand to other wireless transmission platforms.
Accompanying drawing explanation
Fig. 1 is that concealed terminal and exposed terminal analyze schematic diagram.
Fig. 2 is system schematic.
Fig. 3 is interference add-on module schematic diagram.
Fig. 4 is Interference Cancellation module diagram.
Wherein solid line waveform shown in Fig. 3 is original data signal, and dotted line waveform is the arrowband control signal of adding in atmosphere.
Embodiment
As shown in Figure 1, concealed terminal refers to the node in the coverage receiving contact outside the coverage of sending node.Exposed terminal problem refers to the node in the coverage of sending node in receiving node coverage.Each node sends and monitoring scope is a hop distance, in concealed terminal situation: when A sends data to B, because C monitors less than the transfer of data between A and B, cannot learn that B is now the state of receiving node.Therefore, if time now C also has data will send to B, just transmission data can be got started.Like this, the data of sending node A and C just can be conflicted in the position of receiving node B, cause B cannot receive any information, cause the wasting of resources thus.
As shown in Figure 2, user D is sending node, and user C is receiving node, and user E is victim Node.User B, in a hop neighbor of user D, now wants to send data to user E or user A.Utilize principle of the present invention, user B needs to judge: whether have receiving node in the neighbor node of oneself, to ensure that the transfer of data of oneself can not have influence on current transfer of data; Further, whether the receiving node of oneself is victim Node, to ensure that the transfer of data of oneself can be carried out smoothly.
User D is when sending data, and the transmission simultaneously MAC Address of oneself being encoded to interference signal represents in frequency range, transmits with data-signal simultaneously.Accordingly, the MAC Address of oneself, when receiving data, is sent to simultaneously and receives expression frequency range by user C.And user E is when detecting that oneself is covered by other data-signals, also MAC Address being sent to is injured represents in frequency range, and like this, other nodes just by monitoring the control information of each frequency range in air, can obtain neighbor node active state.When user B needs to send data, can learn that current sending node is user D according to the annex control signal of user D, and learn that current victim Node is user E according to the annex control signal of user E.Because user C is not within the monitoring scope of user B, user B monitors the annex control information less than user C.And corresponding, the transmission of user B also can not affect user C.According to above information, user B utilizes MAC layer channel determination information to judge, can not be successful to the transfer of data of user E, because user E is victim Node; And can be successful to the transfer of data of user A, because user A is neither victim Node neither sending node.
As shown in Figure 3, if node needs to send annex control information, then the MAC Address of oneself is encoded in narrow-band interference signal, and is sent in air.Narrow-band interference signal ensures, when not affecting original data signal bandwidth, to carry abundant control signal as far as possible.Even if annex control information and other data-signals superimposed, also can by Interference Cancellation module and interference monitor module interference signal is separated with data-signal and decodes out.
At receiving terminal, node accessory signal measuring point according to Fig. 4 records blank interfere information, recovers initial data with this.Node, when starting to receive data, first records the interference signal at any place in packet header or bag tail.Then in the data-signal of centre, by having superposed the interference signal eliminating record in the mixed signal of data-signal and interference signal, thus original data signal is obtained.At further demodulation code, receiving node can obtain the data message that oneself needs.

Claims (6)

1. the method for optimizing hidden terminal of a physically based deformation layer interfere information, it is characterized in that: based on Orthodoxy Frequency Division Multiplex platform, utilize air interference cancellation technology and network node full-duplex mode, introduce physical layer full duplex sending/receiving module, interference add-on module, interference detection module and Interference Cancellation module, utilize physical layer full duplex sending/receiving module, receiving node is sent control information while reception data, indicate it oneself is receiving node with this, state the accepting state of oneself, but do not affect original channel width, network node is made to obtain enough control informations, MAC layer channel determination module is assisted to judge whether oneself is concealed terminal or exposed terminal, in conjunction with conflict-solving module, make concealed terminal avoid sending data to current receiving node, thus avoid unnecessary conflict, and utilize exposed terminal to carry out concurrent transmission, increase aggregate network throughput, reduce unnecessary time delay, wherein, node sets up sending node, receiving node and victim Node list according to the interference signal collected, according to transmission node list and a hop neighbor table, whether node utilizes MAC layer determination module to decide oneself is concealed terminal or exposed terminal, if namely current neighbours does not have receiving node, and the receiving node of oneself is neither sending node neither victim Node, then this node carries out current transfer of data, with the conflict that this is effectively avoided concealed terminal to cause, and utilize exposed terminal to carry out concurrent link, thus increase channel utilization.
2. the method for optimizing hidden terminal of a kind of physically based deformation layer interfere information according to claim 1, it is characterized in that: interference add-on module utilizes OFDM modulation technology, by the node listing transmitted will be obtained in node MAC addr information coding to interference signal, represent frequency band for sending by OFDM subcarrier grouping, receive expression frequency band and expression node of being injured, each frequency band comprises m subcarrier, and top-down number consecutively is 0 to m-1; Node utilizes interference add-on module that its MAC Address and receiving terminal MAC Address thereof are less than the integer value h of m with the mode boil down to two of hash, then accordingly to send and receiving node MAC Address is expressed as in frequency band the subcarrier being numbered h and carries a narrow-band interference signal and represent with binary " 1 ".
3. the method for optimizing hidden terminal of a kind of physically based deformation layer interfere information according to claim 2, it is characterized in that: interference add-on module adopts a kind of mode of the interference that circulates, make on each symbol of OFDM and carry identical interference, and reserve accessory signal measuring point respectively at the head and tail of data-signal, ensure in distributed wireless networks, interference detection module and Interference Cancellation module can normal operations, and interference signal carries out modulation and demodulation independent of data message, namely same node transmits or demodulated data signal and control signal respectively.
4. the method for optimizing hidden terminal of a kind of physically based deformation layer interfere information according to claim 1, it is characterized in that: at control signal receiving terminal, interference detection module utilizes energy detector to detect conciliates the control information be contained in interference signal of stealthily substituting, namely the interference signal of arrowband is compared baseband data signals and is contained higher energy, decode corresponding hash value with this, thus obtain the node listing of current transmission.
5. the method for optimizing hidden terminal of a kind of physically based deformation layer interfere information according to claim 1, it is characterized in that: Interference Cancellation module only uses a part of subcarrier estimated channel, residue subcarrier is then used for recording interference signal intensity, Interference Cancellation module is according to the interference signal intensity recorded in training sequence, interference signal is offset by the mixed signal received, demodulates original data signal.
6. the method for optimizing hidden terminal of a kind of physically based deformation layer interfere information according to claim 1, it is characterized in that: channel distribution is gone out sub-fraction by conflict-solving module, be ACK transmission specially, make ACK and data parallel transmission, thus avoid transfer of data and transmit conflicting in exposed terminal position with ACK.
CN201210026300.8A 2012-02-07 2012-02-07 Method for optimizing hidden terminal based on physical layer interference information Active CN102571675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210026300.8A CN102571675B (en) 2012-02-07 2012-02-07 Method for optimizing hidden terminal based on physical layer interference information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210026300.8A CN102571675B (en) 2012-02-07 2012-02-07 Method for optimizing hidden terminal based on physical layer interference information

Publications (2)

Publication Number Publication Date
CN102571675A CN102571675A (en) 2012-07-11
CN102571675B true CN102571675B (en) 2015-01-21

Family

ID=46416164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210026300.8A Active CN102571675B (en) 2012-02-07 2012-02-07 Method for optimizing hidden terminal based on physical layer interference information

Country Status (1)

Country Link
CN (1) CN102571675B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743926A (en) * 2016-04-22 2016-07-06 太原科技大学 Wireless relay transmission system based on physical layer security

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103079251B (en) * 2013-01-31 2015-10-28 清华大学 The method and system of data collision are avoided in wireless sense network
CN103619072B (en) * 2013-12-02 2017-03-22 西安电子科技大学 Method for achieving FD-MAC protocol based on RTS/FCTS principle in wireless network
CN105474570A (en) * 2014-01-21 2016-04-06 华为技术有限公司 Data transmission method and device
CN105451362B (en) * 2014-09-02 2019-07-19 电信科学技术研究院 The data transmission method for uplink and device of ad hoc network
EP3188429B1 (en) 2014-09-19 2020-08-26 Huawei Technologies Co., Ltd. Method and apparatus for full-duplex communication in wlan system
CN104378177B (en) * 2014-11-10 2018-04-27 上海交通大学 A kind of collision alarm restoration methods based on iteration MIMO detections
CN105898819A (en) * 2015-05-05 2016-08-24 北京月星通科技有限责任公司 Industrial wireless mesh network routing method and device
DE102018004828A1 (en) * 2017-09-28 2019-03-28 Diehl Metering Systems Gmbh Method for transmitting data
CN109474576B (en) * 2018-10-16 2022-08-09 杭州来布科技有限公司 Information security transmission method and computer terminal
CN111556581B (en) * 2020-04-21 2024-01-19 上海海事大学 Terminal for eliminating hiding and exposing and medium access control method for implementing positioning
CN113078970B (en) * 2021-03-19 2022-06-14 展讯通信(上海)有限公司 Method and device for judging hidden node, storage medium and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321122A (en) * 2008-05-23 2008-12-10 西安交通大学 Method for solving heterogeneous point AdHoc network concealed terminal
CN102300318A (en) * 2011-09-29 2011-12-28 广州市香港科大霍英东研究院 Method for optimizing multi-channel distribution based on physical layer interference information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3588040B2 (en) * 2000-07-26 2004-11-10 松下電器産業株式会社 Communication terminal device and base station device
CN1943175B (en) * 2005-02-04 2011-07-27 株式会社东芝 Optimal channel assignment for multi-class, multi-channel wireless LANs and the like

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321122A (en) * 2008-05-23 2008-12-10 西安交通大学 Method for solving heterogeneous point AdHoc network concealed terminal
CN102300318A (en) * 2011-09-29 2011-12-28 广州市香港科大霍英东研究院 Method for optimizing multi-channel distribution based on physical layer interference information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743926A (en) * 2016-04-22 2016-07-06 太原科技大学 Wireless relay transmission system based on physical layer security
CN105743926B (en) * 2016-04-22 2019-02-22 太原科技大学 A kind of wireless relay Transmission system based on safety of physical layer

Also Published As

Publication number Publication date
CN102571675A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN102571675B (en) Method for optimizing hidden terminal based on physical layer interference information
Lien et al. 3GPP NR sidelink transmissions toward 5G V2X
KR102422168B1 (en) Data transmission method, base station, and terminal
CN101197826B (en) Method for solving problems of multi-jumping wireless self-network grouping concealed terminal and exposed terminal
CA2869000C (en) Multi-access scheme and signal structure for d2d communications
Pu et al. Comparing underwater MAC protocols in real sea experiments
EP2074754B1 (en) Automatic partner selection in the cooperative mac protocol
CN104378828B (en) A kind of methods, devices and systems of channel access
Yang et al. Peer discovery for device-to-device (D2D) communication in LTE-A networks
Dibaei et al. Full-duplex medium access control protocols in wireless networks: A survey
CN106233791A (en) The definition of different NDP PS polling types
Almotairi et al. Multichannel medium access control for ad hoc wireless networks
Al-Mefleh et al. Taking advantage of jamming in wireless networks: A survey
Masri et al. Common control channel allocation in cognitive radio networks through UWB communication
KR20120057349A (en) Routing Method for Wireless Mesh Networks and Wireless Mesh Network System using the Same
CN102625367B (en) Time slot optimized multichannel multiple-access control method in multi-hop Ad Hoc network
JP2005143101A (en) Method of idle mode control in ofdm system
Gummalla et al. Design of an access mechanism for a high speed distributed wireless LAN
Wang et al. Full duplex random access for multi-user OFDMA communication systems
CN102164008B (en) Control channel-free underwater dynamic spectrum access method
Radunovic et al. Efficiency and fairness in distributed wireless networks through self-interference cancellation and scheduling
Mao et al. ANC-ERA: Random access for analog network coding in wireless networks
CN102612161B (en) A kind of exposed terminal optimization method of physically based deformation layer interfere information
WO2007028327A1 (en) A method, wireless device and wireless communication system for realizing information transfer between wireless devices
CN106488578A (en) The transmission method of data, AP and user node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant