CN103957085B - Media access control method for wireless mesh network based on network coding - Google Patents

Media access control method for wireless mesh network based on network coding Download PDF

Info

Publication number
CN103957085B
CN103957085B CN201410216133.2A CN201410216133A CN103957085B CN 103957085 B CN103957085 B CN 103957085B CN 201410216133 A CN201410216133 A CN 201410216133A CN 103957085 B CN103957085 B CN 103957085B
Authority
CN
China
Prior art keywords
node
packet
general data
data bag
bag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410216133.2A
Other languages
Chinese (zh)
Other versions
CN103957085A (en
Inventor
李海涛
陈晓江
房鼎益
刘晨
徐丹
王薇
尹小燕
郭军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwest University
Original Assignee
Northwest University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwest University filed Critical Northwest University
Priority to CN201410216133.2A priority Critical patent/CN103957085B/en
Publication of CN103957085A publication Critical patent/CN103957085A/en
Application granted granted Critical
Publication of CN103957085B publication Critical patent/CN103957085B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a media access control method for a wireless mesh network based on network coding. The media access control method comprises the steps of a data package receiving stage, a data package transmitting stage and an ACK monitoring stage. According to the protocol, a network coding mechanism is introduced into a media access control layer, and throughput is increased compared with the traditional media access control method based on conflict avoidance. The media access control method is high in decoding success rate, less in control expenditure, low in calculation consumption of hardware, strong in portability, good in compatibility and capable of relieving network congestion partially.

Description

A kind of wireless mesh network media access control method based on network code
Technical field
The present invention relates to radio network technique field is and in particular to a kind of wireless network medium based on network code accesses Control method it is adaptable to provide high-throughput for service purpose wireless mesh network.
Background technology
How to improve the emphasis research topic that data throughout is wireless mesh network.Feelings in channel medium resource-constrained Under condition, the data transport service of high-quality of handling up for access device offer high bandwidth height, to the physical layer of wireless mesh network, medium MAC layer proposes high requirement.Meanwhile, the networking equipment price general charged of wireless mesh network is cheap, data buffer storage ability, Calculation processing power is limited, it is ensured that media access control method efficient stable runs equally under so harsh hardware condition It is a critical problem.Because network code has remarkable effect to throughput hoisting, in addition, network code need extra hard Part resource, so, it is one based on the wireless mesh network media access control method that network code has stability autgmentability concurrently Breach.
Wireless mesh network has extensive application in recent years.The predominantly densely populated place such as enterprise, school, market, station Place provides wireless network access solution.It is primarily characterized in that deployment convenient, with low cost, automatic network-building, autgmentability High.Dispose in cable network difficult, in the case that autgmentability cannot ensure, substitute underlying basis using wireless mesh network and set Apply, be the most simple and effective method.Using wireless mesh network provide Internet access service it is critical that how for numerous Wireless terminal provides height to handle up, stable data transmission mechanism.In prior art, the data in order to improve wireless mesh network gulps down The amount of telling, mainly has following several research:
The first kind:Physical layer more high bandwidth;The shortcoming of the method is by hardware technology, improves single-frequency bandwidth or multifrequency is multiple With technical difficulty is big, increased radio reception device price, terminal device is had high demands, belong to a kind of solution cured the symptoms, not the disease Certainly method.High-frequency communication, multi-band communication simultaneously, the cost exchanging handling capacity for is the electromagnetic pollution in wireless signal space.
Equations of The Second Kind:Internet chance route;The shortcoming of the method is that additional communication expense is big, controls complicated, realizes difficulty Greatly.Routing Protocol is generally operational in Internet, chance route normal work using control information need additional transmissions to complete, This leads to data link layer to pay overhead.And chance route implementing is got up, technical difficulty is big, and hardware resource is disappeared Consumption is not also studied in detail.
3rd class:Tightened up media access control method;The shortcoming of such method is requirement wireless netted network node Reach and node between what a certain degree of tacit agreement will do that is to say, that being aware of each other, between node, clock is synchronous Require high.And, once certain equipment goes wrong in network, the other equipment of collaboration also will face same problem. Network universality, robustness, autgmentability are problematic in that.
4th class:Internet adds network code mechanism;The shortcoming of such method is network code independent of medium access Key-course and TCP layer, need to provide reliable broadcast service using extra radio broadcasting agreement.Meanwhile, this kind of method meeting Manufacture the bigger virtual bottleneck node of scope in a network, lead to network congestion on a large scale.And, the congestion control reason of Internet By can lead to this kind of method cannot normal work.In addition, this kind of method also seldom considers the consumption to hardware resource, realize Carry out technical difficulty big, apparatus adaptability is poor.
Independent of the network code mechanism of media access control layer and TCP layer, each node chance will monitor neighbours' section The packet of point broadcast, is placed in the caching of oneself, in case using during decoding.The defect that do so is brought mainly has:1) no save The monitoring neighbor data bag of system is catastrophic to local cache consumption.Its caching consumes in addition to link load, is also subject to neighbours Number affects.And whether these packets of listening to can be utilized is also unknown number.The chance that throughput hoisting is paid becomes Ben Taigao, application is uncertain high, poor controllability.2) whether node prediction neighbours have cached certain packet, Main Basiss chain Road transmission success rate ETX index carries out probability Estimation.According to ROC Calibration Theory, what it used estimates that model has fixing mistake Rate by mistake.High in number of nodes, terminal device is many, and Communication Jamming is big, in the case that radio link quality is poor, this fixed error rate Quite a few coding bag can be led to can not to be correctly decoded, thus wasting more hardware resources and channel resource.3) this Mechanism is generally pursued every time coding and is all organized in once packet as much as possible, to reduce the number of broadcast times of individual node.But This way is in practice and improper.One may not all of destination node can be correctly decoded, and two reliably to broadcast association View, when destination node is many, often limits node communication in larger scope, causes entire area channel utilization low Under.
Content of the invention
Wireless mesh network media access control method based on network code is shown with common media access control method Write different, draw for deficiency in throughput hoisting ability for the existing wireless mesh network media access control method and Internet Enter many defects of encoding mechanism, a kind of present invention height of proposition is handled up, low consumption, has the medium access control of universality robustness concurrently Method processed.
In order to realize above-mentioned task, the technical solution used in the present invention is:
A kind of wireless mesh network media access control method based on network code, in this wireless mesh network, when After one node receives the packet that neighbor node is sent, judge that this packet is general data bag or coded data Bag:
If coded data packet, then this coded data packet is decoded, successfully decoded obtains the general data of needs Bag, decoding is unsuccessful, abandons this coded data packet;
If general data bag, then judge whether this general data bag reaches the formation condition of coded data packet, such as reach To then encoding to it, and the coded data packet obtaining after coding is broadcasted to neighbor node;
The formation condition of coded data packet and cataloged procedure are as follows:
In this wireless mesh network, at least two neighbor nodes of node A, if the forwarding queue of initial time node A For sky, then from the beginning of initial time:After node A receives the general data bag p2 that neighbor node is sent, in forwarding queue Find a general data bag p1, meet formula 1 and formula 2 if there is p1 simultaneously, then p1 and p2 coding is become coded number According to bag p;
(formula 1)
In equation 1, s1, s2 be respectively packet p1, p2 source node MAC Address, d1, d2 be respectively p1, p2 next The MAC Address of hop node, t1, t2 are respectively the time that p1, p2 reach node A, and θ value is 0.3 second;
(formula 2)
In formula 2, r and c is respectively node A from the beginning of initial time, receives the general data bag of neighbor node transmission Accumulative number and node A forwarding queue in, meet the accumulative number of the general data bag of formula 1, wherein r every time add up 1, C adds up 2, ξ value every time for 0.08.
Further, general data bag p1 and p2 be through also or operation coding becomes coded data packet p, specially:
The MAC Address of general data bag p2 destination node and p1 destination host MAC Address are done also or computing, acquired results Insert the destination host MAC field of p1;General data bag p2 source host MAC Address and p1 source host MAC Address are also done or transports Calculate, acquired results insert the MAC field of the source node of p1;The data division of the data division of p2 and p1 is done also or computing, institute Obtain the data division field that result inserts p1;If the data portion length of p1 and p2 is inconsistent, by a side shorter for length Afterbody fills out 0 cover, and the new packet of generation is coded data packet p.
Further, in this wireless mesh network, in each node, it is provided with resource queue, when node is general by one After logical packet is successfully sent to another node, this general data bag is moved into resource queue from forwarding queue, and is This general data bag starts a count-down device, and count-down device initial value is θ, after count-down device zero, by this general data bag Remove from resource queue.
Further, after node receives a coded data packet, it is decoded operate:Node is from the resource of oneself General data bag corresponding with the coded data packet receiving is found, by the general data finding bag and the coded number receiving in queue Carry out also or computing, obtaining the general data bag of needs according to bag.
Further, after node A generates coded data packet p, the step that p is broadcasted is as follows:
Step S1, creates broadcast RTS frame, the MAC Address of the next-hop node of general data bag p1, p2 is write RTS frame In, and determine channel occupancy duration Tb, Tb is added to the call duration time field of broadcast RTS frame, Tb computational methods are as follows:
Tb=5 × SIFS+ (82+L) × t0(formula 3)
In formula 3, SIFS is the shortest stand-by period constant of 802.11 agreement regulations, and L is the length of coded data packet p, t0Time required for one byte of transmission, determined by link bandwidth;
Step S2, node A broadcasts RTS frame request channel;
Step S3, after neighbor node receives RTS frame, determines that oneself replys the stand-by period Tcts of RTS frame, and when waiting Between after reply CTS frame to node A;Tcts computational methods are as follows:
(formula 4)
In formula 4, iMAC is the MAC Address of this neighbor node, and d1, d2 are the next-hop node of packet p1, p2 respectively MAC Address;
Step S4, node A has sent broadcast RTS frame, waits 2 × SIFS+28 × t0After time, check the CTS frame receiving Situation, if the CTS frame that the next-hop node receiving p1, p2 respectively is replied, node A starts after waiting the SIFS time to send to compile Code packet p, wait is kept out of the way in otherwise node A entrance.
Advantages of the present invention mainly have following some:
1. increased network throughput;
Due to introducing network code mechanism to data link layer, the present invention inherently improves network throughput.Hard The network data handling capacity of 7%-40% in the case of part condition is constant, can be improved using the present invention.
2. transplantability is strong, and compatibility is good;
Good backward compatible due to having done to CSMA/CA, therefore support that the equipment of the present invention same can not support this Bright equipment proper communication, networking.Meanwhile, the present invention increases and enhances MAC sublayer, to other aspects of network Do not constitute impact, interface is transparent.
3. it is decoded into power high, additional communication is few;
Different from other network code mechanism, the present invention uses ACK frame data packet header to transmit necessary coding information, section Point does not use ETX route chi to be predicted, and therefore, do not have that predicated error brings cannot decode phenomenon.And, the present invention is not The control information relying on other agreements (as chance route) is it is not necessary to transmit independent control information between node.
4. hardware consumption is few;
Compared with other network code mechanism, this method more focuses on the occupancy to cache resources and computing resource.Node is not Again chance monitor neighbours between communication, thus storage decoding resource caching consumption be down to minimum.
5. part solves network congestion problem;
In the network not having congestion control, when offered load is big, unavoidable around trunk roads bottleneck node and bottleneck node Congestion phenomenon occurs.This method exactly utilize the big advantage of bottleneck node transmission information amount it would be possible to data packet coding one Rise.Thus allowing these packets quickly through bottleneck node, reducing congestion, slowing down the generation of congestion.
Brief description
Fig. 1 is encoding mechanism principle and network design schematic diagram;
Fig. 2 is data is activation phase process figure;
Fig. 3 is data reception phase procedure chart;
Fig. 4 is that ACK frame monitors phase process figure;
Fig. 5 (a) and Fig. 5 (b) is the structural representation of frame in the present invention;
Fig. 6 is coded data packet broadcasting process schematic diagram;
Fig. 7 is this programme overall flow figure;
Fig. 8 is the impact to code machine meeting for the research offered load and ξ determines schematic diagram;
Fig. 9 is the experimental result picture on code machine meeting quantity impact for the research θ;
Figure 10 (a), Figure 10 (b), Figure 10 (c), Figure 10 (d) are under identical ω, different θ, decode resource queue's service condition Figure;
Figure 11 (a), Figure 11 (b), Figure 11 (c), Figure 11 (d) are under different ω, the impact to three kinds of node proportions for the θ Schematic diagram;
Figure 12 (a), Figure 12 (b) are the research experimental result pictures to each method performance impact for the offered load;
Figure 13 (a), Figure 13 (b) are the research experimental result pictures to each method performance impact for the link transmission success rate;
Figure 14 (a), Figure 14 (b), Figure 14 (c), Figure 14 (d) are that research offered load uses the reality of impact to each method caching Test result figure;
Specific embodiment
Applicant disposes large-scale wireless mesh network between floors, is to provide to equipment such as mobile phone, notebook computers Internet access service, needs the media access control method that handling capacity is high, compatibility is good, consumption resource is few, is respectively connect with ensureing Enter the data service quality of equipment.For node hardware condition is limited, the complexity feelings such as demand of handling up height, quality of wireless channel difference Condition is it is proposed that wireless mesh network media access control method based on network code.
This method uses network code mechanism to improve handling capacity, therefore when wireless mesh network is disposed, except network edge Outside node, other nodes at least will have 2 neighbor nodes, and in all neighbor nodes, at least has 1 to can not be mutually straight Connect the neighbor node of letter, as shown in Figure 1.Node B, C, D are in the communication range of A, but node D is in the communication range of B, Only in this way, node A could encode to the round data on this link of B-A-D, else if D is in the communication range of B Interior, B will be directly passed to D data, and A will not obtain code machine meeting.
The all node locations of this method are fixed or only small movement.The communication radius of all nodes are constant.Each section It is respectively provided with and safeguards three queues in point:Forwarding queue, for depositing the packet that will be sent to other nodes, can be general Logical packet or coded data packet;Resource queue, for depositing the general data bag using during decoding;Reduction queue, For depositing the general data bag that after coded data packet sends unsuccessfully, restoring operation uses.
The network code mechanism that this method is used, its core concept is, as shown in figure 1, node D sends commonly first Packet p1 will forward through transit node A to B, centre;After A receives p1, at once p1 is not transmitted to B, but p1 is delayed Deposit a period of time;Node B sends another general data bag p2 to node D, needs also exist for A transfer;After A receives p2, p2 and P1 is encoded to together, and coded data packet p1 p2 is broadcasted, and after node B and D receives coding bag p1 p2, is all decoded Operation, the general data bag each being needed.Whole process consumes three communication cycles, than original " receive and forward " Process reduces by a communication cycle, thus reaching the purpose of lifting handling capacity.
This method based on 802.11 agreements, the general data bag used in scheme, in as 802.11 agreements, two It is used for the packet of transfer data information between node.In this programme, on the basis of 802.11 agreements are original, increased broadcast RTS frame, coded data packet, coding three kinds of frame formats of ACK frame, essentially identical in the form and 802.11 of all kinds of frame data bags, Difference is to increased, in general data bag frame entity head, the packet id field that length is 4B, in coded data packet frame Entity head increased packet id field data packet length field.Fig. 5 (a), Fig. 5 (b) give all numbers using According to frame (bag) form, therefore it is divided into Fig. 5 (a) and two figures of Fig. 5 (b) because picture is larger, but its expression is a set of;Table 1 with As a example the example of Fig. 1, give in the middle of the structure of packet (frame) that this programme is used, with 802.11 in identical packet The explanation of the different field of (frame) implication, except these fields, remaining field is identical with the implication of field in 802.11 agreements.Its In " frame " be data link layer concept, be the unit of packet.In this programme, " frame " is identical with the implication of " bag ", refer both to containing Control information data information is in interior bit sequence.It is emphatically the discussion to frame or bag internal structure, therefore in this programme The place of all appearance " frame " all can use " bag " to replace, and such as " coded frame data " refers to " coded data packet ".
Table 1
First, the inventive method detailed step
In the wireless mesh network structure of the present invention, in addition to fringe node, remaining node all enters according to this method The forwarding of row packet and processing procedure, the thing that these nodes are done is identical, therefore for the ease of clearly introducing this Scheme, as a example the model shown in below by Fig. 1, scheme is simplified to an information exchange unit, that is, between tri- nodes of A, B, D Information interactive process illustrating;A node in this model can be in mesh network arbitrary one in addition to fringe node Individual node, and B, D node is the neighbor node of A, and D needs to send general data bag p1 to B, and the transmission of B needs is common simultaneously Packet p2 is to node D.
In this programme, produce packet in different intra-nodes and receive stage, packet sending node and the monitoring of ACK frame In the stage, separately below each stage is described in detail.
1. packet receives the stage
In this programme, it is sent to the packet of destination node from source node, when source node obtains this packet, referred to as General data bag, the packet structure in this packet and 802.11 is identical, is uniquely a difference in that the frame in this packet is real Body head increased the packet id field that length is 4B, and this id field is generated by source node.General data bag is each in a network In the transmittance process of individual node, if it meets encoding condition at certain node, just two general data packet encoders are become Coded data packet is simultaneously broadcasted;As it does not meet encoding condition, then this general data bag is according to the common number in the middle of 802.11 agreements Equally forwarded according to bag, thus completing the transmittance process at this node, therefore one node receives the number that neighbor node is sent Just there are two types according to bag:General data bag and coded data packet.
After a node A receives the packet that neighbor node is sent, judge that this packet is general data bag or volume Code packet, as shown in Figure 3;
Step S10, determines the type of packet
After node physical layer receives completely errorless packet, judge that this is one according to packet MAC header length General data bag or coded data packet.Frame is divided into three parts:Frame head (Mac header), frame entity (body), FCS domain. If MAC header length is 30B, show to receive a general data bag, if MAC header length is 36B, show to receive To a coded data packet.
For coded data packet, this coded data packet is decoded, successfully decoded obtains the general data bag of needs;Solution Code is unsuccessful, abandons this coded data packet;After obtaining general data bag, this packet is regarded the new packet receiving by node Equally processed;
For general data bag, the packet ID that node extracts this data packet frame entity head first is denoted as idx, then The resource queue of oneself searches.If have found the decoding resource bag comprising idx, the general data bag receiving was described once It is a part for certain coded data packet, but that coded data packet is not successfully received, upper hop node is coded number After bag decoding, carry out retransmission operation, therefore node will remove the decoding resource bag searching out.If can not find comprising idx Decoding resource bag, illustrate that the general data bag receiving can carry out coded treatment.
The formation condition of coded data packet and cataloged procedure are as follows:
The forwarding queue of setting initial time node A is sky, does not have packet in forwarding queue.Each node is slow Deposit middle maintenance two shaping variable r and c, four list lattice b.The initial time value of r and c is zero, from the beginning of initial time, The value of two variables constantly adds up always;B deposits the auxiliary information of general data bag in forwarding queue.
Here the moment that initial time illustrates that the solution of the present invention and defines, in this moment, node A's There is no packet in forwarding queue.This initial time can be understood as the time point that node A is arranged in sensor network, that is, In moment when sensor node is started working, the value of variable r and c safeguarding from this moment, node A is just from the beginning of 0 Add up always.
After node A receives the general data bag p2 that neighbor node B sends, seek from the front to the back in the form b of forwarding queue Look for a general data bag p1, meet formula 1 and formula 2 if there is p1 simultaneously, then p1 and p2 coding is become coded data Bag p;
(formula 1)
In equation 1, s1, s2 be respectively packet p1, p2 source node MAC Address, d1, d2 be respectively p1, p2 next The MAC Address of hop node, node A can be obtained by routing algorithm;T1, t2 are respectively the time that p1, p2 reach node A, θ value For 0.3 second, its determination process was shown in experiment two.
Condition given by formula 1 is that, after node A receives general data bag p2, there is packet in its forwarding queue P1 does not also forward, and p1 and p2 meets:The next-hop node (destination node) of p1 is the source node of p2, the source section of p1 Point is the next-hop node (destination node) of p2, and the time difference that p2 and p1 reaches node A, (i.e. the source node of p1 was also in money less than θ The copy of an in store p1 in the queue of source), after meeting these conditions, be given in Fig. 1 example, D needs to send and commonly counts According to bag p1 to B, B needs to send general data bag p2 to this situation of node D simultaneously;
(formula 2)
In formula 2, r receives accumulative of the general data bag that neighbor node sends for node A from the beginning of initial time The value of r, as long as that is, A receives a general data bag, is just added 1 by number;In the forwarding queue of c finger joint point A, meet the general of formula 1 The accumulative number of logical packet, you can the number of the packet being encoded, if the bar of a general data bag coincidence formula 1 Part, can be encoded, then the value of c cumulative 2;ξ is a fixed constant, and its value is 0.08;K is code switch, works as k<During ξ, Illustrate that present node works in case of a low load, or neighbouring network is providing service for the application such as FTP, Streaming Media, then should General data bag does not need to encode, and the general data bag according to 802.11 is forwarded;And k>During ξ, illustrate to flow through present node Data flow direction complicated enough, the coding of general data bag should be carried out using this method, the determination process of ξ value is shown in experiment one.
Step S11, the coding of general data bag
To meeting general data bag p1 and p2 of encoding condition through also or operation coding becomes coded data in this programme Bag p, i.e. p=p1 p2, specially:
General data bag p2 is put into reduction queue by node A, in case reduction process makes when coded data packet p sends unsuccessfully With.After node A destination node MAC field in the MAC header of p1, increase a destination node 2MAC field, wherein write The destination node MAC Address of p2;Do also or computing with the destination host MAC Address of destination host MAC and p2 of p1, acquired results Insert the destination host MAC field of p1;Do also or computing with the source host MAC Address of source host MAC and p2 of p1, acquired results Insert the source host MAC field of p1;After the frame solid data bag id field of p1, add packet ID, p1 frame entity number of p2 According to partial-length, p2 frame solid data partial-length;Also make of the frame solid data part of p1 and the frame solid data part of p2 Or computing, acquired results insert the frame solid data part field of p1, if the data portion length of p1 and p2 is inconsistent, will 0 cover is filled out in the shorter square tail portion of length;The new packet then generating after both codings is coded data packet p.
Step S12, coding information is transmitted
Node A by general data bag p2 be encoded to p1 together with after, make one coding ACK frame, the suffix ID1 word of this frame Section inserts the packet ID of packet p1 frame header, and suffix ID2 field inserts the packet ID of packet p2 frame header.Wait After the SIFS time, node A is sent to node B by encoding ACK frame.
Step S13, coded data packet decodes
After A makes coded data packet p, to neighbor node broadcast.After packet p1 is sent to node A by node D, section P1 is moved into resource queue by point D from forwarding queue, and starts a count-down device, count-down device for this general data bag p1 Initial value is θ, after count-down device zero, this general data bag is removed from resource queue.It is moved into common in resource queue Packet p1 uses when D receives and is decoded by the coded data packet that p1 generates.
Its neighbor node D receives the p of A broadcast, and the head from the frame entity of this p first extracts packet 1ID, data Bag 2ID, packet 1 length, packet 2 length, are denoted as id1, id2, l1, l2 respectively.Node D seeks in the resource queue of oneself Look for general data bag corresponding with coded data packet p receiving, that is, frame entity head comprises the general data bag of id1 or id2.Look for To after this general data bag is denoted as p3, if can not find p3, illustrating that p can not be successfully decoded, p abandoned.
Node D extracts packet ID data packet length from p3, is denoted as id3 and l3 respectively.If id3 is equal to id2, Destination node MAC field by the destination node 2MAC address reproduction of coded data packet p to p3;Destination host MAC ground with p3 The coding destination host MAC Address of location and p does also or computing, and acquired results put into the destination host MAC field of p3;Source with p3 The coding source host MAC Address of host MAC address and p does also or computing, and acquired results put into the source host MAC field of p3;With Encoded data portion in data division in p3 frame entity and p coded frame entity does also or computing, if acquired results length More than l2, then intercepted, l2 byte before only retaining, and the result after intercepting is write the frame solid data part of p3.id3 It is similar to equal to way during id1;The packet p2 that the p3 of new production obtains after decoding.
Node D, when decoding p, determines and replys ACK frame stand-by period Tack, then reply common ACK frame to node A, table Bright oneself have received coded data packet, and packet is successfully decoded.After node D is successfully decoded p, by the p3 processing Packet submits to Internet.
Note:The coded data packet decoding process of step S13 introduction, is explained with node D for present node, And if node A receives the coded data packet that other nodes are sent, it is the same with the decoding process of this part.It is current with D Node explains the explanation being to carry out with the example that Fig. 1 provides, actually in application process, the process that node A is completed It is all generations in each node in addition to fringe node, B-A-D is that abstracting is used for explaining this programme Naive model, B, D are the same with the process that A completes in fact.
2. packet transmission phase
Step S20, determines channel occupancy type
Node A judges the length of first packet MAC header in the forwarding queue of oneself, if 30B, explanation This is a general data bag, according to 802.11 RTS-CTS flow operations.
If MAC header length is 36B, explanation will broadcast a coded data packet, such as coded data packet p, such as 2 Shown.
Step S21, creates RTS frame
Create a broadcast RTS frame, the MAC Address of oneself is added to the source node MAC field of this frame, by the MAC of p Destination node 1MAC in header and destination node 2MAC field copy to the corresponding field of this coding RTS frame, with shown in Fig. 1 As a example model, the MAC Address of next-hop node of general data bag p1, p2 will copy to the MAC field of this broadcast RTS frame; It is then determined that channel occupancy duration Tb, Tb is added to RTS frame traffic time field, Tb computational methods are as follows:
Tb=5 × SIFS+ (82+L) × t0(formula 3)
In formula 3, SIFS is the shortest stand-by period constant of 802.11 agreement regulations, and L is the length of coded data packet p, t0Time required for one byte of transmission, determined by link bandwidth;Fig. 6 is that coded data packet sends overall process schematic diagram, Tb is that from node A starts to send broadcast RTS frame and arrives node B and terminate transmission time of being experienced of ACK frame, includes altogether 5 SIFS Time, 1 broadcast RTS frame transmission time, 2 CTS frame transmission times, 1 coded frame data transmission time and 2 common ACK Frame transmission time.Broadcast RTS frame length 26B, CTS frame and common ACK frame length are all 14B.
Step S22, node A broadcasts RTS frame request channel;
Step S23, after neighbor node receives RTS frame, determines that oneself replys the stand-by period Tcts of RTS frame, and is waiting CTS frame be replied to node A after time;Tcts computational methods are as follows:
(formula 4)
In formula 4, iMAC is this neighbor node, and such as neighbor node D receives this RTS frame, the as MAC Address of D, d1, d2 The MAC Address of the next-hop node of packet p1, p2 respectively, i.e. the MAC Address of B and D;After node D waits the Tcts time, such as Fruit does not have node using channel around finding, then reply CTS frame to node A, show that oneself can be communicated with node A.Connecing Tb-Tcts-40 × the t getting off0In time, even if the RTS frame receiving the transmission of other nodes does not do any reply more yet.If section Point D finds that surrounding channel is currently being used, then directly lose the RTS frame that node A sends.The thing that node B is done is identical with D.
Step S24, judges channel request result
Node A has sent broadcast RTS frame, waits 2 × SIFS+28 × t0After time, check the CTS frame condition receiving, such as Fruit receives the CTS frame that the next-hop node of p1, p2 is replied respectively, channel request success is described, then after node A waits the SIFS time Start to send coded data packet p, if only receiving a CTS frame or not receiving CTS frame, the failure of specification request channel, section Point A enters and keeps out of the way wait.
After node D receives the coded frame data of A broadcast, it is decoded operating (detailed process is shown in step S13), and determines back The stand-by period Tack of multiple ACK frame, Tack computational methods are as follows:
Wherein iMAC is the MAC Address of node D, and MACheader.DtMAC1 is the mesh of the coded data packet that node D receives Node 1MAC address, i.e. the MAC Address of B;MACheader.DtMAC2 is destination node 2MAC address, i.e. the MAC Address of D. Node D waits the Tack time, if encode wrapping decoding correctly, replys common ACK frame to node A, otherwise direct discarding receives Coded data packet.The thing that node B is done is identical with D.
Step S25, judges retransmission state
After p=p1 p2 is sent by node A, wait 2 × SIFS+28 × t0Time, check the ACK frame feelings receiving Condition.If node A receives two ACK frames from node B and node D respectively, illustrate that B and D has been received by coded data packet p1 P2 is simultaneously successfully decoded, and at this moment p is removed by node A from forwarding queue, and finds p2 from the reduction queue of oneself, and p2 is removed. If an ACK frame is all confiscated, enter and keep out of the way wait.
If only receiving the ACK frame of node D reply, without receiving the ACK frame of B reply, illustrate that B could not be properly received volume Code packet p or can not be correctly decoded.Now, node A needs to find general data bag p2 from the reduction queue of oneself, directly Replace the p1 p2 in forwarding queue with p2, then keep out of the way wait.
If only receiving the ACK frame of node B reply, without receiving the ACK frame of D reply, illustrate that B could not be properly received volume Code packet p1 p2 or can not be correctly decoded.Node A finds general data bag p2 from the reduction queue of oneself.Node A needs Destination node 2MAC field (address) in the MAC header of coded data packet p1 p2 is removed;With encoding destination host The destination host MAC Address of MAC Address and p2 does also or computing, replaces the coding destination host MAC Address of p with acquired results; Make also or computing of the source host MAC Address of coding source host MAC Address and p2, replace the coding source host of p with acquired results MAC Address;Remove packet 2ID data bag 2 length of coded data packet frame entity head;With coded number in the frame entity of p Do the encoded data portion also or computing replacing p with acquired results according to part and data division in the frame entity of p2;According to coding The remaining packet of frame entity head 1 length blocks coded frame entity, abandons redundance;Refresh the FCS field of p;Last from P2 is removed in reduction queue.So, just coded data packet p is reduced into packet p1, then keeps out of the way wait.
3.ACK frame monitors the stage
The embodiment of the present invention ACK frame monitoring stage includes updating resource queue, safeguards resource timer etc..Major function is Management decoding resource queue.In this stage, node not only will be intercepted and will be sent to the ACK frame of oneself, also will keep out of the way During treating, the ACK frame of transmission between other nodes of idle listening.
Fig. 4 monitors phase process figure for ACK frame, illustrates that the present embodiment ACK frame monitors stage mistake in conjunction with Fig. 1, Fig. 5 and Fig. 6 Journey figure comprises the following steps that:
Step S30, determines ACK frame state.After node listens to ACK frame, check that the destination node MAC field of ACK frame is The no MAC Address with oneself is identical.If identical, illustrate that this ACK frame is the confirmation of the packet that oneself was sent just now, need Update resource queue establishing resource timer;If it is not the same, illustrating that this ACK frame is that idle listening obtains, check this ACK Whether frame is coding ACK frame, wherein whether comprises suffix id field, if not containing suffix id field, directly by this ACK Frame abandons, and otherwise, needs to safeguard resource timer.
Step S31, updates resource queue.After node B transmission general data bag p2 is to node A, wait SIFS, if confiscated To ACK frame, illustrate that p2 sends unsuccessfully, enter and keep out of the way wait.If receiving ACK frame, no matter whether this ACK frame encodes ACK frame, All illustrate that A has had successfully received p2.General data bag p2 is moved into resource queue from forwarding queue by node B, and is resource bag p2 Start a count-down device, count-down device initial value is θ, after count-down device zero, resource bag p2 is removed from resource queue.Cause It is according to formula 1, count-down device is zeroed, node A will not encode to p2 again.
Step S32, checks coding information.If the ACK frame that node B receives belongs to coding ACK frame, node A is described not only Be properly received general data bag p2, and by p2 with other data packet codings to together.Node B is from the suffix of ACK frame Extract packet ID in ID1 and be denoted as id1, i.e. the packet ID of general data bag p1 frame entity head.Node B stops step S31 In for resource bag p2 open count-down device, prevent p2 from surprisingly being removed, lead to coded data packet p1 p2 not decode.Node B The packet ID of general data bag p2 frame entity head is changed to id1, so that the operation of step S13.Hereafter, general data bag p2 from It is removed only two kinds situations in resource queue to occur:One is that coded data packet p reaches and is successfully decoded, and two is frame entity head Packet for id1 reaches (step S13).
Step S33, updates count-down device.After node D transmission general data bag p1 is to node A, receives node A and reply really Recognize ACK frame, that is a common ACK frame, and according to step S31, p1 is moved to the resource queue of node D, and one is fallen to count When device be resource bag p1 timing.Although this posterior nodal point D does not send data using channel, communication range to be intercepted always Communication between other nodes interior.Node A receives after node B is sent to its general data bag p2 and reaches encoding condition, will P2 encodes, and replys a coding ACK frame to node B.This of now node D meeting idle listening encodes ACK frame.Node D carries Suffix ID1 taking coding ACK frame is denoted as id1, extracts suffix ID2 and is denoted as id2.Node D searches frame entity head in resource queue Portion is id1 resource bag, if it is found, the coding ACK frame that explanation idle listening arrives is relevant with oneself, the resource finding bag frame is real Body head is changed to id2, and stops the count-down device of this resource bag;If can not find, this coding ACK frame is described with oneself no Close, directly abandoned.
2nd, in the inventive method each relevant parameter determination:
Experiment one:The impact to code machine meeting for the research offered load, and the determination of ξ;
Step one, emulation experiment scene initialization:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, and the link transmission success rate between node is surveyed by physical environment ?.A length of 5s during experiment simulation every time, each node is per second to produce ω packet, and destination address is selected at random, each data The length of bag is 1000B, and link bandwidth is 54Mbps, and Internet uses minimum hop number to route, and is loaded by ω controlling network.
Step 2, takes ω=50, and 100,150 ... 300, for the value of each ω, take θ=0.25s, 0.50s, 0.75s, 1.00s, therefore, has done 6 × 4 groups of assessments altogether.In order to ensure the authenticity of experimental result, every group of assessment has carried out 1000 realities Test, the desired value taking result is as every group of final result.
Step 3, analysis and process experimental data:
Fig. 8 shows under different ω values, in step S23The situation of change of (data flow complexity).In figure is not Collinear represent different θ values.From experimental result it can be seen that:(1) for different θ, data flow complexity has same tendency. (2) work as ω<When 50, data flow complexity increases very fast;Increase with ω, data flow complexity is gradually lowered, and then tends to steady Fixed.(3) the data flow complexity curve distance of different θ is close.These three observe result explanation, when offered load hour, node It is easy to get channel resource, the packet in forwarding queue seldom, almost can not find the packet being encoded to together; Increase with offered load, forwarding queue starts to pile up packet, occur in that many two packets can be encoded to together Situation is that is to say, that code machine can increase;But it is possible to the total amount being encoded to packet together accounts for the ratio receiving packet It is not to increase always, when offered load reaches a very high value, data flow complexity levels off to a constant, and this is normal Amount is relevant with deployment with the network bandwidth.That is, when offered load is very high, the factor of impact data flow complexity is mainly The complexity of data flow in network.Therefore, we pass through to observe, when<When 0.08, it has been only possible to two kinds of situations and has occurred:One is In the case of node and its neighbours are operated in low-load, forwarding queue is essentially sky;Two is node and its neighbours for FTP, stream Some special applications such as media provide service, and in network, the complexity ratio of data flow is relatively low, substantially unidirectional.In order to reduce Algorithm complexity, ξ is defined as 0.08 by us.
Experiment two:The impact to code machine meeting quantity for the research θ;
Step one, emulation experiment scene initialization:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, and the link transmission success rate between node is surveyed by physical environment ?.A length of 5s during experiment simulation every time, each node is per second to produce ω packet, and destination address is selected at random, each data The length of bag is 1000B, and link bandwidth is 54Mbps, and Internet uses minimum hop number to route, and is loaded by ω controlling network.
Step 2, takes θ=0.25s, 0.50s, 0.75s, 1.00s, takes ω=10, and 20,30,40,50,100,150,200, 250,300, altogether carry out 4 × 10 groups of assessments.In order to ensure the authenticity of experimental result, every group of assessment has carried out 1000 realities Test, the desired value taking result is as every group of final result.
Step 3, analysis and process experimental data:
Fig. 9 shows under different θ, and code machine can situation of change.In figure is not collinear to represent different ω values.From experimental result It can be seen that:(1) work as ω<When 50, code machine can increase little with θ and change;(2) work as ω>When 50, code machine can be with θ increases and increases.Observe result explanation for this two, when offered load hour, even if θ is big again, be also not in more coding Chance, main node is easy to apply for that the data is activation that will forward to channel is gone out;When offered load is big, increase with θ, Code machine can be gradually increasing, and the growth trend under different loads is basically identical, and this increases acceleration is to have data flow Complexity determines.In addition, the vertical range ratio of 6 lines is larger below in Fig. 9, much larger than the vertical range of above 4 lines, say The complicated impact to code machine meeting of bright network is some larger.This experiment finally give it was concluded that θ to code machine can impact Be far from ω greatly, because can not set very big in order to obtain more code machine meetings by θ.
Experiment three:The impact that research θ takies to nodal cache, and the determination of θ;
Step one, emulation experiment scene initialization:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, and the link transmission success rate between node is surveyed by physical environment ?.A length of 5s during experiment simulation every time, each node is per second to produce ω packet, and destination address is selected at random, each data The length of bag is 1000B, and link bandwidth is 54Mbps, and Internet uses minimum hop number to route, and is loaded by ω controlling network. The caching of each node is allocated as follows:Forwarding queue length does not limit, decoding resource queue length 400, if decoding resource team Row, using finishing, separately have the emergent queue that length is 500 to use for depositing decoding resource, recover queue and take and decoding resource team There is correlation in row service condition, do not discuss.
Step 2, takes θ from 0.1s to 1.0s, and leapfrog is 0.1s, takes ω from 50 to 300, and leapfrog is 50, has altogether carried out 10 × 6 groups of assessments.In order to ensure the authenticity of experimental result, every group of assessment has carried out 1000 experiments, has taken the desired value of result to make For every group of final result.
Step 3, analysis and process experimental data:
Figure 10 (a-d) shows under identical ω, different θ, resource queue's service condition.In figure different shape point represents difference The node of consumption level:Square nodes resource consumption is serious, not only consumes Gan Liao resource queue, also employs emergent queue;Circular Node resource is using normal;Rhombus node resource use on the low side, utilization rate is low.From experimental result it can be seen that:(1) when θ is less, The resource queue of most nodes is not fully used;(2) although the resource queue of most node obtains fully when θ is larger Using, but the node that resource queue is exhausted also has a lot.
Figure 11 (a-d) shows under different ω, the impact to three kinds of node proportions for the θ.Permissible from experimental result Find out:(1) when offered load is less, increase with θ, the distribution proportion of three kinds of nodes is held essentially constant;(2) bear in network When load is in middle reaches, compare the light situation of load, the low node of Buffer Utilization is greatly reduced, and is all converted into normal node, But meanwhile, under this intermediate part load, increase with θ, understand the ill node that some normal node is converted into redness, work as θ> During 0.3s, this change is particularly evident;(3) when offered load is higher, the low node of Buffer Utilization is less, but this node Quantity also begin to receive the impact of θ, and, the quantity of ill node is instead few than under intermediate part load, and this is due to bearing high In the case of load, data volume can be dispersed in wide range, rather than quickly to a part of node sinks.
These observe result explanation, and in the case that offered load is relatively low, the service condition to caching of θ does not almost have shadow Ring, this is the deployment of the network of principal element and the link-quality of impact Buffer Utilization, when offered load is higher, the choosing of θ Select and can bring two main impacts, one is the quantity of impact poor efficiency node, two is the quantity of the ill node of impact.From this Experiment, finally giving as a result, wanting to increase Buffer Utilization, control ill node in the range of standing, θ takes simultaneously 0.3s.
3rd, the contrast experiment of the inventive method and additive method
Getting off, we test to verify the advantage that the inventive method is with respect to other agreements by one group.Experiment mainly to The performance of lower three kinds of algorithms is compared:
(1)FSNC:I.e. method proposed by the present invention.
(2)CSMA/CA:This agreement is 802.11 to use most media access control methods, is entered using RTS-CTS mechanism Row conflict avoidance, does not have reliable broadcast module, does not have encoding mechanism.
(3)XORs:The method is first classical case combining network code with practical application, is also to be ground Study carefully and most methods are discussed.Different from method proposed by the present invention, network code mechanism is placed on media access control layer by XORs And TCP layer between, modification is not all made to two levels.
In these experiments, we used this concept of information throughput and do measurement index, it is meant that:Unit interval Interior, the information content sum of the packet that all nodes of the whole network send, wherein information content, refer to also participate in during coding or transport The number of the packet calculated, not having encoded packet information content permanent is 1.Experiment mainly to prove from following several respects The advantage of the present invention:
1. the impact to protocol capabilities for the offered load, the 2. impact to protocol capabilities for the link transmission success rate, 3. network is negative Carry the impact that caching is utilized.
(1) impact to protocol capabilities for the offered load:
Artificial network initializes:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, and the link transmission success rate between node is surveyed by physical environment ?.A length of 5s during experiment simulation every time, each node is per second to produce ω packet, and destination address is selected at random, each data The length of bag is 1000B, and link bandwidth is 54Mbps, and Internet uses minimum hop number to route, and is loaded by ω controlling network. According to result of the test before, our setup parameter θ are 0.3s, and ξ is 0.08.
Emulation experiment process:
In this experiment, ω=10 are taken, 20,30,40,50,100,150,200,250,300, altogether carry out 10 groups and commented Estimate.In order to ensure experimental result authenticity, for each method, every group of assessment has carried out 1000 tests, has taken the expectation of result Value is as every group of final result.
Experimental result:
Figure 12 (a, b) shows the relation in the middle of each agreement the whole network multi-to-multi handling capacity and offered load ω.From in figure As can be seen that increasing with offered load, not having the handling capacity of the CSMA/CA of encoding mechanism to be gradually increased and then tending to be steady, This be due to offered load higher when, channel width is depleted, and the whole network is handled up will not infinitely be increased down;FSNC compares CSMA/ CA has obvious throughput hoisting, maintains essentially in more than 7%, can reach 40% when;Offered load be in 50 to 100 it Between when, the handling capacity of XORs is higher than FSNC, this is because XORs with FSNC compares, main difference is that employing chance detects Listen, chi is route according to ETX and carries out neighbor state prediction, by multiple packet encoders to together.But in the case of load is relatively low and higher, The handling capacity of XORs be not so good as FSNC, this is because, load relatively low when, XORs find less than by multiple packet encoders to machine together Meeting, thus abandoning encoding, when loading higher, has part of nodes once by multiple data packet codings together, it is more right to be broadcast to As, but it is because that XORs is also specifically used reliable Radio Broadcasting Agreements, when this results in broadcast code bag, request channel is very tired Difficulty, often due to some node channel hurries and cancels whole broadcasting process;In addition, the packet in large information capacity is being broadcasted When, the neighbours of all receiving nodes can not use channel, and it is low to which results in channel resource utilization rate in larger scope, Thus have impact on the whole network handling capacity.This description of test, FSNC has higher handling up than CSMA/CA, has more preferably than XORs simultaneously Adaptability, can adapt to multiple network load.
(2) impact to protocol capabilities for the link transmission success rate:
Artificial network initializes:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, a length of 5s during each experiment simulation, the generation per second of each node ω packet, destination address is selected at random, and the length of each packet is 1000B, and link bandwidth is 54Mbps, and Internet makes With minimum hop number route, loaded by ω controlling network.According to result of the test before, our setup parameter θ are 0.3s, and ξ is 0.08.
Emulation experiment process:
In this experiment, ω=100 are taken, 300, generated using random, meet the link transmission success rate generation of Gaussian Profile For actually measured link transmission success rate, Gaussian Profile desired value takes 1 to 0.8, and leapfrog is 0.02.Altogether carry out 2 groups to comment Estimate, in order to ensure experimental result authenticity, for each agreement, every group of assessment has carried out 1000 tests, taken the expectation of result Value is as every group of final result.
Experimental result:
Figure 13 (a, b) shows under intermediate part load and high load condition, each agreement the whole network multi-to-multi handling capacity and chain Relation between the transmission success rate of road.It can be seen that in the case of intermediate part load, being deteriorated with channel circumstance, CSMA/ CA and FSNC is required for paying extra information throughput to overcome the wrong bag packet loss phenomenon that channel circumstance brings, and XORs is in letter In the case that road environment is good, there is higher handling capacity, because at this being, the very high ratio of result that neighbours' forecast model of XORs draws Example is all correct, but is deteriorated with channel circumstance, and the forecast model accuracy of XORs starts to reduce, and a lot of coding bags can not be by It is successfully decoded, handling capacity starts close to FSNC.In high load situations, XORs and CSMA/CA handle up closely, this is During due to XORs broadcast high information quantity coding bag, the neighbours of all receiving nodes as silent status, are led to regional letter Road utilization rate is low, thus have impact on the whole network handling up;And, both agreements handle up little with link-quality change and Change, when this is due to loading high, channel has not been provided that extra bandwidth for data packet retransmission.Now, FSNC is still Remain 7% lifting of handling up.This description of test, the performance of FSNC is affected less, robustness by link transmission success rate Higher.
(3) impact that offered load utilizes to caching:
Artificial network initializes:
It is 1400m that applicant simulates a length, and width is the wireless mesh network of 600m, wherein 86 sections of arrangement Point.In this experiment, the communication radius of each node are 175m, and the link transmission success rate between node is surveyed by physical environment ?.A length of 5s during experiment simulation every time, each node is per second to produce ω packet, and destination address is selected at random, each data The length of bag is 1000B, and link bandwidth is 54Mbps, and Internet uses minimum hop number to route, and is loaded by ω controlling network. According to result of the test before, our setup parameter θ are 0.3s, and ξ is 0.08.
Emulation experiment process:
In this experiment, ω=60 are taken, 100,200,300, altogether carry out 4 groups of assessments, true in order to ensure experimental result Reality, for each agreement, every group of assessment has carried out 1000 tests, and the desired value taking result is as every group of final result.
Experimental result:
Figure 14 (a-d) shows that two methods of XORs and FSNC decode the use of caching resource queue and the pass of offered load System.It can be seen that under various offered loads, the caching usage amount of XORs node is all high than FSNC, and some situations are very To exceeding several times, this is because XORs node not only caches itself forwarded over data, neighbours' section that also caching chance listens to The data of point, and neither one good cache management mechanism.In addition, XORs point is more more extensive than the distribution of FSNC point, and FSNC point is more concentrated it is meant that the caching of XORs uses and differs greatly, method less stable, and the distribution to caching is more difficult to control System, by contrast, FSNC is more stable, is also easier to control.

Claims (4)

1. a kind of wireless mesh network media access control method based on network code is it is characterised in that in this wireless mesh In network, after a node receives the packet that neighbor node is sent, judge this packet be general data bag or Coded data packet:
If coded data packet, then this coded data packet is decoded, successfully decoded obtains the general data bag of needs, solution Code is unsuccessful, abandons this coded data packet;
If general data bag, then judge whether this general data bag reaches the formation condition of coded data packet, such as reach then It is encoded, and the coded data packet obtaining after coding is broadcasted to neighbor node;As formation condition can not be reached, then This general data bag is forwarded according to 802.11 agreements;
The formation condition of coded data packet and cataloged procedure are as follows:
In this wireless mesh network, at least two neighbor nodes of node A, if the forwarding queue of initial time node A is sky, Then from the beginning of initial time:After node A receives the general data bag p2 that neighbor node is sent, forwarding queue is found one Individual general data bag p1, meets formula 1 and formula 2 if there is p1 simultaneously, then p1 and p2 coding is become coded data packet p;
In equation 1, s1, s2 are respectively the source node MAC Address of packet p1, p2, and d1, d2 are respectively p1, p2 next-hop section The MAC Address of point, t1, t2 are respectively the time that p1, p2 reach node A, and θ value is 0.3 second;
In formula 2, r and c is respectively node A from the beginning of initial time, receives the tired of the general data bag that neighbor node sends In the forwarding queue of meter number and node A, meet the accumulative number of the general data bag of formula 1, cumulative 1, c is every every time for wherein r Secondary cumulative 2, ξ value is 0.08;
Described general data bag p1 and p2 through also or operation coding becomes coded data packet p, specially:
General data bag p2 destination host MAC Address and p1 destination host MAC Address are done also or computing, acquired results insert p1 Destination host MAC field;General data bag p2 source host MAC Address and p1 source host MAC Address are done also or computing, gained Result inserts the source host MAC field of p1;The data division of the data division of p2 and p1 is done also or computing, acquired results are inserted The data division field of p1;If the data portion length of p1 and p2 is inconsistent, 0 benefit is filled out in a square tail portion shorter for length Position, the new packet of generation is coded data packet p.
2. the wireless mesh network media access control method based on network code as claimed in claim 1 it is characterised in that In this wireless mesh network, in each node, it is provided with resource queue, when a general data bag is successfully transmitted by node After another node, this general data bag is moved into resource queue from forwarding queue, and starts for this general data bag One count-down device, count-down device initial value is θ, after count-down device zero, this general data bag is removed from resource queue.
3. the wireless mesh network media access control method based on network code as claimed in claim 2 it is characterised in that After node receives a coded data packet, it is decoded operate:Node is found from the resource queue of oneself and is received Coded data packet corresponding general data bag, the general data finding bag and the coded data packet that receives are carried out also or fortune Calculate, obtain the general data bag of needs.
4. the wireless mesh network media access control method based on network code as claimed in claim 1 it is characterised in that After described node A generates coded data packet p, the step that p is broadcasted is as follows:
Step S1, creates broadcast RTS frame, the MAC Address of the next-hop node of general data bag p1, p2 is write in RTS frame, and Determine channel occupancy duration Tb, Tb is added to the call duration time field of broadcast RTS frame, Tb computational methods are as follows:
Tb=5 × SIFS+ (82+L) × t0(formula 3)
In formula 3, SIFS is the shortest stand-by period constant of 802.11 agreement regulations, and L is the length of coded data packet p, t0For passing Time required for a defeated byte, determined by link bandwidth;
Step S2, node A broadcasts RTS frame request channel;
Step S3, after neighbor node receives RTS frame, determines that oneself replys the stand-by period Tcts of RTS frame, and after the stand-by period Reply CTS frame to node A;Tcts computational methods are as follows:
In formula 4, iMAC is the MAC Address of this neighbor node, and d1, d2 are the MAC of the next-hop node of packet p1, p2 respectively Address;
Step S4, node A has sent broadcast RTS frame, waits 2 × SIFS+28 × t0After time, check the CTS frame condition receiving, If the CTS frame that the next-hop node receiving p1, p2 respectively is replied, node A starts after waiting the SIFS time to send coded number According to bag p, wait is kept out of the way in otherwise node A entrance.
CN201410216133.2A 2014-05-21 2014-05-21 Media access control method for wireless mesh network based on network coding Active CN103957085B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410216133.2A CN103957085B (en) 2014-05-21 2014-05-21 Media access control method for wireless mesh network based on network coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410216133.2A CN103957085B (en) 2014-05-21 2014-05-21 Media access control method for wireless mesh network based on network coding

Publications (2)

Publication Number Publication Date
CN103957085A CN103957085A (en) 2014-07-30
CN103957085B true CN103957085B (en) 2017-02-15

Family

ID=51334319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410216133.2A Active CN103957085B (en) 2014-05-21 2014-05-21 Media access control method for wireless mesh network based on network coding

Country Status (1)

Country Link
CN (1) CN103957085B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294807B (en) * 2017-07-04 2020-02-11 中国联合网络通信集团有限公司 Protocol interoperability testing method and device
CN111327707B (en) * 2020-03-05 2022-04-05 重庆邮电大学 Cache replacement method based on network coding in wireless network
CN112584460B (en) * 2020-12-09 2022-06-03 重庆邮电大学 Opportunistic routing selection method based on network coding in wireless network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101611598A (en) * 2007-03-08 2009-12-23 英特尔公司 For two-way relaying makes up grouping in physical layer
EP2216954A1 (en) * 2009-02-10 2010-08-11 Fujitsu Limited Data relay apparatus, communication apparatus and communication method
CN101888358A (en) * 2010-07-15 2010-11-17 华中科技大学 Transmission method for reducing computational complexity of two-way relay nodes based on network coding

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8223728B2 (en) * 2007-04-04 2012-07-17 Nokia Corporation Combined scheduling and network coding for wireless mesh networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101611598A (en) * 2007-03-08 2009-12-23 英特尔公司 For two-way relaying makes up grouping in physical layer
EP2216954A1 (en) * 2009-02-10 2010-08-11 Fujitsu Limited Data relay apparatus, communication apparatus and communication method
CN101888358A (en) * 2010-07-15 2010-11-17 华中科技大学 Transmission method for reducing computational complexity of two-way relay nodes based on network coding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"基于网络编码的MAC协议研究";王龙翔;《中国优秀硕士论文全文数据库》;20140115;I136-357 *
"无线多跳网络中基于网络编码的MAC机制研究";黄勐;《中国优秀硕士学位论文全文数据库》;20111215;I136-529 *

Also Published As

Publication number Publication date
CN103957085A (en) 2014-07-30

Similar Documents

Publication Publication Date Title
US9231738B2 (en) Communication method for relay node and next node of the relay node for network coding
CN109788475B (en) Wireless communication method, system and computer program product
CN103957085B (en) Media access control method for wireless mesh network based on network coding
Hammood et al. An effective transmit packet coding with trust-based relay nodes in VANETs
CN102572941A (en) Buffer zone managing method in mobile delay tolerant network based on probabilistic routing
CN103051424A (en) Wireless transmission method for varied error protective fountain code
CN109041010A (en) Vehicle-mounted Delay Tolerant Network data forwarding method based on semi-naive Bayes classifier
Weng et al. Design of an energy‐efficient cross‐layer protocol for mobile ad hoc networks
CN104243098A (en) Transmitting method based on parallel batch network coding
Ray et al. Energy efficient clustering hierarchy protocol for wireless sensor network
CN105764091A (en) Method of effectively utilizing wireless bandwidth
JP5884919B2 (en) Network device and transmission program
Chlebus et al. Energy efficient adversarial routing in shared channels
Tebbi et al. Coded caching in partially cooperative D2D communication networks
CN103402233B (en) Based on the high throughput wireless distributed network method for routing of serial interference elimination
Bao et al. AI-Augmented, ripple-diamond-chain shaped, rateless routing in wireless mesh networks with multibeam directional antennas
Casari et al. DSMA: an access method for MIMO ad hoc networks based on distributed scheduling
CN104811720A (en) Video IPB frame transmission mapping mechanism realization method based on Mesh network
Tang et al. Knowledge‐based replica deletion scheme using directional anti‐packets for vehicular delay‐tolerant networks
Zhao et al. Long short-term memory-based hybrid V2V/V2I transmission latency method
CN103581838A (en) Information sharing method for Ad Hoc network
Li et al. A paralleling broadcast authentication protocol for sparse rsus in internet of vehicles
CN114189299B (en) Quick consensus method and system capable of defending frequency spectrum sensing data counterfeiting attack
US20230155629A1 (en) Apparatus and methods for mesh communication networks with broadcast messages
Choi et al. Load balancing for efficient routing in wireless sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant