CN104378271A - Access method for visible light communication network - Google Patents

Access method for visible light communication network Download PDF

Info

Publication number
CN104378271A
CN104378271A CN201410766772.6A CN201410766772A CN104378271A CN 104378271 A CN104378271 A CN 104378271A CN 201410766772 A CN201410766772 A CN 201410766772A CN 104378271 A CN104378271 A CN 104378271A
Authority
CN
China
Prior art keywords
communicated tokens
tokens
priority
communicated
visible light
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410766772.6A
Other languages
Chinese (zh)
Inventor
赵春峰
曹继业
廖世迁
戚峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN XINTONG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN XINTONG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN XINTONG INFORMATION TECHNOLOGY Co Ltd filed Critical SHENZHEN XINTONG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410766772.6A priority Critical patent/CN104378271A/en
Publication of CN104378271A publication Critical patent/CN104378271A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an access method for a visible light communication network. A server centrally manages communication tokens and then distributes the communications tokens based on applications of to-access devices, the to-access devices with the communication tokens obtain exclusive communication resources and form a network virtual circuit structure. With the access method for the visible light communication network, complex node settings needed by CSMA/ CD (carrier sense multiple access with collision detection) access method are avoided, and a complex management mechanism of the communication tokens is not needed. Furthermore, the access method for the visible light communication network is simple, convenient and capable of providing better compatible support to existing equipment and maintaining high quality of voice calls.

Description

A kind of cut-in method of visible light communication networking
Technical field
Patent of the present invention relates to the communications field, in particular to a kind of cut-in method of visible light communication networking.
Background technology
Visible light communication (Visible Light Communication, VLC) be a kind of emerging light wireless communication technology based on visible ray (400THz-790THz), due to its LoS (Line of Sight) characteristic, visible light communication can provide short distance, safety, glitch-free wireless link, compared with traditional radio communication, visible ray radio communication need not apply for that frequency spectrum is demonstrate,proved, and also can avoid Electromagnetic Interference.
LED, as one of 21st century most important technological invention, is entering into the life of the daily common people.The fast development of LED illumination technology more and more causes the concern of communication technology circle, and as lighting source of future generation, LED replaces now widely used incandescent lamp and fluorescent lamp is becoming irreversible trend.Utilize LED as carrier to realize the transmission of digital signal, can realize the communicating integral that throws light on, can avoid electromagnetic pollution, be efficient and the communication pattern of environmental protection.
At present cable network and based on the wireless network transmissions of microwave in conventional access way have CSMA/CD (Carrier Sense Multiple Access/collision detection) and the method (communicated tokens bus and communicated tokens ring) based on communicated tokens (Token).This two classes access way is all not suitable for directly using on visible ray voice communications network.Current most of visible ray network all uses visible ray and electric hybrid network framework, using visible ray as the connecting medium between user terminal and radio network node, and star-like, to be ring-likely connected with bus-network by common between radio network node.If adopt CSMA/CD, then radio network node should be equipped with caching mechanism, adds the complexity of node; And adopt the Token class methods (IEEE 802.4 and IEEE 802.5) of standard, then need comparatively complicated communicated tokens administrative mechanism, and existing equipment is difficult to support.It should be noted that simultaneously, in the network application of visible ray voice broadcast, communication service is subject to the impact of institute's beared information (speech), there is obvious continuation property, therefore access way should be able to ensure that it is not interrupted, and too emphasizes that the pure packet switching of communication efficiency can not satisfy the demands.
Summary of the invention
In order to solve the problem, the invention provides a kind of cut-in method of visible light communication networking, the complex node which obviated required for CSMA/CD access way is arranged, also complicated communicated tokens administrative mechanism is not needed, there is compatible preferably support to existing equipment, and can higher voice call quality be kept.
Concrete summary of the invention is as follows:
The cut-in method at visible light communication networking, server centered supervisory communications token also distributes it according to the application of equipment to be accessed, and the equipment described to be accessed holding communicated tokens obtains the exclusive communication resource and forms network virtual circuit structure.
The method adopts Star Network, by server unified management communicated tokens (but not the bus-network in IEEE 802.4 and the loop network defined in IEEE 802.5, carry out communicated tokens management by node); Simultaneously after node obtains communicated tokens, will the communication resource be monopolized, form the virtual circuit structure in network, namely based on existing communicated tokens and virtual circuit mechanism, to guarantee the speech quality in network, and realize simple, safe and reliable.Owing to there is no complicated neck board administrative mechanism, existing equipment can be supported significantly, utilize and promote.
Accompanying drawing explanation
Fig. 1 is some embodiment visible ray voice communications network schematic diagrames;
Fig. 2 is the flow chart of the user terminal application communicated tokens of some embodiments;
Fig. 3 is the flow chart of the network central server communicated tokens management of some embodiments;
Fig. 4 is the flow chart of Fault recovery in some embodiment server communication token managements;
Fig. 5 is the flow chart held of some embodiments terminal use to communicated tokens;
Fig. 6 is the flow chart of the server wait communicated tokens of some embodiments.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with accompanying drawing and embodiment, the present invention is described in further detail.Should understand, specific embodiment described herein only for explaining the present invention, is not limited to the present invention.
Fig. 1 is a certain signal wiring figure of the present invention, support comparatively intuitively for method of the present invention provides, but it should be noted that, be not intended to limit the present invention, it specifically comprises server 11, multiple LED 12 and multiple equipment to be accessed (the present embodiment is for mobile terminal 13), specific as follows:
Server 11: as the core of whole voice communication network, be in charge of communicated tokens, comprises the generation of communicated tokens, granting, recovery and destruction, is responsible for maintenance customer priority query and priority clock simultaneously;
LED 12: each LED is that equipment to be accessed provides wired network interface, possesses function: illumination, visible ray transmitting-receiving and network data transmitting-receiving.
Mobile terminal 13: each mobile terminal 11, by visible light channel incoming voice communication network, possesses function: the transmitting-receiving of voice pickup, encoding and decoding speech, visible data, speech play and user's input.
Please refer to Fig. 1 ~ 6, a kind of cut-in method of visible light communication networking, server centered supervisory communications token also distributes it according to the application of equipment to be accessed, and the equipment described to be accessed holding communicated tokens obtains the exclusive communication resource and forms network virtual circuit structure.
Its concrete operation step comprise communicated tokens application, hold and give back; The Fault recovery of communicated tokens management logic; And the priority management of communication service:
The application of communicated tokens, hold and give back and specifically comprise: communicated tokens is undertaken generating and allocating by server 11 is unified, and the mobile terminal 13 in network is using the prerequisite of communicated tokens as the information of transmission; When mobile terminal 13 sends speech information, first the application of obtaining communication token is sent to server 11, this mobile terminal 13 communicated tokens whether is given by the decision-making of priority decision mechanism after server 11 receives application, as this mobile terminal 13 obtains communicated tokens, then obtain the exclusive communication resource, normally can transmit speech information in a network; Otherwise, after this mobile terminal 13 will wait for a period of time, again send application to server 11.After mobile terminal 13 obtaining communication token, communicated tokens will be held, till end condition meets.End condition comprises three aspects, and the end of one section of continuous speech reaches the longest call time limit, limit priority forced interruption.After end condition meets, communicated tokens is returned to server 11 by mobile terminal 13, and waits for voice broadcast request next time.
The Fault recovery of communicated tokens management logic specifically comprises: when there is multiple communicated tokens, is regained or invalidation by provided communicated tokens, enters without communicated tokens state; When occurring without communicated tokens, server regenerates and distributes.The error recovery method of communicated tokens management logic contains in network and occurs in multiple communicated tokens and network without communicated tokens two kinds of situations.When there is multiple communicated tokens in network, a more than mobile terminal 13 all has the power of transmission information, causes network conflict.Now mobile terminal 13 abandons communicated tokens.If communicated tokens is all abandoned by all mobile terminals 13, then proceed to the situation without communicated tokens.If occurred without communicated tokens state in network, so server 11 will regenerate communicated tokens, restart communicated tokens allocation flow.
The priority management of communication service: the priority management method of communication service comprises grade quantity set, pri-oritizing mechanism and priority clock management method, communication service can be divided into 4 priority, the business of limit priority seizes power, the low priority traffice occupying network can be interrupted, directly start to broadcast in a network, all the other priority then provide communicated tokens by server 11 according to order from high to low successively.Each priority all arranges clock, and the effect of priority clock is to avoid communicated tokens to be monopolized by some priority for a long time, thus causes the congested of business in network.Business in a certain priority only when time-out does not appear in priority clock, just likely obtains communicated tokens.
In order to clearly set forth, now set forth by the operating procedure of further refinement:
See Fig. 2, the flow process of the mobile application communicated tokens in an embodiment:
Step S201, will apply for counter O reset, start communicated tokens application process;
Step S202, sends the information of application communicated tokens to server, and starts waiting for server response;
Step S203, judges whether application counter arrives pre-determined threshold.If reach pre-determined threshold, then proceed to flow process and terminate, if do not reach thresholding, then turn to next step to judge;
Step S204, judges whether to receive server response.If fail to receive server response, after so counter adds 1, proceed to step S202, resend communicated tokens application to server; If have received the response of server, so proceed to next step and judge.
Step S206, the response of server is divided into two classes, has communicated tokens and without communicated tokens; This step judges whether have communicated tokens in server response.If had, then start voice and send S207, then proceed to flow process and terminate.If there is no communicated tokens, so proceed to next step and judge.
Step S208, does not have the server response of communicated tokens to be divided into " queue is full " and " entering queue " two states.This step judges this state." if queue is full ", illustrate that the queue of server end now in same priority does not have the free time, speech transfer request can not be accepted, and mobile terminal can only active wait-for." if queue is normal ", illustrate that the speech transfer request of terminal is put into queue by server, mobile terminal only needs passive waiting for server to turn communicated tokens, till receiving communicated tokens according to priority orders wheel.User interface will carry out corresponding prompting S209, S210 simultaneously.
See Fig. 3, the flow process of server communication token management in an embodiment:
Step S301, netinit, server generates communicated tokens, opens management process;
Step S302, server checks that whether communicated tokens is normal.If communicated tokens is in place, then starts wheel turn and check each priority query, if communicated tokens is abnormal, then starts communicated tokens and recover flow process S307;
Step S303, checks whether other service queue of limit priority is empty.If be empty, then proceed to next more low-level service queue and check; If be not empty, then proceed to priority clock and check flow process.
Step S304, checks whether priority clock arrives the default time limit.If arrived, proceed to next more low-level service queue so at once and check, if do not arrived, then the most forward in queue service dispense communicated tokens S305;
Step S306, after the queue of lowest priority is checked, server enters waits for communicated tokens flow process S307, until communicated tokens comes back to server;
Fig. 4 shows the flow process of Fault recovery in some embodiment server communication token managements:
Step S401, enters Fault recovery flow process, and server opening network is intercepted, and receives and analyzes the VoP that network occurs, obtaining its source address information;
Step S402, if discovering server network exists VoP, so proceeds to S403 further to data analysis; If discovering server network does not exist VoP, so proceed to S405, start to carry out detecting without communicated tokens.
Step S403, if discovering server network has and only has the VoP from same source address, then illustrate that the network operation does not go wrong, communicated tokens state is normal, directly proceeds to end; If discovering server network there is the VoP of a more than source address, so illustrates in network and occurred the mistake of multiple communicated tokens, proceed to S404 many communicated tokens error handling procedures.
Step S404, when there is multiple communicated tokens in network, the instruction that server " abandons communicated tokens " to the terminal broadcast in all-network.Then server enters into and detects S405 without communicated tokens.
Step S405, startup of server network is mourned in silence clock, starts network and to mourn in silence timing;
Step S406, if network is mourned in silence, clock arrives and presets the time limit, and network occurs VoP not yet, then illustrate that network enters without communicated tokens state, server proceeds to without communicated tokens treatment S 407.If within the default time limit, network there is VoP, so stable yet (some terminals also do not receive the instruction abandoning communicated tokens to network state, or still have partial data to be detained in network), so server will send the instruction S404 of " abandoning communicated tokens " again to each terminal broadcast of network;
Step S407, if server confirms that network does not have communicated tokens, process ends S408 after so producing the communicated tokens made new advances.
Fig. 5 shows some embodiment mobile terminals and holds flow process to communicated tokens:
Step S501, enters communicated tokens and holds flow process.
Step S502, looks into " abandoning communicated tokens " instruction (sending of this instruction is because mistake has appearred in intra-system communication token management) seeing if there is server and send.If had, then proceed to S505.If no, then proceed to S503.
Step S503, looks into " giving back communicated tokens " instruction (sending of this instruction is because terminal use holds the overlong time of communicated tokens) seeing if there is server and send.If had, then give back communicated tokens to server.If no, then go back to S502.
Step S504, stops call, returns communicated tokens to server.
Step S505, stops call, abandons held communicated tokens.
Fig. 6 shows the flow process of the server wait communicated tokens of some embodiments:
Step S601, enters communicated tokens and waits for flow process.
Step S602, starts communicated tokens and waits for clock, starts communicated tokens and waits for timing.
Step S605, checks that the business of whether the first priority arrives (business of this priority has the ability of preempting resources, and does not limit by time span).If had, then send to the terminal use holding communicated tokens and return token directive S603, the service dispense communicated tokens S604 of backward first priority, the communicated tokens that terminates afterwards waits for flow process.If no, then turn to S606.
Above-described embodiment of the present invention, does not form limiting the scope of the present invention.Any amendment done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within claims of the present invention.

Claims (5)

1. the cut-in method at visible light communication networking, is characterized in that, server centered supervisory communications token also distributes it according to the application of equipment to be accessed, and the equipment described to be accessed holding communicated tokens obtains the exclusive communication resource and forms network virtual circuit structure.
2. the cut-in method at visible light communication networking according to claim 1, is characterized in that, concrete access step comprises:
The application of communicated tokens, hold and give back;
The Fault recovery of communicated tokens management logic; And
The priority management of communication service.
3. the cut-in method at visible light communication networking according to claim 2, is characterized in that, the application of described communicated tokens, holds and gives back and specifically comprise:
Described server generates and allotment communicated tokens, and when receiving the application of equipment to be accessed, judges whether to provide described communicated tokens to this equipment according to the priority mechanism preset; If provide communicated tokens to this equipment, then this equipment obtains the exclusive communication resource, and with transfers voice information, send communicated tokens if break off relations to this equipment, then this equipment enters the application of next round.
4. the cut-in method at visible light communication networking according to claim 2, is characterized in that, the Fault recovery of described communicated tokens management logic specifically comprises:
When there is multiple communicated tokens, provided communicated tokens being regained or destroys, entering without communicated tokens state;
When occurring without communicated tokens, described server regenerates and distributes.
5. the cut-in method at visible light communication networking according to claim 2, it is characterized in that, the priority management of described communication service, its specifically comprise that priority level progressively reduces in order first to N priority, first priority has the authority of interrupting other priority, and between second to N priority, according to priority other sequence obtains communicated tokens; First all has the corresponding time limit to the business of N priority.
CN201410766772.6A 2014-12-12 2014-12-12 Access method for visible light communication network Pending CN104378271A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410766772.6A CN104378271A (en) 2014-12-12 2014-12-12 Access method for visible light communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410766772.6A CN104378271A (en) 2014-12-12 2014-12-12 Access method for visible light communication network

Publications (1)

Publication Number Publication Date
CN104378271A true CN104378271A (en) 2015-02-25

Family

ID=52556943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410766772.6A Pending CN104378271A (en) 2014-12-12 2014-12-12 Access method for visible light communication network

Country Status (1)

Country Link
CN (1) CN104378271A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114627580A (en) * 2022-03-11 2022-06-14 青岛海信智慧生活科技股份有限公司 Intelligent door lock, state reporting method thereof and home equipment linkage system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1329446A (en) * 2001-03-28 2002-01-02 深圳市中兴集成电路设计有限责任公司 Method for implementing internal switched network in base station system and its system mechanism
CN1601990A (en) * 2003-09-22 2005-03-30 阿尔卡特公司 Method of managing a token in a telecommunications network
WO2005077060A2 (en) * 2004-02-09 2005-08-25 Phonex Broadband Corporation System and method for requesting and granting access to a network channel
CN103491508A (en) * 2013-09-05 2014-01-01 金鹏电子信息机器有限公司 Voice communication method based on Zigbee network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1329446A (en) * 2001-03-28 2002-01-02 深圳市中兴集成电路设计有限责任公司 Method for implementing internal switched network in base station system and its system mechanism
CN1601990A (en) * 2003-09-22 2005-03-30 阿尔卡特公司 Method of managing a token in a telecommunications network
WO2005077060A2 (en) * 2004-02-09 2005-08-25 Phonex Broadband Corporation System and method for requesting and granting access to a network channel
CN103491508A (en) * 2013-09-05 2014-01-01 金鹏电子信息机器有限公司 Voice communication method based on Zigbee network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114627580A (en) * 2022-03-11 2022-06-14 青岛海信智慧生活科技股份有限公司 Intelligent door lock, state reporting method thereof and home equipment linkage system
CN114627580B (en) * 2022-03-11 2023-10-27 青岛海信智慧生活科技股份有限公司 Intelligent door lock, state reporting method thereof and household equipment linkage system

Similar Documents

Publication Publication Date Title
US7720072B2 (en) Method for dynamic bandwidth allocation in passive optical network
CN102812755A (en) Access control for machine-type communication devices
EP1919144B1 (en) Station apparatus, method for resource allocatoin in station apparatus, and mobile communication system
US9276807B2 (en) Redundant communication framework
CN106844251B (en) Data transmission method and device
CN109804691B (en) Data transmission method and device and computer storage medium
CN103379005A (en) Optical line terminal equipment and implementation method thereof
CN112040566B (en) Narrow-band and wide-band single-call communication system
CN108432311A (en) A kind of resource request method, equipment, network side node and system
US20160087896A1 (en) Interface Switching Method and Device
WO2020143630A1 (en) Resource configuration method and apparatus
CN104378271A (en) Access method for visible light communication network
CN110351864A (en) A kind of indicating means interrupting transmission, network side equipment and terminal
CN101854403A (en) Comprise the network of a plurality of equipment and be used for the root device and the method for distribution network address
CN102946402B (en) Communication method, and bluetooth device
CN111418229B (en) Configuration method of data copying transmission function, network equipment and terminal equipment
JP2003018162A (en) Maintenance control system and maintenance control method
CN109905160A (en) A kind of resource allocation method and device
CN103731886A (en) Bandwidth allocation system, method and device
CN103491027B (en) Electric network emergency communication service bandwidth allocation method
CN101854402A (en) Interface conversion device and stream control implementing method
CN101123562A (en) Unidirectional loop Ethernet system and its control method
CN113810911B (en) Novel integrated base station self-organizing network system and method based on 5G
CN113765615B (en) Time division communication system of CPRI interface
CN107547132A (en) A kind of board and distributed apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150225