CN104754601A - Hidden node detection method, network node and server - Google Patents

Hidden node detection method, network node and server Download PDF

Info

Publication number
CN104754601A
CN104754601A CN201310739867.4A CN201310739867A CN104754601A CN 104754601 A CN104754601 A CN 104754601A CN 201310739867 A CN201310739867 A CN 201310739867A CN 104754601 A CN104754601 A CN 104754601A
Authority
CN
China
Prior art keywords
network node
detection messages
periphery detection
information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310739867.4A
Other languages
Chinese (zh)
Other versions
CN104754601B (en
Inventor
马少飞
彭巍
赵军辉
万鸿俊
丁郁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310739867.4A priority Critical patent/CN104754601B/en
Publication of CN104754601A publication Critical patent/CN104754601A/en
Application granted granted Critical
Publication of CN104754601B publication Critical patent/CN104754601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a hidden node detection method used for well detecting hidden nodes. The method comprises the following steps: a first network node sends a detection message used for detecting hidden nodes to network nodes within the coverage of the first network node; the first network node generates a periphery detection message, and adds information of network nodes returning a response message and information of the first network node to the periphery detection message; and the first network node reports the periphery detection message to a server to enable the server to detect hidden nodes according to the periphery detection message. The invention further discloses another hidden node detection method, a corresponding network node, and a server.

Description

A kind of concealed nodes detection method, network node and server
Technical field
The present invention relates to communication technical field, particularly a kind of concealed nodes detection method, network node and server.
Background technology
In the wireless network, A node can be seen by B node, but but can not be seen by the C node with B node communication, and so A node is exactly a concealed nodes for C node.
In prior art, in order to solve hidden node problem, following three kinds of modes generally can be adopted:
1, network node problem is solved, such as CSMA/CA(Carrier Sense Multiple access/collision detection by the mechanism of protocol level) mechanism.The major function of this agreement is not for detection of concealed node, therefore adopts and can only suppress concealed nodes to a certain extent in this way, and can not solve the problem of concealed nodes completely.
2, RTS/CTS(Request To Send/Clear To Send is adopted, request transmission/clear to send agreement) agreement, utilize handshake mechanism to solve the hidden node problem of cordless communication network.If employing the method, before each message of transmission, need to send the short message with specific meanings, virtually add message data amount, comparatively waste interface-free resources, also reduce air-interface efficiency.
3, testing mechanism is introduced, by testing mechanism detection of concealed node.Testing process by STA or AP(Access Point, access point) initiate, that is, serve as checkout equipment by STA or AP, or introduce special checkout equipment, and report testing result by this checkout equipment.For real network, STA or AP serving as checkout equipment needs to carry out the improvement on all many-sided hardware and software, and feasibility is poor.
In summary, there is no the method for good detection of concealed node in prior art.
Summary of the invention
The embodiment of the present invention provides a kind of concealed nodes detection method, for detection of concealed node preferably.
A kind of concealed nodes detection method, comprising:
First network node sends the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage;
Described first network node generates periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message;
Described periphery detection messages is reported server by described first network node, carries out concealed nodes detection to make described server according to described periphery detection messages.
Preferably, the positional information of network node is at least comprised in the information of described network node.
Preferably, also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
Preferably, described periphery detection messages is reported server by described first network node, comprising:
Described periphery detection messages is reported described server by described first network node in appointment report cycle; Or
Described periphery detection messages is reported described server according to the triggering of described server by described first network node; Or
Described periphery detection messages is reported described server according to the triggering of setting event by described first network node.
Preferably, described periphery detection messages is reported server by described first network node, comprising: described periphery detection messages is reported described server by mobile communications network by described first network node.
Preferably, also comprise: described first network node receive second network node send described detection messages time, to response message described in described second network node reverts back.
Preferably, described network node is terminal STA or access point AP.
A kind of concealed nodes detection method, comprising:
Server receives the periphery detection messages that network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect;
The information of the network node that described server comprises according to described periphery detection messages, carries out concealed nodes detection.
Preferably, server receives the periphery detection messages that network node reports, and comprising: the periphery detection messages that described server is reported by mobile communications network reception network node.
Preferably, the information of the network node that described server comprises according to described periphery detection messages, carry out concealed nodes detection, comprising:
For each periphery detection messages received, described server is according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or
For the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages that described server reports according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
Preferably, the information of the network node that described server comprises according to described periphery detection messages, carry out concealed nodes detection, comprising:
What described server at least comprised according to described periphery detection messages reports temporal information, determines whether report cycle corresponding to described periphery detection messages is specify report cycle;
If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of network node that comprises according to described periphery detection messages of described server, carries out concealed nodes detection.
Preferably, the positional information of network node is at least comprised in the information of described network node.
Preferably, described network node is STA or AP.
A kind of network node, comprising:
Sending module, for sending the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage;
Generation module, for generating periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message;
Reporting module, for described periphery detection messages is reported server, carries out concealed nodes detection to make described server according to described periphery detection messages.
Preferably, the positional information of network node is at least comprised in the information of described network node.
Preferably, also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
Preferably, described reporting module specifically for: appointment report cycle in described periphery detection messages is reported described server; Or described periphery detection messages is reported described server by the triggering according to described server; Or described periphery detection messages is reported described server by the triggering according to setting event.
Preferably, described reporting module specifically for: by mobile communications network, described periphery detection messages is reported described server.
Preferably, described network node also comprises reply module, for when receiving the described detection messages that second network node sends, to response message described in described second network node reverts back.
Preferably, described network node is STA or AP.
A kind of server, comprising:
Receiver module, for receiving the periphery detection messages that network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect;
Detection module, for the information of network node comprised according to described periphery detection messages, carries out concealed nodes detection.
Preferably, described receiver module specifically for: receive the periphery detection messages that reports of network node by mobile communications network.
Preferably, described detection module specifically for: for each periphery detection messages received, according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or for the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages reported according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
Preferably, described detection module specifically for: what at least comprise according to described periphery detection messages reports temporal information, determines whether report cycle corresponding to described periphery detection messages is specify report cycle; If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of the network node comprised according to described periphery detection messages, carries out concealed nodes detection.
Preferably, the positional information of network node is at least comprised in the information of described network node.
Preferably, described network node is STA or AP.
In the embodiment of the present invention, described first network node can send described detection messages to each network node in self coverage, the network node receiving described detection messages all can to response message described in described first network node reverts back, described first network node reports described periphery detection messages to described server, and described server can determine concealed nodes according to described periphery detection messages.Such as, if a network node is in the coverage of described first network node, and not to response message described in described first network node reverts back, then obviously can determine this network node and described first network node concealed nodes each other.
Adopt the method in the embodiment of the present invention, without the need to arranging special checkout equipment, serve as checkout equipment to be equivalent to be exactly described server, implementation is comparatively simple.And each network node only needs to receive and dispatch message, without the need to carrying out the improvement on hardware to network node, feasibility is better.And the method in the embodiment of the present invention is without the need to adopting handshake mechanism, needs the message amount sent to greatly reduce, saving interface-free resources, avoid affecting air-interface efficiency as far as possible.
Accompanying drawing explanation
Fig. 1 is the main flow figure of the concealed nodes detection method of network node side in the embodiment of the present invention;
Fig. 2 is the main flow figure of the concealed nodes detection method of server side in the embodiment of the present invention;
Fig. 3 is the primary structure block diagram of network node in the embodiment of the present invention;
Fig. 4 is the primary structure block diagram of server in the embodiment of the present invention.
Embodiment
Concealed nodes detection method in the embodiment of the present invention can comprise: first network node sends the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage; Described first network node generates periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message; Described periphery detection messages is reported server by described first network node, carries out concealed nodes detection to make described server according to described periphery detection messages.
In the embodiment of the present invention, described first network node can send described detection messages to each network node in self coverage, the network node receiving described detection messages all can to response message described in described first network node reverts back, described first network node reports described periphery detection messages to described server, and described server can determine concealed nodes according to described periphery detection messages.Such as, if a network node is in the coverage of described first network node, and not to response message described in described first network node reverts back, then obviously can determine this network node and described first network node concealed nodes each other.
Adopt the method in the embodiment of the present invention, without the need to arranging special checkout equipment, serve as checkout equipment to be equivalent to be exactly described server, implementation is comparatively simple.And each network node only needs to receive and dispatch message, without the need to carrying out the improvement on hardware to network node, feasibility is better.And the method in the embodiment of the present invention is without the need to adopting handshake mechanism, needs the message amount sent to greatly reduce, saving interface-free resources, avoid affecting air-interface efficiency as far as possible.
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The techniques described herein may be used in various communication system, such as current 2G, 3G communication system and next generation communication system, such as global system for mobile communications (GSM, Global System for Mobilecommunications), code division multiple access (CDMA, Code Division Multiple Access) system, time division multiple access (TDMA, Time Division Multiple Access) system, Wideband Code Division Multiple Access (WCDMA) (WCDMA, Wideband Code Division Multiple Access Wireless), frequency division multiple access (FDMA, Frequency Division Multiple Addressing) system, OFDM (OFDMA, Orthogonal Frequency-Division Multiple Access) system, Single Carrier Frequency Division Multiple Access (SC-FDMA) system, GPRS (GPRS, General Packet Radio Service) system, Long Term Evolution (LTE, Long Term Evolution) system, and other these type of communication systems.
In addition, term " system " and " network " are often used interchangeably in this article herein.
Term "and/or" herein, being only a kind of incidence relation describing affiliated partner, can there are three kinds of relations in expression, and such as, A and/or B, can represent: individualism A, exists A and B simultaneously, these three kinds of situations of individualism B.In addition, character "/" herein, general expression forward-backward correlation is to the relation liking a kind of "or".
Below in conjunction with Figure of description, the embodiment of the present invention is described in further detail.
Refer to Fig. 1, the embodiment of the present invention provides a kind of concealed nodes detection method, and the main flow of described method is as follows:
Step 101: first network node sends the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage.
In the embodiment of the present invention, in the coverage of described server, can include multiple network node, described first network node is exactly the arbitrary network node in these network nodes.Such as described first network node can be STA, or can be also AP, and the present invention does not limit.
In the embodiment of the present invention, each network node in the coverage of described server can send described detection messages to other network nodes in the coverage of self.
Preferably, described first network node can send described detection messages with the forms of broadcasting, and the network node receiving described detection messages can to described first network node reverts back response message.Each node within the scope of described first network coverage ought to receive described detection messages.
Preferably, the information of described first network node can be carried in described detection messages.
Preferably, in the embodiment of the present invention, in the information of network node, at least can include the positional information of network node, nature, in described first network nodal information, also just at least can include the positional information of described first network node.
In the embodiment of the present invention, start carry out step 101, namely start the detection carrying out concealed nodes.Specifically how to start the detection carrying out concealed nodes, can be initiated voluntarily by network node, namely described first network node can decide the detection that will start to carry out concealed nodes in its sole discretion, or also can be initiated by described server triggers network node, namely, described server can send one to described first network node and trigger message, and described server, after the described triggering message of acquisition, can start carry out step 101.
Preferably, in the embodiment of the present invention, described server specifically can refer to cloud platform.
Step 102: described first network node generates periphery detection messages, is added on the information of network node and the information of described first network node of replying response message in described periphery detection messages.
After described first network node sends described detection messages to the network node within the scope of described first network coverage, the network node receiving described detection messages can to response message described in described first network node reverts back, such as, network node 1 is described response message to described first network node reverts back, the information of described network node 1 when generating described periphery detection messages, is then added in described periphery detection messages by described first network node.
Simultaneously, because described periphery detection messages needs to report described server, described server also needs to know the information of carrying out the network node reported, and therefore, the information of described first network node can also also be added in described periphery detection messages by described first network node.
Step 103: described periphery detection messages is reported server by described first network node, carries out concealed nodes detection to make described server according to described periphery detection messages.
Preferably, in the embodiment of the present invention, described periphery detection messages is reported described server by described first network node, can be specifically, by mobile communications network, described periphery detection messages is reported described server.
Preferably, in the embodiment of the present invention, described periphery detection messages is reported server by described first network node, specifically can comprise: described periphery detection messages is reported described server by described first network node in appointment report cycle; Or described periphery detection messages is reported described server according to the triggering of described server by described first network node; Or described periphery detection messages is reported described server according to the triggering of setting event by described first network node.
Each network node in described server coverage all may can report periphery detection messages to described server, if multiple network node reports to described server simultaneously, may cause congestion information, even may cause information dropout.Then preferably, described server respectively provides different appointment report cycles can to each network node in the coverage of described server, each network node can only report in the appointment report cycle of oneself, like this, described server distribute for each network node specify report cycle time can as far as possible by the report cycle of each network node between stagger, can effectively avoid congestion information phenomenon to occur.
In the embodiment of the present invention, each network node in the coverage of described server can send described detection messages to other network nodes in the coverage of self.That is, for described first network node, it can send described detection messages to the network node within the scope of described first network coverage, and meanwhile, described first network node also may can receive the described detection messages that other network nodes send.If described first network node receives the described detection messages that second network node sends, then equally can to response message described in described second network node reverts back.Wherein, described second network node is also any node in the coverage of described server, and described first network node is in the coverage of described second network node.
Preferably, in the embodiment of the present invention, can also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
Refer to Fig. 2, based on same inventive concept, the embodiment of the present invention provides another kind of concealed nodes detection method, and the main flow of described method is as follows:
Step 201: server receives the periphery detection messages that network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect.
Each network node in the coverage of described server all can report described periphery detection messages to described server, that is, described server may receive multiple periphery detection messages that multiple network node reports respectively.
Preferably, described server can be the periphery detection messages reported by mobile communications network reception network node.
Preferably, in the embodiment of the present invention, described network node can be STA, or can be also AP, and the present invention does not limit.
Such as, for the described first network node in the coverage of described server, described first network node can send described detection messages to other network nodes within the scope of described first network coverage, the network node receiving described detection messages can to response message described in described first network node reverts back, described first network node can generate described periphery detection messages, the information of the network node of replying described response message is added in described periphery detection messages, and the information of described first network node is also added in described periphery detection messages by described first network node, described periphery detection messages is sent to described server by described first network node afterwards.
Preferably, in the embodiment of the present invention, in the information of network node, at least can include the positional information of network node, nature, in described first network nodal information, also just at least can include the positional information of described first network node.
Step 202: the information of the network node that described server comprises according to described periphery detection messages, carries out concealed nodes detection.
Preferably, in the embodiment of the present invention, the information of the network node that described server comprises according to described periphery detection messages, carry out concealed nodes detection, specifically can comprise: for each periphery detection messages received, described server is according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or, for the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages that described server reports according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
For the first situation, such as, can be previously stored with the distributed intelligence of each network node in the coverage of described server in described server, in the distributed intelligence of a network node, include the information of each network node in this network node coverage.
Or for described first network node, store the distributed intelligence of described first network node in described server, in the distributed intelligence of described first network node, include the information of each network node within the scope of described first network coverage.
Described first network node is after sending described detection messages to other network nodes within the scope of described first network coverage, each network node within the scope of ideal situation described first network coverage all should to response message described in described first network node reverts back, and the information of the network node of replying described response message will be added in described periphery detection messages by described first network node, should be ideally that the information of the all-network node within the scope of described first network coverage is added in described periphery detection messages.If there is the existence of concealed nodes, the described detection messages that described first network node sends then cannot be received with the network node of described first network node concealed nodes each other, naturally also can not to response message described in described first network node reverts back, the information of this network node also would not be added in described periphery detection messages by described first network node.
Described server is after the described periphery detection messages receiving the transmission of described first network node, can check successively the information of each network node that described periphery detection messages comprises, namely according to the distributed intelligence of the described first network node of this locality storage, determine whether the information of each network node that the distributed intelligence of described first network node comprises includes in described periphery detection messages.Such as, have the information of network node 1 to be included in the distributed intelligence of described first network node, but be not included in described periphery detection messages, then described server can determine described network node 1 and described first network node concealed nodes each other.
Or, with described first network node, second network node and the 3rd network node are example, the distributed intelligence of described first network node is stored in described server, the distributed intelligence of described second network node and the distributed intelligence of described 3rd network node, the information of each network node within the scope of described first network coverage is included in the distributed intelligence of described first network node, the information of each network node within the scope of described second network coverage is included in the distributed intelligence of described second network node, the information of each network node in described 3rd network node coverage is included in the distributed intelligence of described 3rd network node.
Such as, described first network node and described 3rd network node are all positioned at the coverage of described second network node, i.e. include the information of described first network node and the information of described second network node in the distributed intelligence of described second network node.So, if the periphery detection messages reported according to described first network node determines wherein not have the information of described 3rd network node, and/or, the periphery detection messages reported according to described 3rd network node determines wherein not have the information of described first network node, then can determine described first network node and described 3rd network node concealed nodes each other.In this case, described first network node can not be positioned at the coverage of described 3rd network node, or described first network node also can be positioned at the coverage of described 3rd network node.
Thisly determine that mode is very simple, without the need to the algorithm of complexity, also without the need to carrying out the improvement on hardware to arbitrary network node, feasibility is stronger.
Or in the embodiment of the present invention, described server side also can without the need to storing the distributed intelligence of each network node in the coverage of described server.The periphery detection messages that each network node that can receive in the coverage of described server because of described server reports, then described server can carry out according to each periphery detection messages the detection carrying out concealed nodes respectively in the coverage of each network node.
Such as, network node A and network node B concealed nodes each other, all do not comprise the information of the other side in the periphery detection messages that described network node A and described network node B reports to described server.But network node C to described server report periphery detection messages in have the information of the information of described network node A and described network node B, namely illustrate that described network node C is distributed in the coverage of described network node A and described network node B, described server can determine described network node A and described network node B concealed nodes each other according to the periphery detection messages that described network node C reports.
Or described server also can have other to determine the mode of concealed nodes, and the present invention does not limit.
Preferably, in the embodiment of the present invention, the information of the network node that described server comprises according to described periphery detection messages, carry out concealed nodes detection, can comprise: what described server at least comprised according to described periphery detection messages reports temporal information, determine whether report cycle corresponding to described periphery detection messages is specify report cycle; If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of network node that comprises according to described periphery detection messages of described server, carries out concealed nodes detection.
Preferably, in the embodiment of the present invention, can also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
For described first network node.Temporal information is reported described in can carrying in the described periphery detection messages that described first network node reports.If described in time when reporting temporal information to be used to indicate to report described periphery detection messages, time during described periphery detection messages is reported then, then described server side can store the appointment report cycle of promising described first network peer distribution, described server can report temporal information according to described and determine whether report cycle corresponding to described periphery detection messages is described appointment report cycle for the appointment report cycle of described first network peer distribution, if report cycle corresponding to described periphery detection messages is described appointment report cycle, the then described server information of network node that can comprise according to described periphery detection messages, carry out concealed nodes detection.
For described first network node.Temporal information is reported described in can carrying in the described periphery detection messages that described first network node reports.If described in report temporal information to be used to indicate report cycle corresponding to described periphery detection messages, then described first network node directly can according to described report temporal information to determine whether report cycle corresponding to described periphery detection messages is described appointment report cycle, if report cycle corresponding to described periphery detection messages is described appointment report cycle, then the described server information of network node that can comprise according to described periphery detection messages, carries out concealed nodes detection.
If described server is each network node define appointment report cycle, then each network node can only report periphery detection messages in the appointment report cycle of oneself, and can only report a periphery detection messages in an appointment report cycle.Such as, if the appointment report cycle of described first network node is 2s, and described first network node just reports described periphery detection messages when 3s, then described server can detect and determine that report cycle corresponding to described periphery detection messages is not described appointment report cycle, described server can abandon described periphery detection messages, specify report cycle to report because exceed, the result that may report is not accurate enough again.
Refer to Fig. 3, based on same inventive concept, the embodiment of the present invention provides a kind of network node, and described network node can comprise sending module 301, generation module 302 and reporting module 303.
Sending module 301 may be used for sending for the detection messages of detection of concealed node to the network node within the scope of described first network coverage.
Generation module 302 may be used for generating periphery detection messages, the information of network node and the information of described first network node of replying response message is added in described periphery detection messages.
Reporting module 303 may be used for described periphery detection messages to report server, carries out concealed nodes detection to make described server according to described periphery detection messages.
Preferably, in the embodiment of the present invention, in the information of described network node, at least comprise the positional information of network node.
Preferably, in the embodiment of the present invention, also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
Preferably, in the embodiment of the present invention, reporting module 303 specifically may be used for: in appointment report cycle, described periphery detection messages is reported described server; Or described periphery detection messages is reported described server by the triggering according to described server; Or described periphery detection messages is reported described server by the triggering according to setting event.
Preferably, in the embodiment of the present invention, reporting module 303 specifically may be used for: by mobile communications network, described periphery detection messages is reported described server.
Preferably, in the embodiment of the present invention, described network node can also comprise reply module, for when receiving the described detection messages that second network node sends, to response message described in described second network node reverts back.
Preferably, in the embodiment of the present invention, described network node is STA or AP.
Preferably, in the embodiment of the present invention, described network node can be the arbitrary network node in the coverage of described server, and such as described network node can be described first network node.
Refer to Fig. 4, based on same inventive concept, the embodiment of the present invention provides a kind of server, and described server can comprise receiver module 401 and detection module 402.
Receiver module 401 may be used for the periphery detection messages that reception network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect.
Detection module 402 may be used for the information of the network node comprised according to described periphery detection messages, carries out concealed nodes detection.
Preferably, in the embodiment of the present invention, receiver module 401 specifically may be used for the periphery detection messages reported by mobile communications network reception network node.
Preferably, in the embodiment of the present invention, detection module 402 specifically may be used for: for each periphery detection messages received, according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or for the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages reported according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
Preferably, in the embodiment of the present invention, detection module 402 specifically may be used for: what at least comprise according to described periphery detection messages reports temporal information, determines whether report cycle corresponding to described periphery detection messages is specify report cycle; If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of the network node comprised according to described periphery detection messages, carries out concealed nodes detection.
Preferably, in the embodiment of the present invention, in the information of described network node, at least comprise the positional information of network node.
Preferably, in the embodiment of the present invention, described network node is STA or AP.
Concealed nodes detection method in the embodiment of the present invention can comprise: first network node sends the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage; Described first network node generates periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message; Described periphery detection messages is reported server by described first network node, carries out concealed nodes detection to make described server according to described periphery detection messages.
In the embodiment of the present invention, described first network node can send described detection messages to each network node in self coverage, the network node receiving described detection messages all can to response message described in described first network node reverts back, described first network node reports described periphery detection messages to described server, and described server can determine concealed nodes according to described periphery detection messages.Such as, if a network node is in the coverage of described first network node, and not to response message described in described first network node reverts back, then obviously can determine this network node and described first network node concealed nodes each other.
Adopt the method in the embodiment of the present invention, without the need to arranging special checkout equipment, serve as checkout equipment to be equivalent to be exactly described server, implementation is comparatively simple.And each network node only needs to receive and dispatch message, without the need to carrying out the improvement on hardware to network node, feasibility is better.And the method in the embodiment of the present invention is without the need to adopting handshake mechanism, needs the message amount sent to greatly reduce, saving interface-free resources, avoid affecting air-interface efficiency as far as possible.
Those skilled in the art can be well understood to, for convenience and simplicity of description, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by device is divided into different functional modules, to complete all or part of function described above.The system of foregoing description, the specific works process of device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiments that the application provides, should be understood that, disclosed system, apparatus and method, can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described module or unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that the technical scheme of the application contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) or processor (processor) perform all or part of step of method described in each embodiment of the application.And aforesaid storage medium comprises: USB flash disk, portable hard drive, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
The above, above embodiment is only in order to be described in detail the technical scheme of the application, but the explanation of above embodiment just understands method of the present invention and core concept thereof for helping, and should not be construed as limitation of the present invention.Those skilled in the art are in the technical scope that the present invention discloses, and the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.

Claims (26)

1. a concealed nodes detection method, is characterized in that, comprising:
First network node sends the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage;
Described first network node generates periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message;
Described periphery detection messages is reported server by described first network node, carries out concealed nodes detection to make described server according to described periphery detection messages.
2. the method for claim 1, is characterized in that, at least comprises the positional information of network node in the information of described network node.
3. method as claimed in claim 2, it is characterized in that, also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
4. the method for claim 1, is characterized in that, described periphery detection messages is reported server by described first network node, comprising:
Described periphery detection messages is reported described server by described first network node in appointment report cycle; Or
Described periphery detection messages is reported described server according to the triggering of described server by described first network node; Or
Described periphery detection messages is reported described server according to the triggering of setting event by described first network node.
5. the method for claim 1, is characterized in that, described periphery detection messages is reported server by described first network node, comprising: described periphery detection messages is reported described server by mobile communications network by described first network node.
6. the method for claim 1, is characterized in that, also comprises: described first network node receive second network node send described detection messages time, to response message described in described second network node reverts back.
7. the method according to any one of claim 1-6, is characterized in that, described network node is terminal STA or access point AP.
8. a concealed nodes detection method, is characterized in that, comprising:
Server receives the periphery detection messages that network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect;
The information of the network node that described server comprises according to described periphery detection messages, carries out concealed nodes detection.
9. method as claimed in claim 8, is characterized in that, server receives the periphery detection messages that network node reports, and comprising: the periphery detection messages that described server is reported by mobile communications network reception network node.
10. method as claimed in claim 8, is characterized in that the information of the network node that described server comprises according to described periphery detection messages is carried out concealed nodes detection, being comprised:
For each periphery detection messages received, described server is according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or
For the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages that described server reports according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
11. methods as claimed in claim 8, is characterized in that, the information of the network node that described server comprises according to described periphery detection messages is carried out concealed nodes detection, being comprised:
What described server at least comprised according to described periphery detection messages reports temporal information, determines whether report cycle corresponding to described periphery detection messages is specify report cycle;
If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of network node that comprises according to described periphery detection messages of described server, carries out concealed nodes detection.
12. methods as claimed in claim 8, is characterized in that, at least comprise the positional information of network node in the information of described network node.
13. methods according to any one of claim 8-12, it is characterized in that, described network node is STA or AP.
14. 1 kinds of network nodes, is characterized in that, comprising:
Sending module, for sending the detection messages being used for detection of concealed node to the network node within the scope of described first network coverage;
Generation module, for generating periphery detection messages, is added in described periphery detection messages by the information of network node and the information of described first network node of replying response message;
Reporting module, for described periphery detection messages is reported server, carries out concealed nodes detection to make described server according to described periphery detection messages.
15. network nodes as claimed in claim 14, is characterized in that, at least comprise the positional information of network node in the information of described network node.
16. network nodes as claimed in claim 14, it is characterized in that, also comprise in described periphery detection messages and report temporal information, described in time when reporting temporal information to be used to indicate to report described periphery detection messages and/or be used to indicate report cycle corresponding to described periphery detection messages.
17. network nodes as claimed in claim 14, is characterized in that, described reporting module specifically for: appointment report cycle in described periphery detection messages is reported described server; Or described periphery detection messages is reported described server by the triggering according to described server; Or described periphery detection messages is reported described server by the triggering according to setting event.
18. network nodes as claimed in claim 14, is characterized in that, described reporting module specifically for: by mobile communications network, described periphery detection messages is reported described server.
19. network nodes as claimed in claim 14, it is characterized in that, described network node also comprises reply module, for when receiving the described detection messages that second network node sends, to response message described in described second network node reverts back.
20. network nodes as described in any one of claim 14-19, it is characterized in that, described network node is STA or AP.
21. 1 kinds of servers, is characterized in that, comprising:
Receiver module, for receiving the periphery detection messages that network node reports; Wherein, described periphery detection messages is that network node is after sending the detection messages for detection of concealed node to other network nodes in coverage, generate according to the response message received and report, the information of other network nodes that the information of carrying the network node sending described detection messages in described periphery detection messages and the network node sending described detection messages detect;
Detection module, for the information of network node comprised according to described periphery detection messages, carries out concealed nodes detection.
22. servers as claimed in claim 21, is characterized in that, described receiver module specifically for: receive the periphery detection messages that reports of network node by mobile communications network.
23. servers as claimed in claim 21, it is characterized in that, described detection module specifically for: for each periphery detection messages received, according to the distributed intelligence of each network node preserved in advance, and the information of network node that periphery detection messages comprises, send periphery detection messages network node place network coverage in carry out concealed nodes detection; Or for the periphery detection messages that each network node sends, the information of the network node that the periphery detection messages reported according to each network node comprises, carries out concealed nodes detection respectively in the coverage of the network at described each network node place.
24. servers as claimed in claim 21, it is characterized in that, described detection module specifically for: what at least comprise according to described periphery detection messages reports temporal information, determines whether report cycle corresponding to described periphery detection messages is specify report cycle; If report cycle corresponding to described periphery detection messages is described appointment report cycle, then the information of the network node comprised according to described periphery detection messages, carries out concealed nodes detection.
25. servers as claimed in claim 21, is characterized in that, at least comprise the positional information of network node in the information of described network node.
26. servers as claimed in claim 21, it is characterized in that, described network node is STA or AP.
CN201310739867.4A 2013-12-26 2013-12-26 A kind of concealed nodes detection method, network node and server Active CN104754601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310739867.4A CN104754601B (en) 2013-12-26 2013-12-26 A kind of concealed nodes detection method, network node and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310739867.4A CN104754601B (en) 2013-12-26 2013-12-26 A kind of concealed nodes detection method, network node and server

Publications (2)

Publication Number Publication Date
CN104754601A true CN104754601A (en) 2015-07-01
CN104754601B CN104754601B (en) 2019-01-08

Family

ID=53593566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310739867.4A Active CN104754601B (en) 2013-12-26 2013-12-26 A kind of concealed nodes detection method, network node and server

Country Status (1)

Country Link
CN (1) CN104754601B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263158A (en) * 2015-09-06 2016-01-20 江苏中兴微通信息科技有限公司 Method for detecting hidden node pairs in enhanced wireless local area network
CN107079302A (en) * 2014-12-03 2017-08-18 诺基亚通信公司 Concealed nodes detection in LTE license auxiliary accesses
CN107135497A (en) * 2016-02-29 2017-09-05 中国移动通信集团公司 A kind of concealed nodes find method, base station and terminal
CN108848134A (en) * 2018-05-29 2018-11-20 郑州云海信息技术有限公司 A kind of server monitoring information collecting method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050213601A1 (en) * 2004-03-29 2005-09-29 Boris Ginzburg Method and apparatus to provide hidden node protection
CN101711037A (en) * 2009-12-23 2010-05-19 杭州华三通信技术有限公司 Method and device for detecting hidden node
CN102045745A (en) * 2010-12-17 2011-05-04 北京星网锐捷网络技术有限公司 Hidden node detection method and equipment
CN102421166A (en) * 2011-11-21 2012-04-18 华为技术有限公司 Method, device and system for finding out wireless access point
CN103249166A (en) * 2012-02-01 2013-08-14 中兴通讯股份有限公司 Method and device and system for starting RTS/CTS mechanism

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050213601A1 (en) * 2004-03-29 2005-09-29 Boris Ginzburg Method and apparatus to provide hidden node protection
CN101711037A (en) * 2009-12-23 2010-05-19 杭州华三通信技术有限公司 Method and device for detecting hidden node
CN102045745A (en) * 2010-12-17 2011-05-04 北京星网锐捷网络技术有限公司 Hidden node detection method and equipment
CN102421166A (en) * 2011-11-21 2012-04-18 华为技术有限公司 Method, device and system for finding out wireless access point
CN103249166A (en) * 2012-02-01 2013-08-14 中兴通讯股份有限公司 Method and device and system for starting RTS/CTS mechanism

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079302A (en) * 2014-12-03 2017-08-18 诺基亚通信公司 Concealed nodes detection in LTE license auxiliary accesses
US11323998B2 (en) 2014-12-03 2022-05-03 Nokia Solutions And Networks Oy Hidden node detection in LTE licensed assisted access
CN105263158A (en) * 2015-09-06 2016-01-20 江苏中兴微通信息科技有限公司 Method for detecting hidden node pairs in enhanced wireless local area network
CN105263158B (en) * 2015-09-06 2018-10-23 江苏中兴微通信息科技有限公司 The detection method of concealed nodes pair in a kind of enhanced wireless LAN
CN107135497A (en) * 2016-02-29 2017-09-05 中国移动通信集团公司 A kind of concealed nodes find method, base station and terminal
CN107135497B (en) * 2016-02-29 2020-12-15 中国移动通信集团公司 Hidden node discovery method, base station and terminal
CN108848134A (en) * 2018-05-29 2018-11-20 郑州云海信息技术有限公司 A kind of server monitoring information collecting method and device

Also Published As

Publication number Publication date
CN104754601B (en) 2019-01-08

Similar Documents

Publication Publication Date Title
Municio et al. Simulating 6TiSCH networks
CN110839203B (en) Ultra-wideband-based label positioning method and device
CN104471987B (en) For the system and method that the AP of FILS beacons is used to find
US10004059B2 (en) Service advertisement message transmission method and device
US20230141919A1 (en) Electronic device for performing ranging through uwb, and operation method of electronic device
CN104380780A (en) Transmission method and communication apparatus
CN102916854A (en) Traffic statistical method and device and proxy server
CN105517195A (en) State detection method and wireless network node
CN108513342A (en) A kind of dispatching method of internet-of-things terminal, base station and internet-of-things terminal
CN104754601A (en) Hidden node detection method, network node and server
CN105307284A (en) Random access method and user equipment
CN103929755A (en) Communication method and device
CN105122915A (en) Method, device, and user equipment for generating monitoring report
EP4249954A2 (en) Electronic device for performing ranging by using ultra wide band communication and operating method thereof
CN104349320A (en) Sharing method and electronic equipment
CN107395252A (en) Frequency-hopping method, frequency-hopping arrangement, terminal and baseband chip
JP2023535181A (en) Initial access method and device, terminal and network side equipment
CN104541536A (en) Method, user equipment and base station for detecting device to device signals
CN105430028A (en) Service calling method, service providing method, and node
CN105227442A (en) Shopping information method for pushing and device
CN107548019B (en) Method and device for processing network beacon in wireless sensor network
CN103096358B (en) A kind ofly realize method that multicarrier measurement result reports and device
CN114286290B (en) BLE broadcast sending and receiving method, device and system
CN112383386B (en) Data transmission method, device, computer equipment and computer readable storage medium
CN107615811B (en) Method and equipment for interoperation between networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant