CN105072698A - Cognitive radio network medium access control protocol method based on full duplex - Google Patents

Cognitive radio network medium access control protocol method based on full duplex Download PDF

Info

Publication number
CN105072698A
CN105072698A CN201510373897.7A CN201510373897A CN105072698A CN 105072698 A CN105072698 A CN 105072698A CN 201510373897 A CN201510373897 A CN 201510373897A CN 105072698 A CN105072698 A CN 105072698A
Authority
CN
China
Prior art keywords
secondary user
user
channel
full duplex
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510373897.7A
Other languages
Chinese (zh)
Inventor
程文驰
张海林
任智源
李丹萍
李勇朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201510373897.7A priority Critical patent/CN105072698A/en
Publication of CN105072698A publication Critical patent/CN105072698A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • H04W74/0858Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment collision detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a cognitive radio network medium access control protocol method based on full duplex. The method comprises the steps of establishing an unslotted cognitive network model; detecting a competition situation of a primary user for a channel, and a secondary user immediately withdrawing out of a channel once the competition of the primary user for the channel is detected; detecting other sub channels in turn after the secondary user withdraws out of the originally occupied sub channel, so as to obtain the next idle channel to continue transmission of data of the secondary user; and the secondary user continuously executing full duplex frequency spectrum monitoring after successfully utilizing one idle sub channel for data transmission, thereby waiting for activation of a next same-frequency master user. The beneficial effects of the method are that the method is applicable to a multi-channel unslotted cognitive wireless network, and the secondary user can monitor same-frequency channels while sending data, thereby maximizing channel utilization of the secondary user on the basis of ensuring a primary user throughput capacity, and solving the problem of activation failures of the primary user.

Description

Based on the cognition wireless network media access control protocol method of full duplex
Technical field
The present invention relates to a kind of cognition wireless network media access control protocol method, be specifically related to a kind of cognition wireless network media access control protocol method based on full duplex, belong to communication technical field.
Background technology
In cognition wireless network, secondary user's can when main user does not take frequency spectrum flexible utilization frequency spectrum, therefore it is widely regarded as the key technology of forth generation and the 5th third-generation mobile communication.In cognition wireless network, flexible and efficient medium education (MAC) agreement effectively can improve the spectrum efficiency of network, has a very important role to the frequency spectrum advantage giving full play to cognition wireless network.
For the synchronized relation between cognition wireless network secondary user's and main user, cognition wireless network can be divided into two classes: time slot cognition wireless network and non-slot cognition wireless network.In time slot cognition wireless network, the time slot stringent synchronization of secondary user's and main user, main user not Random Access Channel, only carries out state switching in the starting point of each time slot.In non-slot cognition wireless network, the time slot of secondary user's and main user is asynchronous, and main user can access channel at random at any time.
At present, existing MAC protocol is mainly for time slot cognition wireless network.Such as:
(1) patent " implementation method based on the cognition MAC protocol of the multi-channel diversity " (number of patent application 201010590004.1 of Xi'an Communications University's application, publication number CN102036389B) construct a time slot synchronize fully wireless network based on request transmission/clear to send (RTS/CTS), give one based on multi-channel diversity, the MAC protocol of power/channel co-allocation.
(2) ZhaoQing, LangTong is published in IEEEJournalonSelectedAreasinCommunications (JSAC, vol.25, no.3, pp.589-600, Apr.2007.) article on magazine " DecentralizedcognitiveMACforopportunisticspectrumaccessi nadhocnetworks:APOMDPframework (in AdHoc network distributed frequency spectrum access cognition MAC protocol: a kind of POMDP framework) " utilizes Markov Chain to analyze emphatically the performance of time slot cognition wireless network.In this class time slot cognition network, the time slot Complete Synchronization of main user and secondary user's.Like this, channel competition and state switch the beginning period only occurring over just each time slot.
(3) HangSu, XiZhang is published in IEEEJournalonSelectedAreasinCommunications (JSAC, vol.26, no.1, pp.118-129, Jan.2008.) article " Cross-LayerBasedOpportunisticMACProtocolsforQoSProvision ingsOverCognitiveRadioWirelessNetworks (based on the cross-layer MAC protocol that QoS ensures in wireless cognition network) " on periodical proposes a kind of semiduplex MAC protocol.Semiduplex MAC protocol (HDC-MAC) is inner, and user's time slot is divided into perception time slot and data slot.User only transmits data in data slot, and in perception time slot monitor channel, other users of perception to the competition of this channel, thus make a choice keep out of the way or continue transmission, namely the perception of user to channel is discrete.
But in cognition wireless network, main network and secondary network be two kinds of dissimilar network architectures often.So, the slot synchronization of both realizations is just very difficult, or needs to pay a high price.Therefore, non-slot cognition wireless network model has more actual reference.For non-slot cognition network, the competition of main user to channel is random.When using HDC-MAC, once main user is at the data transmission slots competitive channel of secondary user's, secondary user's cannot make response, thus cause the reactivation failure of main user.
Summary of the invention
For solving the deficiencies in the prior art, the object of the present invention is to provide a kind of cognition wireless network media access control protocol method based on full duplex, the method is not only applicable to multichannel non-slot cognition network, and secondary user's can monitor shared channel while transmission data.
In order to realize above-mentioned target, the present invention adopts following technical scheme:
Based on a cognition wireless network media access control protocol method for full duplex, it is characterized in that, comprise the following steps:
Step1: build non-slot cognition network model, in aforementioned non-slot cognition network model, main user can competition network at any time, secondary user's adopts wireless full-duplex communication pattern, if secondary user's occupies certain subchannel transmission data, then secondary user's keeps carrying out perception to this shared channel while transmission data;
Step2: detect main user to the race condition of channel, once the competition of main user to channel be detected, secondary user's is kept out of the way at once and is abdicated this channel;
Step3: after secondary user's abdicates the subchannel originally taken, detects other subchannel successively, thus obtains next idle channel and continue the transmission of its data;
Step4: when secondary user's successfully utilizes an idle sub-channels to carry out transfer of data, this secondary user's continues to perform full duplex spectrum monitoring, thus waits for next time with the activation of frequency main user.
The aforesaid cognition wireless network media access control protocol method based on full duplex, is characterized in that, in Step1, the process that secondary user's carries out full duplex frequency spectrum perception is:
(1) first secondary user's is divided into several data transmission slots, more each data transmission slots is divided into V perception cycle;
(2) within each perception cycle, no matter whether secondary user's is in transmission data, and secondary user's is all simultaneously at detection shared channel.
Usefulness of the present invention is:
(1) method of the present invention is applicable to multichannel non-slot cognition wireless network, can make secondary user's monitoring shared channel while transmission data, thus on the basis ensureing main user throughput, maximize the channel utilization of secondary user's.Meanwhile, the present invention utilizes full duplex technology to solve the activation failure problem of main user.
(2) because secondary user's uses co-channel full duplex pattern simultaneously, so make secondary user's can monitor shared channel while transmission data.
(3) because secondary user's can monitor reactivating of main user while transmission data, so maximise secondary user's channel utilization on the basis ensureing main user throughput.
(4) because secondary user's can monitor reactivating of main user at any time, so main user can be avoided to activate failure problem while transmission data.
Accompanying drawing explanation
Fig. 1 is the time slot comparison diagram of non-slot cognition wireless network and time slot cognition wireless network;
Fig. 2 is system model figure of the present invention;
Fig. 3 is the flow chart of the inventive method;
Fig. 4 is simulated effect figure of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, concrete introduction is done to the present invention.
One, time slot contrast
Fig. 1 is the time slot comparison diagram of non-slot cognition wireless network and time slot cognition wireless network.
Fig. 1 (a) is the time controling sequence of main user and secondary user's in non-slot cognition wireless network, wherein main user Stochastic accessing or leave mandate subchannel, secondary user's follows structure of time slot, and therefore, it is asynchronous that the state of main user switches with the time slot frame of secondary user's.
Fig. 1 (b) is the time controling sequence of main user and secondary user's in time slot cognition wireless network, and wherein the State Transferring of main user is synchronous with the time slot frame of secondary user's.
Comparison diagram 1 (a) and Fig. 1 (b) can be clearly seen that, in time slot cognition wireless network, secondary user's can be synchronous with main user, and in non-slot cognition wireless network, secondary user's can not be synchronous with PUs.
Two, constructing system model
With reference to Fig. 2, the system model that method of the present invention uses is the non-slot cognition wireless network that N number of main user and M secondary user's form, main user enjoys authorization channel (authorization channel is divided into L sub-channels), can competition network at any time; Secondary user's adopts wireless full-duplex communication pattern, the busy channel when main user is idle, if secondary user's occupies certain subchannel transmission data, secondary user's keeps carrying out perception to this shared channel while transmission data.
The process that secondary user's carries out full duplex frequency spectrum perception is:
(1) first secondary user's is divided into several data transmission slots, more each data transmission slots is divided into V perception cycle;
(2) within each perception cycle, no matter whether secondary user's is in transmission data, and secondary user's is all simultaneously at detection shared channel.
Three, the flow process of full-duplex media access protocol method
The main flow of media access control protocol method of the present invention is:
Step1: build non-slot cognition network model.
Step2: detect main user to the race condition of channel, once detect the competition (namely main user activate) of main user to channel within very short perception cycle, then secondary user's is kept out of the way immediately, allows back this channel to main user.
Secondary user's no longer waits until as conventional half duplex media access control protocol that a complete transmission frame end just allows letter in reply road to main user, but just keep out of the way immediately once detect main user the competition of channel, so this step effectively can evade secondary user's can not detect channel simultaneously problem when transmitting data.
Step3: after secondary user's abdicates the subchannel originally taken, detects other subchannel successively, thus obtains next idle channel and continue the transmission of its data.
Due to all the other channels of secondary user's tested in sequence, instead of wait for that the free time abdicates the subchannel originally taken, so this step improves the channel utilization of secondary user's significantly to secondary user's again.
Step4: when secondary user's successfully utilizes an idle sub-channels to carry out transfer of data, this secondary user's continues to perform full duplex spectrum monitoring, thus waits for next time with the activation of frequency main user.This step effectively prevent the activation failure problem of main user on new subchannel.
Referring to Fig. 3, describe the performing step of the secondary user's FDC-MAC agreement that the present invention proposes in detail.
If Q is the length of secondary user's awaiting transmission data queue; L is subchannel number; There is idle channel in I=1 mark, it is all occupied that I=0 identifies all channels; PU is main user; SU is secondary user's.
In multichannel non-slot network, the secondary user's FDC-MAC protocol-implementation step that the present invention proposes is as follows:
(1), when the queue Q non-NULL of secondary user's SU, namely during Q ≠ 0, circulation performs step (2) to step (25), as Q=0, jumps to step (26);
(2) if secondary user's SU attempts searching idle sub-channels, then perform step (3), otherwise jump to step (20);
(3) I=0 is put, i=1;
(4) as I=0, circulation performs step (5) to step (14), otherwise jumps to step (15);
(5) secondary user's SU uses wireless FD-SS technology perception (imodL) sub-channels;
(6) if (imodL) sub-channels is perceived as sky, then perform step (7), otherwise jump to step (12);
(7) now search out vacant channels, therefore put I=1;
(8) vacant channels searched out is set to C 2, i.e. C 2=(imodL);
(9) if (imodL)=0, perform step (10), otherwise jump to step (11);
(10) C is made 2=L;
(11) if (imodL) ≠ 0, continue to perform step (12);
(12) if (imodL) sub-channels is perceived as non-NULL, then step (13) is performed;
(13)i=i+1;
(14) now judge the situation that takies of current (imodL) sub-channels, jump to step (4);
(15) end loop, continues step (16);
(16) now secondary user's has found an idle sub-channels, starts to send RTS bag with Probability p;
(17) if secondary user's SU successfully receives CTS bag, then step (18) is performed
(18) now, secondary user's SU uses subchannel C 2transmission packet;
(19) if secondary user's SU is unsuccessful receive CTS bag, then restart to find idle sub-channels, jump to step (2);
(20) if secondary user's SU queue not empty and do not attempt find idle sub-channels, then SU is just taking subchannel C 2transmission data, continue to perform step (21);
(21) secondary user's SU uses FD-SS technology to monitor subchannel C 2;
(22) if subchannel C 2all the time unmanned competition, then perform step (23);
(23) secondary user's SU continues to use subchannel C 2transmission data;
(24) if SU has listened to user compete subchannel C 2, then step (25) is performed;
(25) secondary user's SU exits this channel, again attempts finding another idle sub-channels, jumps to step (2);
(26) end loop.
Four, l-G simulation test
1, simulated conditions
In the present embodiment, emulation uses Matlab2011a simulation software.Simulation parameter is as follows:
Request sends bag RTS length 288bits, request-reply bag CTS length 240bits, response packet ACK length 240bits; The period of time T of each packet of secondary user's SUs dbe 8184 μ s, mini-slot length T mslength is 9 μ s, interFrameGap SIFS length is that 28 μ s, DIFS are spaced apart 128 μ s; The length T in a perception cycle spfor 1ms; The data rate R of each mandate subchannel is 1Mbits/s; Subchannel number L is the perception number of time slots V in 10, secondary user's SU each data slots is 10; Main user PUs number N is 10, secondary user's SUs number M is 10; Bag transmission probability p is 0.01.
2, content is emulated
A (), under the saturated non-slot cognition network of multichannel, the FDC-MAC agreement based on RTS/CTS in contrast the present invention, based on the accessible throughput of main user under the FDC-MAC agreement of ACK and HDC-MAC agreement.
B (), under multichannel unsaturation non-slot cognition network, the FDC-MAC agreement based on RTS/CTS in contrast the present invention, based on the accessible throughput of main user under the FDC-MAC agreement of ACK and HDC-MAC agreement.
C (), under the saturated non-slot cognition network of multichannel, the FDC-MAC agreement based on RTS/CTS in contrast the present invention, based on the accessible throughput of secondary user's under the FDC-MAC agreement of ACK and HDC-MAC agreement.
D (), under multichannel unsaturation non-slot cognition network, the FDC-MAC agreement based on RTS/CTS in contrast the present invention, based on the accessible throughput of secondary user's under the FDC-MAC agreement of ACK and HDC-MAC agreement.
3, Numerical Value Result Analysis
Fig. 4 (a) and Fig. 4 (b) depicts the throughput performance of main user under following three kinds of agreements in saturated and unsaturation non-slot cognition network: based on the FDC-MAC agreement of RTS/CTS, based on the FDC-MAC agreement of ACK, HDC-MAC agreement.
As a reference, draw out main user in Fig. 4 (a) and Fig. 4 (b) without the throughput under secondary user's race condition simultaneously.Relevant with " detection probability that secondary user's is competed main subscriber channel " by the throughput of formula (8) known main user, therefore we select suitable energy measuring thresholding to make detection probability constant is 0.9.
Can be drawn by Fig. 4 (a) and Fig. 4 (b): the FDC-MAC agreement based on RTS/CTS applied in the present invention can ensure that the throughput of main user reaches 90% of main user throughput when participating in the competition without secondary user's, but under same parameter, based on the FDC-MAC agreement of ACK only can reach participate in the competition without secondary user's time throughput 55%, HDC-MAC agreement under the throughput of main user only can reach participate in the competition without secondary user's time throughput 11%.Obviously, the application of the present invention in wireless non-slot cognition network improves the throughput of main user greatly.
In addition, comparison diagram 4 (a) and Fig. 4 (b) can draw: compared to saturated cognition network, the performance of the present invention in unsaturation network is closer to situation about participating in the competition without secondary user's.Therefore the better effects if applied in unsaturation network of the present invention.
Fig. 4 (c) and Fig. 4 (d) depicts the throughput performance of secondary user's under following three kinds of agreements in saturated and unsaturation cognition network: based on the FDC-MAC agreement of RTS/CTS, based on the FDC-MAC agreement of ACK, HDC-MAC agreement.
From formula (16), the throughput of main user is relevant with " false alarm probability that secondary user's is competed main subscriber channel ", and therefore we select suitable energy measuring thresholding to control false alarm probability.
Can be drawn by Fig. 4 (c): the throughput significantly improving secondary user's based on the FDC-MAC agreement of RTS/CTS compared to the FDC-MAC agreement based on ACK.The throughput of secondary user's under the agreement of HDC-MAC agreement is answered, but this obtains under the prerequisite of sacrificing main user throughput.Based under the FDC-MAC agreement of RTS/CTS, the throughput under the throughput ratio HDC-MAC agreement of secondary user's has minimizing, but which ensure that the preferential right of main user to channel.
In addition, in the emulation of Fig. 4 (c), no matter false alarm probability is got large or got little, above-mentioned trend does not all change.In the emulation of Fig. 4 (c), false alarm probability perseverance gets 0.1.
By Fig. 4 (c) and Fig. 4 (d), we can obtain, in unsaturation non-slot cognition network, the throughput that secondary user's obtains under based on the FDC-MAC agreement of RTS/CTS is apparently higher than the throughput be less than under HDC-MAC agreement based on the throughput under the FDC-MAC agreement of ACK.Same, the agreement adopted in the present invention ensure that the preferential right of main user to channel.In addition we notice, arrival rate λ is larger, and secondary user's throughput also increases thereupon, but the relative variation tendency under three kinds of agreements still remains unchanged.
In sum:
(1) the present invention can be applicable to multichannel non-slot cognition wireless network, on the basis ensureing main user throughput, maximizes the channel utilization of secondary user's.
(2) the present invention utilizes full duplex technology to solve the activation failure problem of main user.
It should be noted that, above-described embodiment does not limit the present invention in any form, the technical scheme that the mode that all employings are equal to replacement or equivalent transformation obtains, and all drops in protection scope of the present invention.

Claims (2)

1., based on a cognition wireless network media access control protocol method for full duplex, it is characterized in that, comprise the following steps:
Step1: build non-slot cognition network model, in described non-slot cognition network model, main user can competition network at any time, secondary user's adopts wireless full-duplex communication pattern, if secondary user's occupies certain subchannel transmission data, then secondary user's keeps carrying out perception to this shared channel while transmission data;
Step2: detect main user to the race condition of channel, once the competition of main user to channel be detected, secondary user's is kept out of the way at once and is abdicated this channel;
Step3: after secondary user's abdicates the subchannel originally taken, detects other subchannel successively, thus obtains next idle channel and continue the transmission of its data;
Step4: when secondary user's successfully utilizes an idle sub-channels to carry out transfer of data, this secondary user's continues to perform full duplex spectrum monitoring, thus waits for next time with the activation of frequency main user.
2. the cognition wireless network media access control protocol method based on full duplex according to claim 1, is characterized in that, in Step1, the process that secondary user's carries out full duplex frequency spectrum perception is:
(1) first secondary user's is divided into several data transmission slots, more each data transmission slots is divided into V perception cycle;
(2) within each perception cycle, no matter whether secondary user's is in transmission data, and secondary user's is all simultaneously at detection shared channel.
CN201510373897.7A 2015-06-30 2015-06-30 Cognitive radio network medium access control protocol method based on full duplex Pending CN105072698A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510373897.7A CN105072698A (en) 2015-06-30 2015-06-30 Cognitive radio network medium access control protocol method based on full duplex

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510373897.7A CN105072698A (en) 2015-06-30 2015-06-30 Cognitive radio network medium access control protocol method based on full duplex

Publications (1)

Publication Number Publication Date
CN105072698A true CN105072698A (en) 2015-11-18

Family

ID=54501937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510373897.7A Pending CN105072698A (en) 2015-06-30 2015-06-30 Cognitive radio network medium access control protocol method based on full duplex

Country Status (1)

Country Link
CN (1) CN105072698A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666489A (en) * 2017-10-17 2018-02-06 西安电子科技大学 A kind of method of media access control protocol based on two benches competition in full duplex radio network
CN108900265A (en) * 2018-06-15 2018-11-27 南京航空航天大学 Full duplex cognitive radio networks method for channel allocation based on matching game
CN109714778A (en) * 2019-02-27 2019-05-03 南京理工大学 A kind of multiselect contention resolved method for cognitive radio networks
CN109792772A (en) * 2016-08-09 2019-05-21 瑞典爱立信有限公司 Movable bi-directional full-duplex is transmitted to know to detect

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103746788A (en) * 2014-01-16 2014-04-23 清华大学 Data transmission method and device for common-frequency synchronous full-duplex secondary user in cognitive radio
WO2014172160A2 (en) * 2013-04-16 2014-10-23 The Arizona Board Of Regents On Behalf Of The University Of Arizona A method for improving spectrum sensing and efficiency in cognitive wireless systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014172160A2 (en) * 2013-04-16 2014-10-23 The Arizona Board Of Regents On Behalf Of The University Of Arizona A method for improving spectrum sensing and efficiency in cognitive wireless systems
CN103746788A (en) * 2014-01-16 2014-04-23 清华大学 Data transmission method and device for common-frequency synchronous full-duplex secondary user in cognitive radio

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WENCHI CHENG;XI ZHANG;HAILIN ZHANG: "Full-Duplex Spectrum-Sensing and MAC-Protocol for Multichannel Nontime-Slotted Cognitive Radio Networks", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 *
WENCHI CHENGY,XI ZHANGY,HAILIN ZHANG: "Full duplex spectrum sensing in non-time-slotted cognitive radio networks", 《MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011》 *
马真理: "一种基于全双工的分布式认知无线电MAC协议", 《广东通信技术》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109792772A (en) * 2016-08-09 2019-05-21 瑞典爱立信有限公司 Movable bi-directional full-duplex is transmitted to know to detect
CN107666489A (en) * 2017-10-17 2018-02-06 西安电子科技大学 A kind of method of media access control protocol based on two benches competition in full duplex radio network
CN108900265A (en) * 2018-06-15 2018-11-27 南京航空航天大学 Full duplex cognitive radio networks method for channel allocation based on matching game
CN108900265B (en) * 2018-06-15 2021-02-05 南京航空航天大学 Full-duplex cognitive radio network channel allocation method based on matching game
CN109714778A (en) * 2019-02-27 2019-05-03 南京理工大学 A kind of multiselect contention resolved method for cognitive radio networks

Similar Documents

Publication Publication Date Title
CN104094652B (en) For managing the system and method competed in wireless communication system
CN105072698A (en) Cognitive radio network medium access control protocol method based on full duplex
EP3179657B1 (en) Parallel multiuser data transmission method and primary node
WO2013128072A1 (en) Method and apparatus for synchronized channel access among groups
CN104202822A (en) Channel access method, channel access system and stations
CN105900513B (en) Method and device for channel competition
US9077528B2 (en) Method and device for performing communication in wireless communication system
CN103517343A (en) Resource pre-scheduling method for device-to-device (D2D) communication system working under industrial scientific media (ISM) frequency bands
US11800510B2 (en) Wireless communication method and wireless communication terminal
EP2763493A1 (en) Method for accessing network for device, access point, access network device and system
KR20110061626A (en) Directional discovery protocol with coordinated channel selection
Hsu et al. An adaptive multichannel protocol for large-scale machine-to-machine (M2M) networks
CN112970300A (en) Method and apparatus for paging transceiving, system information window determination and uplink carrier selection
RU2635868C2 (en) Method and device to perform access in wireless lan system
CN112188641A (en) Communication method and device
US20180310211A1 (en) Transmission opportunity control method and apparatus
CN113950151A (en) Physical Downlink Control Channel (PDCCH) monitoring method, device and terminal
CN104219017A (en) A method for transmitting a data packet in a physical layer and an access point
Dama et al. A novel RACH mechanism for dense cellular-IoT deployments
KR20180090864A (en) Device-to-device communication method, an access point and a first station
US20120269120A1 (en) Channel occupying method, mobile ap and external sta
CN103987128A (en) Random access method based on single carrier TDMA and base station
CN107736075B (en) Wireless access point synchronous cooperation method, device and system
Gao et al. An adaptive contention window scheme for 802.11 ah WLANs
Cao et al. Multi‐slot reservation‐based multi‐channel MAC protocol for dense wireless ad‐hoc networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151118