CN106572070B - Method for determining hidden terminal in full-duplex communication, corresponding device and system - Google Patents

Method for determining hidden terminal in full-duplex communication, corresponding device and system Download PDF

Info

Publication number
CN106572070B
CN106572070B CN201510659239.4A CN201510659239A CN106572070B CN 106572070 B CN106572070 B CN 106572070B CN 201510659239 A CN201510659239 A CN 201510659239A CN 106572070 B CN106572070 B CN 106572070B
Authority
CN
China
Prior art keywords
terminal
hidden
hidden terminal
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510659239.4A
Other languages
Chinese (zh)
Other versions
CN106572070A (en
Inventor
赵志勇
王旭东
唐爱民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510659239.4A priority Critical patent/CN106572070B/en
Priority to PCT/CN2016/095977 priority patent/WO2017063449A1/en
Publication of CN106572070A publication Critical patent/CN106572070A/en
Application granted granted Critical
Publication of CN106572070B publication Critical patent/CN106572070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • H04L1/1664Details of the supervisory signal the supervisory signal being transmitted together with payload signals; piggybacking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/14Two-way operation using the same type of signal, i.e. duplex
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention provides a method for determining a hidden terminal in full duplex communication, which comprises the following steps: after an Access Point (AP) receives data of first terminal equipment (UE), if the first UE does not have a corresponding hidden terminal or does not have data sent to the hidden terminal of the first UE, a specific signal is sent to all other UEs; and after receiving the feedback information of the other UE, the AP updates the corresponding relation of the hidden terminal currently corresponding to the first UE according to the feedback information. The scheme can effectively determine the hidden terminal in the full-duplex communication, so that the establishment of the asymmetric transmission link in the full-duplex wireless communication network is realized by using the hidden terminal under the condition of not increasing the network overhead.

Description

Method for determining hidden terminal in full-duplex communication, corresponding device and system
Technical Field
The invention relates to the field of communication, in particular to a method and a device for determining a hidden terminal in full-duplex communication.
Background
As wireless Full-duplex communication technology matures, networking problems of wireless Full-duplex communication in Networks become more and more important, related MAC protocols have been proposed, such as those in Wang, Xudong, Aimin Tang, and Pengfei Huangang, "Full duplex random access for multi-user OFDMA communication systems," Ad Hoc Networks 24(2015):200 + 213 (hereinafter referred to as literature one) and Wang Xuxu east, Tang lover, Huangpeng fly, "a medium access control method supporting Full-duplex OFDMA", patent application No.: 201410499806.X (hereinafter referred to as document two) proposed MAC protocol design for full duplex OFDMA random access.
The protocol realizes the CSMA/CD technology in a wireless network by adding a design of a virtual MAC (Media Access Control) header in a physical layer, thereby greatly improving the communication efficiency and the network capacity. However, in this protocol, only the situation that how to establish a symmetric full-duplex link when both AP (Access Point) and terminal equipment have data to transmit to each other is considered for full-duplex communication itself. However, in practical systems, since data is often not saturated, it is not very much that the AP and the terminal device simultaneously have data to transmit to each other, and therefore it is very important to design an asymmetric data link in the network. By asymmetric data link is meant that one terminal device transmits data to the AP, while the AP transmits data to a different terminal device.
However, due to the inherently isotropic nature of the radio channel, it is not easy to establish asymmetric links in the network. For an asymmetric link, one terminal device sends data to an AP, and the AP sends data to another terminal device, and the two terminal devices may affect each other, so that the data sent by the AP to the another terminal device cannot be correctly received.
The invention content is as follows:
the invention provides a method and a device for determining a hidden terminal in full-duplex communication, which effectively realize the determination of the hidden terminal in the full-duplex communication.
In order to solve the above technical problem, the present invention provides a method for determining a hidden terminal in full duplex communication, where the method includes:
after an Access Point (AP) receives data of first terminal equipment (UE), if the first UE does not have a corresponding hidden terminal or does not have data sent to the hidden terminal of the first UE, a specific signal is sent to all other UEs;
and after receiving the feedback information of the other UE, the AP updates the corresponding relation of the hidden terminal currently corresponding to the first UE according to the feedback information.
Preferably, the first and second electrodes are formed of a metal,
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
the updating of the hidden terminal corresponding to the first UE according to the feedback information includes:
and respectively carrying out the following operations on each feedback information:
performing self-correlation operation on the pseudo-random sequence generated by the MAC address of each UE and the feedback information;
if the operation result of the feedback information and the MAC address of one UE generates a peak value, judging that the UE is a hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE.
The invention also provides a method for determining the hidden terminal in full duplex communication, which comprises the following steps:
after receiving a specific signal of an access point AP, terminal equipment UE judges whether other UE sends a signal to the AP or not within a preset length of time before receiving the specific signal, and if not, the UE is judged to be a hidden terminal;
and the UE feeds back information indicating that the UE is a hidden terminal to the AP.
Preferably, the first and second electrodes are formed of a metal,
the time of the UE for feeding back the information and the time of the AP for sending the ACK information are in the same time range;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the UE feeding back information indicating that the UE is a hidden terminal to the AP includes:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
The invention also provides a method for establishing the asymmetric link in the full duplex communication, which comprises the following steps:
determining a hidden terminal corresponding relation currently corresponding to a first terminal device UE according to a method for determining a hidden terminal in full duplex communication described in the embodiment of the invention;
and the access point AP establishes an asymmetric link between the hidden terminals corresponding to the first UE and sends the data to the corresponding hidden terminals.
The invention also provides a device for determining the hidden terminal in the full duplex communication, which is arranged in the access point AP, and the device comprises:
a sending module, configured to send a specific signal to all other UEs if the first UE has no corresponding hidden terminal or no data sent to the hidden terminal of the first UE after receiving data of a first UE device;
and the determining module is used for updating the corresponding relation of the hidden terminal currently corresponding to the first UE according to the feedback information after receiving the feedback information of the other UEs.
Preferably, the first and second electrodes are formed of a metal,
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
the determining module is configured to update the mapping relationship of the hidden terminal corresponding to the first UE according to the feedback information specifically includes:
and respectively carrying out the following operations on each feedback information:
performing self-correlation operation on the pseudo-random sequence generated by the MAC address of each UE and the feedback information;
if the operation result of the feedback information and the MAC address of one UE generates a peak value, judging that the UE is a hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE.
The invention also provides a device for determining the hidden terminal in the full duplex communication, which is arranged on the terminal equipment UE, and the device comprises:
the judging module is used for judging whether other UE sends signals to the AP or not within a preset length of time before the specific signal is received after the specific signal of the access point AP is received, and if the other UE does not send signals to the AP, the UE is judged to be a hidden terminal;
and the information feedback module is used for feeding back information indicating that the UE is a hidden terminal to the AP.
Preferably, the first and second electrodes are formed of a metal,
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the information feedback module is configured to feed back information indicating that the UE is a hidden terminal to the AP, specifically:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
The invention also provides a system for establishing the asymmetric link in the full duplex communication, which comprises a device for determining the hidden terminal in the full duplex communication, which is disclosed by the third embodiment of the invention;
the link establishing device comprises:
and the link establishing module is used for establishing an asymmetric link between the hidden terminals corresponding to the first UE and sending the data to the corresponding hidden terminals.
The scheme can effectively determine the hidden terminal in the full-duplex communication, so that the establishment of the asymmetric transmission link in the full-duplex wireless communication network is realized by using the hidden terminal under the condition of not increasing the network overhead.
Drawings
Fig. 1 is a flowchart of a method for determining hidden terminals in full duplex communication according to a first embodiment;
fig. 2 is another flowchart of a method for determining hidden terminals in full duplex communication according to a first embodiment;
fig. 3 is a flowchart of a method for establishing an asymmetric link in full duplex communication according to a first embodiment;
fig. 4 is a schematic diagram of an asymmetric link in full-duplex communication according to the second embodiment;
fig. 5 is a schematic diagram of a hidden terminal in full duplex communication according to a second embodiment;
fig. 6 is a diagram illustrating a data packet in full duplex communication according to the second embodiment;
fig. 7 is a diagram illustrating a data frame in full duplex communication according to the second embodiment;
fig. 8 is a schematic diagram of asymmetric link establishment in full duplex communication according to the second embodiment;
fig. 9 is a schematic structural diagram of a device for determining a hidden terminal in full duplex communication according to a third embodiment;
fig. 10 is another block diagram of the determination apparatus of the hidden terminal in the full duplex communication according to the third embodiment;
fig. 11 is a schematic structural diagram of a system for establishing an asymmetric link in full-duplex communication according to a third embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present application more apparent, embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
Example one
In order to solve the above technical problem, when the AP selects another terminal device, it needs to ensure that the reception of the terminal device is not affected by the terminal device of the sender, that is, the two terminal devices are mutually hidden terminals. In the invention, the terminal equipment performs distributed hidden terminal self detection through a specific signal, such as a busy signal, sent by the AP, and feeds back the hidden terminal information in parallel within the time range of sending the ACK signal by the AP. And the AP establishes a hidden terminal corresponding relation according to the feedback signal and finally realizes the establishment of the asymmetric transmission link through the corresponding relation graph.
As shown in fig. 1, the present invention provides a method for determining a hidden terminal in full duplex communication, where the method includes:
step S10: after an Access Point (AP) receives data of first terminal equipment (UE), if the first UE does not have a corresponding hidden terminal or does not have data sent to the hidden terminal of the first UE, a specific signal is sent to all other UEs;
step S13: and after receiving the feedback information of the other UE, the AP updates the corresponding relation of the hidden terminal currently corresponding to the first UE according to the feedback information.
The time of other UE feedback information and the time of the AP sending ACK information are in the same time range; the specific signal may be busy indication information.
The feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
updating the corresponding relationship of the hidden terminal corresponding to the first UE according to the feedback information may be implemented as follows:
and respectively carrying out the following operations on each feedback information:
step one, carrying out self-correlation operation on a pseudo-random sequence generated by an MAC address of each UE and the feedback information;
step two, if the operation result of the feedback information and the MAC address of one UE generates a peak value, the UE is judged to be the hidden terminal of the first UE, and the corresponding relation of the hidden terminal corresponding to the first UE is correspondingly updated; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE.
As shown in fig. 2, this embodiment further provides a method for determining a hidden terminal in full duplex communication, where the method includes:
step S11: after receiving a specific signal of an access point AP, terminal equipment UE judges whether other UE sends a signal to the AP or not within a preset length of time before receiving the specific signal, and if not, the UE is judged to be a hidden terminal;
step S12: and the UE feeds back information indicating that the UE is a hidden terminal to the AP.
The time of the UE for feeding back the information and the time of the AP for sending the ACK information are in the same time range; the specific signal may be busy indication information.
Specifically, the UE feeds back information indicating that the UE is a hidden terminal to the AP in the following manner:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
As shown in fig. 3, this embodiment further provides a method for establishing an asymmetric link in full duplex communication, where the method includes:
according to the method for determining the hidden terminal in the full duplex communication, the corresponding relation of the hidden terminal currently corresponding to the first terminal equipment UE is provided;
step S25: and the access point AP establishes an asymmetric link between the hidden terminals corresponding to the first UE and sends the data to the corresponding hidden terminals.
Example two
The technical scheme of the invention is further explained by combining the attached drawings.
Firstly, as shown in fig. 4, when a certain terminal device a competes for a channel to send data to the AP, the AP finds that no data is transmitted to the terminal device a, and detects a hidden terminal correspondence relationship of the terminal device a, and if the terminal device a does not have a corresponding hidden terminal, or the AP does not have corresponding data to send to a hidden terminal in a correspondence diagram, the AP sends a busy signal to all terminal devices except the terminal device a, so as to prevent the hidden terminal sending data from interfering with the AP receiving data. For all other terminal devices, after receiving the busy signal sent by the AP, it is known that there is a terminal device sending data to the AP. For example, for the terminal device B, if the terminal device B does not detect that there is data to be sent to the AP in the channel before that, the terminal device B may determine that it is a hidden terminal of the terminal device a that is currently sending.
It should be noted that, in this embodiment, the specific signal may be a busy signal, the busy signal is used to always occupy the entire channel to prevent collision, and the use is relatively simple. Of course, other specific signals, such as a signal similar to RTS, which functions similarly to the busy signal, may also be used in other embodiments.
In addition, the correspondence of the hidden terminal is continuously updated and changed, and the correspondence of the hidden terminal detected by the AP before the busy signal is sent may be different from the correspondence of the hidden terminal re-determined according to the feedback information of each terminal device after the busy signal is sent.
And secondly, if all other terminal devices judge that the terminal devices are hidden terminals of the current sending terminal device A, the information is fed back to the AP while the AP sends an ACK signal. Since there may be multiple hidden terminals (e.g., terminal B, C, D … …) simultaneously, feeding back the transmitted data at the same time may cause data collision, and thus the AP may not receive the feedback signal correctly. To solve this problem, the feedback signal of each terminal device is designed as a pseudo-random sequence rather than being transmitted directly in the form of a data packet. The pseudo-random sequence is generated by using the MAC address of each terminal device as a seed, and 128-bit pseudo-random sequences can be generated by referring to a method for generating pseudo-random sequences by using a hash algorithm, which is provided by bolpyreva, Alexandra, and virenda kumar. Since the MAC address has 48 bits, the probability of collision of the generated pseudo-random sequence result is the lowest achievable using the algorithm in document one, and thus is sufficient for supporting ten terminal devices. After each terminal device generates the pseudo-random sequence, the pseudo-random sequence is directly modulated by BPSK and is sent out in an OFDM mode, and a physical layer header is not needed any more. It can be known from the length of the ACK packet that the time to send the 128-bit pseudo-random sequence is much shorter than the time of the ACK. For example, as shown in fig. 5, terminal device B and terminal device C are hidden terminals of terminal device a.
And thirdly, the AP simultaneously detects the received feedback data of the hidden terminal equipment while sending the ACK data, if the terminal equipment judges that the terminal equipment is the hidden terminal, the feedback information is sent, and if the terminal equipment judges that the terminal equipment is not the hidden terminal, the feedback information is not sent. The AP has MAC addresses of all terminal devices, the AP carries out the same pseudo-random sequence generation algorithm processing on the MAC addresses of all the terminal devices respectively and then carries out autocorrelation operation on the MAC addresses and received data, if the operation result generates a peak value, the feedback signal is proved to contain the MAC address, the AP knows the terminal devices which send data before at the same time, so the AP can establish a hidden terminal corresponding relation between the two terminal devices, and the process is carried out until all the MAC addresses are finished. Since the terminal device has mobility, the correspondence relationship of the hidden terminal may change, and therefore the AP needs to update the previously stored correspondence relationship map.
The updating method comprises the following steps:
1) when a hidden terminal corresponding relation is obtained again for a certain sending terminal device through the relation, the AP deletes all the hidden terminal corresponding relations of the sending terminal device and restores the obtained corresponding relation graph;
2) the AP selects a hidden terminal to establish an asymmetric link for transmitting data, if the data sent by the AP fails, the corresponding relation of the hidden terminals is deleted, which indicates that two hidden terminals are no longer hidden terminals because the terminal equipment moves.
And fourthly, in the process of establishing the asymmetric link, the terminal equipment also needs to identify whether the current link is the asymmetric link, for example, the current terminal equipment A sends data to the AP, the AP sends data to the terminal equipment B to establish the asymmetric link, and the B cannot hear that the terminal equipment A is sending data because the B is a hidden terminal of the A. If the terminal device B cannot recognize that the link sent by the AP to the terminal device B is an asymmetric link, the terminal device B will get an opportunity to establish a symmetric full-duplex link with the AP, thereby causing data transmission collision of the AP receiving terminal device a. Therefore, it is necessary to add identification information to the data sent by the AP to the terminal B to tell the terminal B that an asymmetric link is currently established. In order to identify the information quickly and keep the consistency of the MAC protocol without adding additional overhead to the network, we skillfully use the reserved bits of the SIGNAL in the physical layer header to transmit the information, and the SIGNAL follows the physical layer preamble SIGNAL in the 802.11 standard, as shown in fig. 6, to transmit the packet length and the modulation coding information of the data packet. The second bit is a reserved bit, the data of the reserved bit can be used for transmitting link identification information, if the transmission is 0, the terminal equipment can establish a symmetric link, and if the transmission is 1, the terminal equipment can not establish the symmetric link and the asymmetric link transmission is currently carried out, so that the condition of the conflict is avoided.
And fifthly, when a certain terminal device (assumed to be a terminal device A) successfully competes to a channel to send data to the AP, if the AP finds that no data is sent to the terminal device at the moment after the virtual MAC address is solved, and if data is sent to a certain terminal device (assumed to be a terminal device B) in a hidden terminal mapping chart of the terminal device at the moment, the AP immediately establishes an asymmetric link to transmit the data.
The virtual MAC address is set after the physical layer header, and the specific data frame structure is shown in fig. 7. If the signal sent by the AP to the terminal device B is shorter than the data sent by the terminal device A to the AP, the AP sends a busy signal after finishing sending the data to the terminal device B until the terminal device A finishes sending the data, so that the data sent by the terminal device A is protected from being interfered by other hidden terminal devices. After the data transmission is finished, the AP and the terminal device B simultaneously transmit an ACK signal, which is specifically illustrated in fig. 8. Fig. 8(a) shows that the data transmitted by the AP to B is longer than the data transmitted by the terminal a to the AP, and fig. 8(B) shows that the data transmitted by the AP to B is shorter than the data transmitted by the terminal a to the AP.
It can be seen from the above-mentioned setup procedure of the asymmetric full-duplex link that this method does not add any additional network overhead.
In addition, there are four points to be further explained:
1) the schemes of the full-duplex CSMA/CD random access protocol designed in the first and second documents only consider the case of symmetric full-duplex links, while in actual communication, the opportunities for symmetric full-duplex communication are limited, so it is important to consider the case of asymmetric link establishment. In addition, Aimin Tang, and Xudong Wang, "Medium Access Control for a Wireless LAN with a Full Duplex AP and Half Duplex states," in IEEE GLOBECOM 2014 also discusses a method for establishing an asymmetric link, but in an asymmetric link, only the AP is Full Duplex, and all UEs are Half Duplex.
2) The schemes of the symmetric link condition and collision detection and the like can adopt the schemes designed in the first document and the second document, and when a certain terminal device competes for a channel to transmit data to an AP, if the following conditions occur, the methods in the first document and the second document are adopted to process the data: a) a plurality of terminal devices collide; b) the AP has just the data to establish a symmetric full duplex link with the terminal device.
If no collision occurs and the AP does not establish a full-duplex link with the data of the terminal equipment, the method in the patent is adopted to establish the asymmetric full-duplex link. If the AP can not establish the symmetrical full-duplex link or the asymmetrical full-duplex link, the AP sends a busy signal.
3) The generation of the pseudo-random sequence of each terminal device may also be performed such that when each terminal device accesses the AP, the AP assigns a pseudo-random sequence thereto, and when each terminal device leaves, the AP recovers the pseudo-random sequence. Thus, each terminal device can directly have a different pseudo-random sequence, and therefore, the generation of the pseudo-random sequence by relying on the MAC address and a pseudo-random sequence generation algorithm is not needed.
4) The hidden terminal mentioned above may be a completely hidden terminal, that is, two terminal devices cannot hear each other completely, or an incompletely hidden terminal, that is, two terminal devices interfere with each other, but the interference is small. The incomplete hidden terminal can be judged by the following method, one terminal device can hear that one terminal device is transmitting data between the terminal devices, but can not know the transmitted physical layer header, the signal to noise ratio between the terminal devices is poor, namely the interference is small, and then the terminal device can judge that the terminal device is the incomplete hidden terminal by hearing the busy tone transmitted by the AP. If a terminal is not completely hidden, when the AP sends data to another terminal device in the asymmetric link, the AP needs to increase the transmission power or decrease the transmission rate appropriately, and when the AP replies with ACK, the AP needs to increase the transmission power or decrease the transmission rate appropriately.
It should be noted that, due to the uncertainty of the wireless channel, there is a possibility that a misjudgment with a small probability may occur in the case where the terminal judgment is not completely hidden. For example, due to channel fading, channel deterioration between two terminal devices at a certain time may cause an incomplete hidden terminal, but a channel condition between the two terminal devices is not very poor, and after this occurs, after the AP establishes asymmetric full duplex between the two terminal devices, data sent by the AP may fail due to interference, and the AP needs to delete the terminal device from a hidden terminal correspondence relationship.
EXAMPLE III
As shown in fig. 9, the present invention further provides a device for determining a hidden terminal in full duplex communication, which is disposed in an access point AP, and the device includes:
a sending module 11, configured to send a specific signal to all other UEs if the first UE has no corresponding hidden terminal or no data sent to the hidden terminal of the first UE after receiving data of a first UE device;
and the determining module 12 is configured to update the corresponding relationship of the hidden terminal currently corresponding to the first UE according to the feedback information after receiving the feedback information of the other UEs.
Preferably, the first and second electrodes are formed of a metal,
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
the determining module 12 is configured to update the mapping relationship of the hidden terminal corresponding to the first UE according to the feedback information specifically includes:
and respectively carrying out the following operations on each feedback information:
performing self-correlation operation on the pseudo-random sequence generated by the MAC address of each UE and the feedback information;
if the operation result of the feedback information and the MAC address of one UE generates a peak value, judging that the UE is a hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first UE.
As shown in fig. 10, the present invention further provides a device for determining a hidden terminal in full duplex communication, which is disposed in a terminal device UE, and the device includes:
a determining module 21, configured to determine, after receiving a specific signal for accessing an AP, whether a signal sent by another UE to the AP is detected within a predetermined time period before the specific signal is received, and if the signal is not detected, determine that the UE is a hidden terminal;
and an information feedback module 22, configured to feed back information indicating that the UE is a hidden terminal to the AP.
Preferably, the first and second electrodes are formed of a metal,
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
Preferably, the first and second electrodes are formed of a metal,
the information feedback module 22 is configured to feed back information indicating that the UE is a hidden terminal to the AP, specifically:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
As shown in fig. 11, the present invention further provides a system for establishing an asymmetric link in full duplex communication, where the system includes a device for determining a hidden terminal in full duplex communication according to the third embodiment of the present invention;
the link establishing device comprises:
the link establishing module 31 is configured to establish an asymmetric link between hidden terminals corresponding to the first UE, and send the data to the corresponding hidden terminals.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the foregoing embodiments may also be implemented by using one or more integrated circuits, and accordingly, each module/module in the foregoing embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present application is not limited to any specific form of hardware or software combination.

Claims (14)

1. A method for determining hidden terminals in full-duplex communication is characterized in that the method comprises the following steps:
after receiving data of first terminal equipment UE, an access point AP sends a specific signal to all other UE if the first terminal equipment UE does not have a corresponding hidden terminal or does not have data sent to the hidden terminal of the first terminal equipment UE;
after receiving feedback information of other UE, the AP updates the corresponding relation of the hidden terminal currently corresponding to the first terminal equipment UE according to the feedback information, wherein the feedback information is that after the terminal equipment UE receives a specific signal of the AP, whether other UE sends a signal to the AP or not is judged within a time period of preset length before the specific signal is received, if not, the UE is judged to be a hidden terminal, and the UE feeds back information indicating that the UE is a hidden terminal to the AP;
the specific signal is used for the other UE to perform hidden terminal self-detection and prevent the hidden terminal from sending data to interfere the AP from receiving the data.
2. The method of claim 1, wherein:
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
3. The method of claim 1 or 2, wherein:
the feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
the updating of the hidden terminal corresponding relationship corresponding to the first terminal device UE according to the feedback information includes:
and respectively carrying out the following operations on each feedback information:
performing self-correlation operation on the pseudo-random sequence generated by the MAC address of each UE and the feedback information;
if the operation result of the feedback information and the MAC address of one UE generates a peak value, judging that the UE is a hidden terminal of the first terminal equipment UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first terminal equipment UE; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first terminal equipment UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first terminal equipment UE.
4. A method for determining hidden terminals in full-duplex communication is characterized in that the method comprises the following steps:
after receiving a specific signal of an access point AP, terminal equipment UE judges whether other UE sends a signal to the AP or not within a preset length of time before receiving the specific signal, and if not, the UE is judged to be a hidden terminal; after the AP receives data of a first terminal device UE, if the first terminal device UE does not have a corresponding hidden terminal or does not have data of a hidden terminal sent to the first terminal device UE, sending a specific signal to all other UEs;
the UE feeds back information indicating that the UE is a hidden terminal to the AP;
the specific signal is used for the other UE to perform hidden terminal self-detection and prevent the hidden terminal from sending data to interfere the AP from receiving the data.
5. The method of claim 4, wherein:
the time of the UE for feeding back the information and the time of the AP for sending the ACK information are in the same time range;
the specific signal is busy indication information.
6. The method of claim 5, wherein:
the UE feeding back information indicating that the UE is a hidden terminal to the AP includes:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
7. A method for establishing an asymmetric link in full duplex communication, the method comprising:
determining a hidden terminal corresponding relation currently corresponding to a first terminal equipment UE according to the method of any one of claim 1 to claim 3;
the access point AP establishes an asymmetric link between hidden terminals corresponding to the first terminal equipment UE, and sends the data to the corresponding hidden terminals, wherein the data comprises identification information, so that the hidden terminals suspend establishing a symmetric full-duplex link with the access point AP based on the identification information.
8. A device for determining a hidden terminal in full duplex communication is arranged in an Access Point (AP), and is characterized in that the device comprises:
a sending module, configured to send a specific signal to all other UEs if the first terminal device UE does not have a corresponding hidden terminal or does not have data sent to the hidden terminal of the first terminal device UE after the access point AP receives the data of the first terminal device UE;
a determining module, configured to update a corresponding relationship of a hidden terminal currently corresponding to the first terminal device UE according to the feedback information after the AP receives feedback information of the other UE, where the feedback information is that after the terminal device UE receives a specific signal of the AP, it determines whether another UE is detected to send a signal to the AP within a time period of a predetermined length before the specific signal is received, and if not, it determines that the UE is a hidden terminal, and the UE feeds back information indicating that the UE is a hidden terminal to the AP;
the specific signal is used for the other UE to perform hidden terminal self-detection and prevent the hidden terminal from sending data to interfere the AP from receiving the data.
9. The apparatus of claim 8, wherein:
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
10. The apparatus of claim 8 or 9, wherein:
the feedback information comprises a pseudo-random sequence generated according to a Media Access Control (MAC) address of the UE;
the determining module is configured to update the hidden terminal corresponding relationship corresponding to the first terminal device UE according to the feedback information specifically includes:
and respectively carrying out the following operations on each feedback information:
performing self-correlation operation on the pseudo-random sequence generated by the MAC address of each UE and the feedback information;
if the operation result of the feedback information and the MAC address of one UE generates a peak value, judging that the UE is a hidden terminal of the first terminal equipment UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first terminal equipment UE; and if the operation result of the feedback information and the MAC address of one UE does not generate a peak value, judging that the UE is not the hidden terminal of the first terminal equipment UE, and correspondingly updating the corresponding relation of the hidden terminal corresponding to the first terminal equipment UE.
11. A device for determining a hidden terminal in full duplex communication is arranged in a terminal device (UE), and is characterized in that the device comprises:
the judging module is used for judging whether other UE sends signals to the AP or not within a preset length of time before the specific signal is received after the terminal equipment UE receives the specific signal of the access point AP, and judging the UE as a hidden terminal if the other UE does not send signals to the AP; after the AP receives data of a first terminal device UE, if the first terminal device UE does not have a corresponding hidden terminal or does not have data of a hidden terminal sent to the first terminal device UE, sending a specific signal to all other UEs;
the information feedback module is used for feeding back information indicating that the UE is a hidden terminal to the AP;
the specific signal is used for the other UE to perform hidden terminal self-detection and prevent the hidden terminal from sending data to interfere the AP from receiving the data.
12. The apparatus of claim 11, wherein:
the time of the other UE for feeding back the information is in the same time range as the time of the AP for sending the ACK information;
the specific signal is busy indication information.
13. The apparatus of claim 12, wherein:
the information feedback module is configured to feed back information indicating that the UE is a hidden terminal to the AP, specifically:
and the UE feeds back a pseudo-random sequence generated according to the MAC address of the UE to the AP.
14. A system for establishing an asymmetric link in full duplex communication, comprising:
the system comprises the hidden terminal determining device of any one of claim 8 to claim 10;
the link establishing device comprises:
the link establishing module is configured to establish an asymmetric link between hidden terminals corresponding to the first terminal device UE, and send the data to the corresponding hidden terminals, where the data includes identification information, so that the hidden terminals suspend establishing a symmetric full-duplex link with the access point AP based on the identification information.
CN201510659239.4A 2015-10-12 2015-10-12 Method for determining hidden terminal in full-duplex communication, corresponding device and system Active CN106572070B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510659239.4A CN106572070B (en) 2015-10-12 2015-10-12 Method for determining hidden terminal in full-duplex communication, corresponding device and system
PCT/CN2016/095977 WO2017063449A1 (en) 2015-10-12 2016-08-19 Method for determining hidden terminal in full-duplex communications, corresponding apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510659239.4A CN106572070B (en) 2015-10-12 2015-10-12 Method for determining hidden terminal in full-duplex communication, corresponding device and system

Publications (2)

Publication Number Publication Date
CN106572070A CN106572070A (en) 2017-04-19
CN106572070B true CN106572070B (en) 2021-07-20

Family

ID=58508306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510659239.4A Active CN106572070B (en) 2015-10-12 2015-10-12 Method for determining hidden terminal in full-duplex communication, corresponding device and system

Country Status (2)

Country Link
CN (1) CN106572070B (en)
WO (1) WO2017063449A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112713949B (en) * 2020-11-10 2022-04-26 中国人民解放军海军航空大学航空作战勤务学院 TTNT data chain channel load statistical method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078215A1 (en) * 2013-09-16 2015-03-19 Qualcomm Incorporated Systems and methods for full duplex communication over a wireless network

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050041616A1 (en) * 2003-08-21 2005-02-24 Boris Ginzburg Method and apparatus to adapt threshold of data frame protect mechanism
JP5142669B2 (en) * 2007-11-02 2013-02-13 株式会社東芝 Communication device and method and program for identifying cause of failure
US8031744B2 (en) * 2009-03-16 2011-10-04 Microsoft Corporation Full-duplex wireless communications
US8665063B2 (en) * 2009-09-25 2014-03-04 Northwestern University Neighbor discovery techniques
CN101801109B (en) * 2010-02-05 2012-12-26 西安电子科技大学 Medium access control system and medium access control method in wireless packet network
CN102572843B (en) * 2010-12-22 2014-07-30 无锡物联网产业研究院 Communication resource distributing method and equipment
WO2013077903A1 (en) * 2011-11-21 2013-05-30 Intel Corporation Methods, systems and apparatuses to mitigate communication collisions
CN102497654B (en) * 2011-12-07 2014-10-29 西安电子科技大学 Hidden node concurrent receiving method based on busy tone for removing ACK (acknowledgement character) frame interference
CN103686930B (en) * 2012-09-17 2018-10-12 中国移动通信集团公司 The detection method, system and equipment of concealed nodes in WLAN
CN104219780B (en) * 2014-09-26 2018-01-12 上海交通大学 A kind of Stochastic accessing media access control method for supporting full duplex OFDMA

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078215A1 (en) * 2013-09-16 2015-03-19 Qualcomm Incorporated Systems and methods for full duplex communication over a wireless network

Also Published As

Publication number Publication date
CN106572070A (en) 2017-04-19
WO2017063449A1 (en) 2017-04-20

Similar Documents

Publication Publication Date Title
US11770867B2 (en) Association establishment method and apparatus
US8971256B2 (en) Ad-hoc directional communication in contention access period
KR102288390B1 (en) Processing method and apparatus for reconstructing a beam
US8040898B2 (en) Wireless terminal, access point, system provided with the same, and wireless communication method
TW201101906A (en) Transmission with collision detection and mitigation for wireless communication
EP2754326A1 (en) Methods and apparatus for enabling multiple devices to share a data transmission period
KR20100044925A (en) Efficient signaling over access channel
JP2013520077A (en) Method and apparatus for signaling transmission characteristics in a wireless communication network
WO2008020731A1 (en) Multicast procedure in a wireless network
JP5474544B2 (en) Method and apparatus for transmitting and receiving data
TW201818679A (en) Method for transmitting uplink signal, terminal equipment and network side equipment
JP2020141159A (en) Communication device, communication device control method, and program
KR20180026164A (en) Method and apparatuss for efficient transmission and reception a data in a wireless communication system
US10834775B2 (en) Network access method, access device, and terminal device
CN106572070B (en) Method for determining hidden terminal in full-duplex communication, corresponding device and system
Mostafa et al. Aggregate preamble sequence design for massive machine-type communications in 5G networks
KR20190071447A (en) Method and apparatus for transmitting and receiving a signal in a wireless communication system
US11683134B2 (en) Data transmission method, network device, and terminal device
CN112312390B (en) Neighbor discovery method and system
CN110784244B (en) Data transmission method and full-duplex Ad Hoc network system
Hou et al. Performance evaluation of wireless multihop ad hoc networks using IEEE 802.11 DCF protocol
EP4354812A1 (en) Signal transmission method and apparatus
JP6400802B2 (en) User device, signal reception method, and signal transmission method
JP2020504944A (en) Method and apparatus for random access
Sun et al. An Data-Forwarding based channel condition acknowledgment for Cognitive Radio Mobility Based Routing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant