CN107211453B - channel access method and channel access device - Google Patents
channel access method and channel access device Download PDFInfo
- Publication number
- CN107211453B CN107211453B CN201580071168.4A CN201580071168A CN107211453B CN 107211453 B CN107211453 B CN 107211453B CN 201580071168 A CN201580071168 A CN 201580071168A CN 107211453 B CN107211453 B CN 107211453B
- Authority
- CN
- China
- Prior art keywords
- access
- trigger
- sta
- frame
- trigger access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 457
- 230000011664 signaling Effects 0.000 claims description 21
- 230000004044 response Effects 0.000 claims description 20
- 239000000523 sample Substances 0.000 claims description 20
- 239000000725 suspension Substances 0.000 claims 2
- 238000004891 communication Methods 0.000 abstract description 8
- 101000925840 Homo sapiens Emerin Proteins 0.000 description 176
- 101000697597 Rattus norvegicus Alcohol sulfotransferase A Proteins 0.000 description 176
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000001960 triggered effect Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- OVGWMUWIRHGGJP-WVDJAODQSA-N (z)-7-[(1s,3r,4r,5s)-3-[(e,3r)-3-hydroxyoct-1-enyl]-6-thiabicyclo[3.1.1]heptan-4-yl]hept-5-enoic acid Chemical compound OC(=O)CCC\C=C/C[C@@H]1[C@@H](/C=C/[C@H](O)CCCCC)C[C@@H]2S[C@H]1C2 OVGWMUWIRHGGJP-WVDJAODQSA-N 0.000 description 2
- 101100161473 Arabidopsis thaliana ABCB25 gene Proteins 0.000 description 2
- 101000988961 Escherichia coli Heat-stable enterotoxin A2 Proteins 0.000 description 2
- 101100395869 Escherichia coli sta3 gene Proteins 0.000 description 2
- 101000752249 Homo sapiens Rho guanine nucleotide exchange factor 3 Proteins 0.000 description 2
- 101100096893 Mus musculus Sult2a1 gene Proteins 0.000 description 2
- 102100021689 Rho guanine nucleotide exchange factor 3 Human genes 0.000 description 2
- 101150081243 STA1 gene Proteins 0.000 description 2
- 108091006146 Channels Proteins 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/04—Scheduled access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of wireless communication, in particular to channel access methods and an inter-channel device, which are used for solving the technical problem of low uplink access efficiency.A time parameter of a round of trigger access process can be reserved by an Access Point (AP) in the embodiment of the invention, so that a Station (STA) can execute trigger access according to the indication of the AP, and Distributed Coordination Function (DCF) access can be executed in the interval of executing the trigger access, thereby improving the uplink access efficiency.
Description
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to an channel access method and a channel access device.
Background
The OFDMA (Orthogonal Frequency Division Multiple Access) technology is which is a key technology of WiFi (Wireless Fidelity, chinese) of the next generation, and can significantly improve the Access efficiency of MAC (Media Access Control, chinese) at present, has been paid more attention to the mode of triggering OFDMA uplink Access by an AP (Access Point, chinese) in order to improve the Access efficiency at step and ensure the synchronization quality of OFDMA parallel Access at step .
In addition to the OFDMA uplink access method, if an STA wants to access a channel, the STA can access the channel through a DCF (Distributed Coordination Function, chinese) uplink access method , in which the AP-triggered OFDMA uplink access method is only suitable for a new STA supporting a new standard, and for a Legacy (Legacy) STA, the STA can only access the channel through the DCF access method.
However, in the current system, only the OFDMA uplink access mode based on the AP trigger is supported, or only the DCF access mode is supported, that is, the two uplink access modes cannot exist simultaneously, because if the two modes exist in systems simultaneously, the STA in the system, especially the new STA, is likely to be triggered by the AP when the DCF access is prepared, which may make the STA unable to select how to access the AP at all, and finally results in access failure.
That is, in the prior art, it is difficult to coordinate and coexist the two uplink access manners, so that the system can only select types, resulting in low uplink access efficiency.
Disclosure of Invention
The embodiment of the invention provides channel access methods and channel access devices, which are used for solving the technical problem of low uplink access efficiency.
In an th aspect of the present invention, channel access methods are provided, which are applied to a WLAN, and include:
the AP schedules at least two Trigger access processes, the AP sends broadcast messages in the Trigger access process of the current round, and the broadcast messages contain time parameters of the Trigger access process under the appointment.
With reference to the , in an possible implementation manner of the , the time parameter of the rounds of Trigger access procedures under the subscription specifically includes:
and the AP determines time parameters of the lower Trigger access processes according to the access conflict number or the traffic in the Trigger access process of the current round, wherein the time parameters comprise the starting time of the lower Trigger access process or the time interval between the Trigger access process of the current round and the Trigger access process of the next round.
With reference to the possible implementation manner of the , in a second possible implementation manner of the , if the number of access collisions or the traffic volume is greater than the limit, the start time of the lower Trigger access procedure is the end time of the Trigger access procedure in the current round.
With reference to the possible implementation manner of the , in a third possible implementation manner of the , if the number of access collisions or the traffic volume is less than or equal to the limit, there is a time interval between a target start time of the lower Trigger access procedure and an end time of the Trigger access procedure in the current round, where the time interval is used for DCF access.
With reference to or , in a fourth possible implementation manner of , in combination with any from the to the third possible implementation manner, the Trigger access procedure in the current round is scheduled by a management frame.
With reference to or , in a fifth possible implementation manner of to of the fourth possible implementation manner, in a fifth possible implementation manner of , the broadcast message sent by the AP is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame for responding to an RTS or a BA frame, a Beacon frame, or a Probe response frame for confirming successful reception of received data, and a signaling portion in the data frame.
With reference to or of any of the to the fifth possible implementation manners, in a sixth possible implementation manner of , the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In a second aspect of the present invention, there are channel access methods, applied to a WLAN, including:
a station STA receives broadcast messages, wherein the broadcast messages contain time parameters of a Trigger access process;
the STA determines a guard interval of a Trigger access process according to the broadcast information;
and the STA performs DCF access outside a guard interval of the Trigger access process.
With reference to the second aspect, in an th possible implementation manner of the second aspect, the DCF accessing specifically includes:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, the STA records the value of a backoff counter, the DCF access is suspended, and the STA participates in the Trigger access process.
With reference to the th possible implementation manner of the second aspect, in a second possible implementation manner of the second aspect, the aborting the DCF access, where the participating, by the STA, in the Trigger access procedure specifically includes:
if the STA is successfully accessed in a scheduling mode in the scheduling time slot of the Trigger, the STA cancels DCF access and resets the recorded value of the backoff counter;
and if the STA fails to access in a scheduling mode in the scheduling time slot of the Trigger, the STA recovers the value of a backoff counter before the guard interval of the Trigger access process after the guard interval of the Trigger access process, and continues DCF access.
With reference to the possible implementation manners of the second aspect, in a third possible implementation manner of the second aspect, the method further includes, if the STA does not receive the Trigger frame of the Trigger access procedure within the guard interval of the Trigger access procedure, after the guard interval of the Trigger access procedure, the STA recovers the value of the backoff counter before the guard interval of the Trigger access procedure, and continues the DCF access.
With reference to the second aspect or any possible implementation manners of the -th possible implementation manner to the third possible implementation manner of the second aspect, in a fourth possible implementation manner of the second aspect, the time parameter includes a start time of the Trigger access procedure or a time interval of Trigger access procedures in different rounds.
With reference to the second aspect or any possible implementation manners of the -fourth possible implementation manners of the second aspect, in a fifth possible implementation manner of the second aspect, the broadcast message is carried by a control frame, a management frame, or a data frame sent by an AP, and includes a CTS frame used for responding to an RTS or a BA frame used for confirming successful reception of received data, a Beacon frame, or a Probe response frame, and a signaling portion in the data frame.
With reference to the second aspect or any possible implementation manners of the -the fifth possible implementation manners of the second aspect, in a sixth possible implementation manner of the second aspect, the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In a third aspect of the present invention, kinds of APs are provided, including a scheduling module and a sending module, wherein:
the scheduling module is configured to schedule at least two Trigger access procedures, and send broadcast messages through the sending module in the process of scheduling Trigger access, where the broadcast message includes a time parameter of a Trigger access procedure under a reservation.
With reference to the third aspect, in an possible implementation manner of the third aspect, the AP further includes a determining module configured to subscribe to a time parameter of a next rounds of Trigger access procedures, where the determining module is specifically configured to determine the time parameter of the next rounds of Trigger access procedures according to an access conflict number or a traffic volume in the current round of Trigger access procedures, and the time parameter includes a start time of the next rounds of Trigger access procedures or a time interval between the current round of Trigger access procedures and the next rounds of Trigger access procedures.
With reference to the possible implementation manners of the third aspect, in a second possible implementation manner of the third aspect, if the number of access collisions or the traffic volume is greater than the limit, the start time of the lower Trigger access procedure is the end time of the Trigger access procedure in the current round.
With reference to the possible implementation manners of the third aspect, in a third possible implementation manner of the third aspect, if the number of access collisions or the traffic volume is less than or equal to the limit, a time interval exists between the target start time of the lower Trigger access procedure and the end time of the Trigger access procedure in the current round, and the time interval is used for DCF access.
With reference to the third aspect or any possible implementation manners of the possible implementation manners to the third possible implementation manner of the third aspect, in a fourth possible implementation manner of the third aspect, the Trigger access procedure in the current round is scheduled by a management frame.
With reference to the third aspect or any possible implementation manners of the possible implementation manners of the third aspect to the fourth possible implementation manner of the third aspect, in a fifth possible implementation manner of the third aspect, the broadcast message sent by the AP is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame used for responding to an RTS or a BA frame used for confirming successful reception of received data, a Beacon frame, or a Probe response frame, and a signaling portion in the data frame.
With reference to the third aspect or any possible implementation manners of the possible implementation manners to the fifth possible implementation manner of the third aspect, in a sixth possible implementation manner of the third aspect, the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In a fourth aspect of the present invention, there are provided STAs, including:
a receiving module, configured to receive broadcast messages, where the broadcast message includes a time parameter of a Trigger access procedure;
a determining module, configured to determine a guard interval in the Trigger access process according to the broadcast information;
and the operation module is used for performing DCF access outside a guard interval of the Trigger access process.
With reference to the fourth aspect, in an possible implementation manner of the fourth aspect, the operation module is used for DCF access, and specifically includes:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and allowing the STA to participate in the Trigger access process.
With reference to the th possible implementation manner of the fourth aspect, in a second possible implementation manner of the fourth aspect, the operation module is specifically configured to suspend DCF access, and the STA participates in the Trigger access process, specifically:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
With reference to the possible implementation manners of the fourth aspect, in a third possible implementation manner of the fourth aspect, the operation module is further configured to, if the receiving module does not receive the Trigger frame of the Trigger access procedure within the guard interval of the Trigger access procedure, restore, after the guard interval of the Trigger access procedure, the value of a backoff counter before the guard interval of the Trigger access procedure, and continue the DCF access.
With reference to the fourth aspect or any possible implementation manners of the -third possible implementation manners of the fourth aspect, in a fourth possible implementation manner of the fourth aspect, the time parameter includes a start time of the Trigger access procedure or a time interval of Trigger access procedures in different rounds.
With reference to the fourth aspect or any possible implementation manners of the possible implementation manners to the fourth possible implementation manners of the fourth aspect, in a fifth possible implementation manner of the fourth aspect, the broadcast message is carried by a control frame, a management frame, or a data frame sent by an AP, and includes a CTS frame used for responding to an RTS or a BA frame used for confirming successful reception of received data, a Beacon frame, or a Probe response frame, and a signaling portion in the data frame.
With reference to the fourth aspect or any possible implementation manners of the -fifth possible implementation manners of the fourth aspect, in a sixth possible implementation manner of the fourth aspect, the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In a fifth aspect of the present invention, there is provided APs, comprising a memory, a processor, and a transceiver connected to a common bus;
the memory to store instructions;
the processor is configured to execute the instruction, schedule at least two Trigger access procedures, and send broadcast messages through the transceiver in the process of scheduling Trigger access in the current round, where the broadcast message includes a time parameter of a Trigger access procedure in the appointment.
With reference to the fifth aspect, in an th possible implementation manner of the fifth aspect, the processor is further configured to reserve a time parameter of a next -round Trigger access process, and specifically, determine the time parameter of the next -round Trigger access process according to an access conflict number or traffic in the current round Trigger access process, where the time parameter includes a start time of the next -round Trigger access process or a time interval between the current round Trigger access process and the next -round Trigger access process.
With reference to the possible implementation manners of the fifth aspect, in a second possible implementation manner of the fifth aspect, if the number of access conflicts or the traffic volume is greater than the limit, the start time of the lower round of Trigger access procedure is the end time of the Trigger access procedure in the current round.
With reference to the possible implementation manners of the fifth aspect, in a third possible implementation manner of the fifth aspect, if the number of access collisions or the traffic volume is less than or equal to the limit, a time interval exists between the target start time of the lower round Trigger access procedure and the end time of the round Trigger access procedure, and the time interval is used for DCF access.
With reference to the fifth aspect or any possible implementation manners of the -third possible implementation manners of the fifth aspect, in a fourth possible implementation manner of the fifth aspect, the Trigger access procedure in the current round is scheduled by a management frame.
With reference to the fifth aspect or any possible implementation manners of the possible implementation manners of the fifth aspect to the fourth possible implementation manner of the fifth aspect, in a fifth possible implementation manner of the fifth aspect, the processor is configured to carry a control frame, a management frame, or a data frame sent by the AP through a broadcast message sent by the transceiver, where the control frame, the management frame, or the data frame includes a CTS frame used for responding to an RTS or a BA frame, a Beacon frame, or a Probe response frame used for confirming successful reception of received data, and a signaling portion in the data frame.
With reference to the fifth aspect or any possible implementation manners of the - possible implementation manners of the fifth aspect, in a sixth possible implementation manner of the fifth aspect, the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In a sixth aspect of the present invention, there are provided STAs comprising a memory, a processor, and a transceiver connected to a common bus;
the memory to store instructions;
the transceiver is configured to receive broadcast messages, where the broadcast message includes a time parameter of a Trigger access procedure;
the processor is configured to execute the instruction, determine a guard interval of the Trigger access process according to the broadcast information, and perform DCF access outside the guard interval of the Trigger access process.
With reference to the sixth aspect, in an possible implementation manner of the sixth aspect, the processor is configured to perform DCF access, specifically:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and enabling the STA to participate in the Trigger access process.
With reference to the possible implementation manners of the sixth aspect, in a second possible implementation manner of the sixth aspect, the processor is specifically configured to suspend DCF access, and the STA participates in the Trigger access procedure, specifically:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
With reference to the possible implementation manners of the sixth aspect, in a third possible implementation manner of the sixth aspect, the processor is further configured to, if the transceiver does not receive the Trigger frame of the Trigger access procedure within the guard interval of the Trigger access procedure, restore, after the guard interval of the Trigger access procedure, the value of a backoff counter before the guard interval of the Trigger access procedure, and continue the DCF access.
With reference to the sixth aspect or any possible implementation manners of the -third possible implementation manners of the sixth aspect, in a fourth possible implementation manner of the sixth aspect, the time parameter includes a start time of the Trigger access procedure or a time interval of Trigger access procedures in different rounds.
With reference to the sixth aspect or any possible implementation manners of the possible implementation manners to the fourth possible implementation manner of the sixth aspect, in a fifth possible implementation manner of the sixth aspect, the broadcast message is carried by a control frame, a management frame, or a data frame sent by an AP, and includes a CTS frame used for responding to an RTS or a BA frame used for confirming successful reception of received data, a Beacon frame, or a Probe response frame, and a signaling portion in the data frame.
With reference to the sixth aspect or any possible implementation manners of the -fifth possible implementation manners of the sixth aspect, in a sixth possible implementation manner of the sixth aspect, the Trigger access procedure is a procedure for triggering centralized control or scheduling, and an OFDMA manner, a CSMA manner with collision avoidance, or a hybrid access manner of the two is adopted in a centralized control stage.
In the embodiment of the present invention, the AP may schedule at least two Trigger access procedures, and the AP may send broadcast messages in the process of scheduling Trigger access of the current round, where the broadcast message includes a time parameter for reserving Trigger access procedures, so that after receiving the broadcast message, the STA may wait for the Trigger of the AP according to the time parameter included in the broadcast message, that is, the STA knows when the next Trigger access will start, and may wait for access at a correct time.
Drawings
FIG. 1A is a system diagram of typical WLAN deployment scenarios;
fig. 1B is a flowchart of an OFDMA uplink access process triggered by an AP;
fig. 2 is a flow chart of a DCF access process;
fig. 3A is a flowchart of channel access methods according to an embodiment of the present invention;
FIG. 3B is a diagram illustrating a frame structure of a general frame of the MAC layer according to an embodiment of the present invention;
fig. 4 is a flowchart of another channel access methods according to an embodiment of the present invention;
fig. 5 is a sub-flowchart of a part of a process in which an STA coordinates Trigger access and DCF access in the embodiment of the present invention;
fig. 6 is a sub-flowchart of a part of a process in which an STA coordinates Trigger access and DCF access in the embodiment of the present invention;
fig. 7 is a sub-flowchart of a part of a process in which an STA coordinates Trigger access and DCF access in the embodiment of the present invention;
FIG. 8 is a block diagram of an AP according to an embodiment of the present invention;
fig. 9 is a block diagram of an STA according to an embodiment of the present invention;
FIG. 10 is a diagram illustrating an AP according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an STA in the embodiment of the present invention.
Detailed Description
First, an application scenario of the embodiment of the present invention is described.
The embodiment of the invention can be applied to a WLAN (English: Wireless Local Area Networks, Chinese: Wireless Local Area Networks), the WLAN can comprise a plurality of Basic Service sets (BSS for short), the network nodes in the Basic Service sets are stations (STA for short), the stations comprise Access Point type stations (AP for short) and Non-Access Point type stations (Non-AP Station for short), and each Basic Service Set can comprise APs and a plurality of Non-AP STAs related to the APs.
The AP is equivalent to bridges connected with a Network and a wireless Network, and mainly functions to connect each wireless Network client to and then Access the wireless Network to the Ethernet, the current AP mainly adopts the standard of IEEE (Institute of Electrical and electronics Engineers, Chinese) 802.11 series, specifically, the AP can be terminal equipment or Network equipment with a WiFi chip, optionally, the AP can be equipment supporting 802.11ax system, and the Access Point can be equipment supporting 802.11ac, 802.11n, 802.11g, 802.11b, 802.11a and the like (WLAN, local Area Network, Chinese) local Area Network, Chinese and the like).
For example, a mobile phone supporting a wireless fidelity (WiFi) communication function, a tablet computer supporting a WiFi communication function, a set top box supporting a WiFi communication function, an intelligent television supporting a WiFi communication function, an intelligent wearable device supporting a WiFi communication function, and a computer supporting a WiFi communication function, optionally, the Station may support an 802.11ax format, and optionally the Station supports multiple WLAN formats such as 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11 a.
Fig. 1A is a schematic diagram of a typical WLAN deployment scenario, which includes APs and 4 STAs, where the APs communicate with the STAs 1, 2, 3, and 4, respectively.
For the system shown in fig. 1A, generally only supports uplink access manners, that is, the system shown in fig. 1A only supports either the DCF access manner or the OFDMA uplink access manner triggered by the AP.
If the system only supports DCF access, for example, any STAs in fig. 1A want to access the channel, the STA can access the channel by itself in a DCF manner.
However, the access mode only supports the new version of STA, for example, in 4 STAs shown in fig. 1A, STA1 and STA4 are old versions of STA, STA2 and STA3 are new versions of STA, and for example, all the four STAs receive the Trigger message, STA2 and STA3 may access the channel, and STA1 and STA4 may not access the channel.
Next, with reference to fig. 1A as a hardware architecture, an OFDMA uplink access procedure and a DCF access procedure triggered by an AP under will be respectively described.
Please refer to fig. 1B, which is a detailed flow of the OFDMA uplink access process triggered by the AP.
103, after receiving RTX frames sent by a plurality of STAs in parallel in an OFDMA mode and waiting for SIFS, the AP sends CTX (Chinese: transmission permission) frames to schedule resources of the STAs which successfully send the RTX, and then the method goes to step 104, wherein the CTX is a message in lower generation WIFI and has a function similar to that of CTS in the current WiFi802.11 protocol.
In this step, the AP may transmit the CTX frame only to the STA that determines that uplink data can be transmitted. For example, if the AP receives RTX frames transmitted by 5 STAs and the current channel is only 4, the AP may select only 4 STAs from the RTX frames and transmit CTX frames to the 4 STAs, and the STAs which do not receive the CTX frames cannot naturally transmit uplink data. The specific AP may select the 4 STAs according to the priority of uplink data sent by different STAs, or may select the 4 STAs in any other possible manner.
In addition, the resource scheduling described herein may refer to allocating a channel to the STA, so that the STA can transmit uplink data on the channel allocated to the STA.
Step 104: and the STA receiving the CTX transmits uplink data on the corresponding sub-channel according to the scheduling result. Proceed to step 105.
Step 105: after the AP successfully receives the uplink data, it sends a Block Acknowledgement (BA) frame to the STA transmitting the uplink data to confirm successful transmission of the uplink data.
Please refer to fig. 2, which shows a detailed flow of the DCF access procedure.
Step 201, when there is uplink data to be sent by the STA, first, the STA listens to the idle state of the channel, and if the idle time of the channel lasts for DIFS (Distributed Inter-frame Spacing, chinese: Distributed Inter-frame gap), the STA starts a backoff counter and executes a backoff process.
And if the channel is busy again in the backoff process, suspending the backoff process, and continuing to start the backoff process until the channel is idle again and the DIFS is maintained. When the backoff counter reaches 0, the process proceeds to step 202, otherwise, the process stays at step 201.
Step 202: the STA sends an RTS (Request To Send, chinese) frame To the AP requesting To Send uplink data. Proceed to step 203.
Step 203: after receiving the RTS, the AP waits for SIFS and replies CTS (Clear To Send, chinese) To the STA To instruct the STA To perform uplink data transmission. Proceed to step 204.
Step 204: the STA receives the CTS and waits for the SIFS to transmit uplink data to the AP. Proceed to step 205.
Step 205: after the uplink data transmission is finished and SIFS is waited, the AP sends ACK (English: Acknowledgement) frame to the STA to confirm the successful transmission.
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete description of the technical solutions of the embodiments of the present invention will be given below with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are partial embodiments of of the present invention, rather than all embodiments.
In addition, the terms "system" and "network" are often used interchangeably herein, the term "and/or" herein merely describes associations describing the associated object, meaning that there may be three relationships, e.g., A and/or B, may mean that there are three cases of A alone, A and B together, and B alone.
Embodiments of the present invention are described in further detail with reference to the drawings attached hereto.
Referring to fig. 3A, an embodiment of the present invention provides channel access methods, which may be applied to a WLAN (Wireless Local Area Networks, chinese), and a main flow of the method is described as follows.
Optionally, in the embodiment of the present invention, the time parameter of the rounds of Trigger access under the appointment specifically includes:
and the AP determines time parameters of the lower Trigger access processes according to the access conflict number or the traffic in the Trigger access process of the current round, wherein the time parameters comprise the starting time of the lower Trigger access process or the time interval between the Trigger access process of the current round and the Trigger access process of the next round.
The traffic in the Trigger access process of the current round refers to how many STAs participate in the Trigger access process of the current round.
For example, if the AP wants to know the number of access collisions in the Trigger access procedure of the current round, it may know through power detection, after the AP triggers the Trigger access of the current round, the AP may detect the power of each channel, and in a normal case, only STAs of channels transmit data, the detected power on such a channel should be relatively stable, and if there is a collision of a channel, the detected power on such a channel with a collision may be relatively high, for example, may be several times of the normal power, for example, the detected power on channels is 3 times of the normal channel power, and it may know that 3 STAs collide on the channel, that is, it may know that the number of access collisions on the channel is 3.
For example, the AP knows the number of STAs with collisions (i.e., access collision number) in the Trigger access process of the current round, which is equivalent to knowing how many STAs in the Trigger access process of the current round have not completed access, and for example, the AP knows the traffic in the Trigger access process of the current round, which is equivalent to knowing how many STAs need to access the channel.
For example, if the number of access collisions is large, or if the traffic volume is large, the AP may set the interval between the Trigger access procedure of the current round and the Trigger access procedure of the next rounds to be small, that is, the Trigger access procedure of the next rounds is started as soon as possible, so that more STAs access the channel as soon as possible, and the channel access efficiency is improved.
Optionally, in the embodiment of the present invention, if the number of access conflicts or the traffic volume is greater than the limit of , the start time of the Trigger access process in the lower round is the end time of the Trigger access process in the current round.
Optionally, in this embodiment of the present invention, if the number of access conflicts or the traffic volume is less than or equal to the limit of , a time interval exists between the target start time of the lower Trigger access procedure and the end time of the Trigger access procedure in the current round, where the time interval is used for DCF access.
That is, if the number of access conflicts is too large or the traffic is too large, the AP may control that there is no time interval between the Trigger access process of rounds and the Trigger access process of the current round, and immediately perform the Trigger access process of the next rounds after the Trigger access process of the current round is completed, so as to ensure that more STAs access the channel as soon as possible, and improve the channel access efficiency.
If the number of access conflicts is small or the traffic volume is small, the AP may set fixed time interval between the Trigger access procedure of the current round and the Trigger access procedure of the next rounds, so that the STA may also execute the DCF access procedure in the interval of executing the Trigger access procedure, so that the old version STA may also access the channel, and while improving the channel access efficiency, the STA of various types may all transmit uplink data as much as possible.
In the embodiment of the present invention, the limit may be set according to the number of access conflicts or the traffic volume.
For example, in the random access process, the bandwidth of 20MHz is divided into 9 contention sub-channels, if more than 4 channels have two or more STAs for random access, the AP considers that the current access collision number is large, or if more STAs currently need to access the channels and the traffic is large, the start time of the lower round Trigger access process is, for example, the end time of the round Trigger access process.
For example, when the AP side buffers a large amount of data to be transmitted, and when the buffered data cannot be completely transmitted in downlink frames or the received uplink transmission request cannot be completely transmitted in uplink frames, the AP triggers the start time of the round Trigger access procedure, for example, the start time is the end time of the round Trigger access procedure.
In addition, in the embodiment of the present invention, the time parameter may include start time of the next Trigger access procedures, or may include a time interval between the Trigger access procedure of the current round and the Trigger access procedure of the next round, and if the time parameter includes a time interval between the Trigger access procedure of the current round and the Trigger access procedure of the next round, the AP may be considered to only subscribe to the Trigger access procedure of the next round, or may be considered to subscribe to the multiple Trigger access procedures.
That is, if it is determined that the AP only subscribes to the next Trigger access procedures, after the Trigger access procedure of the current round is completed and a time interval included in the time parameter elapses, the next Trigger access procedure is performed.
If the AP is considered to have the multiple Trigger access procedures reserved, then after the Trigger access procedure of the current round is completed, after a time interval included in the time parameter, the Trigger access procedure of the next rounds is performed, and after the Trigger access procedure of the next rounds is completed, after the time interval included in the time parameter, the Trigger access procedure of the next rounds is performed, and the process is repeated in this cycle.
Optionally, in the embodiment of the present invention, the Trigger access process in the current round is scheduled by a management frame.
That is, in the embodiment of the present invention, the lower rounds of Trigger access procedures may be scheduled through the broadcast message sent by the present round of Trigger access procedures, and then the present round of Trigger access procedures may be understood as the Trigger access procedures performed for the first time, and since there is no upper rounds of Trigger access procedures for scheduling, the present round of Trigger access procedures may be scheduled by a management frame, for example, the management frame may be a Beacon (chinese: Beacon) frame.
Fig. 3B is a schematic diagram of a frame structure of a general frame of a MAC layer according to an embodiment of the present invention.
In fig. 3B, Frame Control (chinese: Frame Control), (chinese: Frame length), Address (chinese: Address) 1, 2, 3, Sequence Control, and HT (english: High Throughput) Control fields constitute the MAC Header, that is, the MAC Header includes Frame Control information, Frame length information, Address information, Sequence Control information, QoS (Quality of service, chinese: Quality of service) information, and HT Control information.
The Frame control field contains pieces of control information of the Frame, such as the type and subtype of the Frame, the Duration field indicates the time that the channel occupied this time still occupies the channel after the Frame is finished, the sequence control field gives the sequence number and the fragment number of an MSDU (English: MAC Service Data Unit, Chinese: media access control Data Unit) or MMPDU (English: MAC management protocol Data Unit), the HT control field gives the control information related to HT or VHT (English: very high throughput), and the field related to the address information has four fields (i.e. Address-4) for explaining which STA or AP sends out the Data packet and which STA or AP sends out the Data packet.
Address 1 is used to represent the Address of the receiver, Address 2 is used to represent the Address of the sender, and Address3 is used to represent either the source or destination Address.
Frame Body (chinese: Frame Body) for carrying specific information of the Frame.
FCS (Frame Check Sequence, English) is used for checking.
When an frame is a management frame, its frame format is substantially as shown in fig. 3B, except that the management frame does not have the Address4 field shown in fig. 3B.
Optionally, in the embodiment of the present invention, the broadcast message sent by the AP is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a conventional CTS frame for responding to the RTS or a Block Acknowledgement (BA) frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response (chinese: Probe response) frame, and a signaling part in the data frame.
In the embodiment of the present invention, the CTS frame may refer to a conventional CTS frame, or may refer to a new modified CTS frame applicable to IEEE 802.11.
The RTS frame, the CTS frame and the BA frame all belong to a control frame, the Beacon frame and the Probe response frame belong to a management frame, and the signaling part in the data frame belongs to a data frame.
In the embodiment of the present invention, if the broadcast message is carried in a management Frame, the broadcast message may be carried in a Frame Body part of the management Frame.
If the broadcast message is carried in the signaling part of the data frame, fields may be added directly to the signaling part of the data frame to carry the broadcast message.
If the broadcast message is carried in a control frame, fields may be directly added to the control frame to carry the broadcast message.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA (Carrier Sense multiple access with collision avoidance) mode or a hybrid access mode of the two is adopted in the centralized control stage. The embodiments of the present invention are described by way of example in an OFDMA mode.
In the embodiment of the present invention, after the AP sends broadcast messages, the STA may receive broadcast messages, so that the STA may execute Trigger access procedures according to the time parameters included in the broadcast messages, and if there is a time interval between two Trigger access procedures, the STA may execute DCF access procedures in the gap between the two Trigger access procedures.
Therefore, scheduling is carried out through the AP, so that the two access modes of Trigger access and DCF access can be well coordinated, conflicts between the DCF access process and the Trigger access process are reduced as much as possible, systems can simultaneously support the two uplink access technologies, therefore, the traditional STA can be ensured to be accessed into the AP as much as possible through the DCF access, the uplink access efficiency can be improved as much as possible through the Trigger access, and the uplink access process of the STA in the system becomes more efficient and reliable.
Further , in the embodiment of the present invention, after the AP sends the broadcast message, if the start time of the next Trigger access procedure reserved by the AP arrives, the AP sends a Trigger frame to the STA to start the Trigger access procedure.
Referring to fig. 4, based on the same inventive concept of , another channel access method is provided in the embodiments of the present invention, and the method can be applied to wlan, specifically, step 303 in fig. 3 is that the AP sends the broadcast message, and STAs can receive after sending, and then fig. 4 is a method performed by STAs that receive the broadcast message.
Step 401, STA receives broadcast message, wherein the broadcast message contains time parameter of Trigger access process;
step 402, the STA determines a guard interval of the Trigger access process according to the broadcast information;
step 403: and the STA performs DCF access outside a guard interval of the Trigger access process.
In this embodiment of the present invention, the guard interval may be time durations, for example, a time duration from a time before a start time of the Trigger access procedure to a time after the start time of the Trigger access procedure may be set as the guard interval, where the guard interval is set to avoid a collision between the DCF access procedure and the Trigger access procedure as much as possible.
For example, the time parameter included in the broadcast message received by the STA includes the start time of the next Trigger access procedure, and the STA may introduce guard intervals before and after the start time, for example, the start time is 12: 00: 01: 112, the start time of the guard interval set by the STA for the start time may be 12: 00: 01: 106, and the end time may be 12: 00: 01: 118, that is, intervals may be introduced before and after the start time of Trigger access procedures for protection.
For example, the current time is 12: 00: 01: 108, the starting time of the next rounds of Trigger access procedure is 12: 00: 01: 112, although the starting time of the next rounds of Trigger access procedure has not yet been reached, the starting time of the guard interval set for the starting time of the next Trigger access procedure is 12: 00: 01: 106, that is, the guard interval has been entered, then the STA is also unable to perform DCF access.
Optionally, in this embodiment of the present invention, the DCF access specifically includes:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, the STA records the value of a backoff counter, the DCF access is suspended, and the STA participates in the Trigger access process.
In the embodiment of the invention, when Trigger access is not executed, an STA can execute a back-off process corresponding to a DCF (dynamic host configuration protocol), namely, the back-off counter is started, when the starting time of a guard interval of the Trigger access process of the next rounds is reached, if the back-off process is not finished, the value of the back-off counter is recorded, the back-off process is suspended, a Trigger message sent by an AP (access point) is waited to be received, namely, the Trigger access process is waited to be executed, and when the starting time of the guard interval of the Trigger access process of the next rounds is reached, if the back-off process is finished, the DCF access of the STA is successful, and the STA does not execute Trigger access any more.
For example, when the current time is 12: 00: 01: 100, the starting time of the next rounds of Trigger access procedure is 12: 00: 01: 112, and the starting time of the guard interval set for the starting time of the round of Trigger access procedure is 12: 00: 01: 106, the STA may execute the backoff procedure and start the backoff counter, when the 12: 00: 01: 106 is reached, if the backoff procedure is not ended, the value of the backoff counter needs to be recorded, the backoff procedure is suspended, the STA waits to receive the Trigger message (i.e., Trigger frame) sent by the AP, and when the 12: 00: 01: 106 is reached, if the backoff procedure is ended, the STA successfully executes the DCF access.
Optionally, in this embodiment of the present invention, the stopping of the DCF access and the participation of the STA in the Trigger access process specifically include:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, the STA cancels DCF access and resets the recorded value of the backoff counter;
if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, the STA recovers the value of a backoff counter before the protection interval of the Trigger access process after the protection interval of the Trigger access process, and continues DCF access.
That is, if the STA fails to complete backoff before the guard interval of the Trigger access procedure, the value of the backoff counter is recorded, and then the STA successfully executes Trigger access, the STA may cancel DCF access and may clear the value of the backoff counter.
If the STA fails to complete backoff before the guard interval of the Trigger access process, the value of the backoff counter is recorded, and then the STA fails to perform Trigger access, the STA may continue to count from the saved value of the backoff counter after the guard interval of the Trigger access process, that is, continue to perform DCF access.
Optionally, in the embodiment of the present invention, the method further includes:
if the STA does not receive the Trigger frame of the Trigger access process within the guard interval of the Trigger access process, the STA recovers the value of the backoff counter before the guard interval of the Trigger access process after the guard interval of the Trigger access process, and continues the DCF access.
That is, if the STA fails to complete backoff before the guard interval of the Trigger access process, the value of the backoff counter is recorded, and the STA waits for Trigger access. However, the STA may not receive the Trigger frame sent by the AP and cannot perform Trigger access, and then after the guard interval of the Trigger access process is ended, for example, at the end time of the guard interval of the Trigger access process, the STA may start to continue counting from the previously stored value of the backoff counter, that is, continue to perform DCF access.
Therefore, in the embodiment of the invention, the STA has the field protection capability, and even if the Trigger access is unsuccessful, the STA can continue to execute the DCF access from the state of suspending the DCF access, so that the time required by the STA to execute the DCF access is reduced, and the DCF access efficiency is improved.
Optionally, in this embodiment of the present invention, the time parameter includes a start time of the Trigger access process or a time interval of Trigger access processes of different rounds.
Optionally, in this embodiment of the present invention, the broadcast message is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame used for responding to a request to send RTS or a BA frame used for confirming successful reception of received data, a Beacon frame, or a Probe response frame, and a signaling part in the data frame.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA mode with collision avoidance, or a hybrid access mode of the two is adopted in the centralized control stage.
The flow in fig. 4 is a process corresponding to the flow in fig. 3, and details are not described in the flow in fig. 4, and are already described in the flow in fig. 3, so that details are not repeated.
Fig. 5 is a sub-flowchart of a part of the process of coordinating Trigger access and DCF access by a STA. And a sub-flow chart of a part of processes for performing DCF access in the Trigger access gap.
Step 503: and if the back-off is finished before the protection duration reaches the moment, the STA directly transmits the uplink data in a transmission mode corresponding to the DCF. The flow ends.
Please refer to fig. 6, which is a sub-flowchart of a part of a procedure for coordinating Trigger access and DCF access by an STA, if the judgment result of step 502 is that the backoff is not finished before the starting time of the guard interval of the next rounds of Trigger access procedure, step 601 of fig. 6 is started.
Step 601, if the backoff is not finished before the starting time of the guard interval of the next Trigger access processes is reached, the STA records the value of a backoff counter, the DCF access is suspended, and the STA participates in the Trigger access process, that is, the STA starts to wait for the AP to send a Trigger frame.
Step 602: and if the STA receives the Trigger frame in the guard interval, the STA executes a Trigger access process.
Step 603: if the STA does not receive the Trigger frame in the guard interval, the STA recovers the value of the backoff counter before the guard interval in the Trigger access process after the guard interval, and continues the DCF access.
Fig. 7 is a sub-flowchart of a part of the process of coordinating Trigger access and DCF access by an STA. After step 602, the steps of the flow of fig. 7 are further included according to whether the STA successfully performs the Trigger access procedure.
Step 702: and if the STA is successfully accessed to the Trigger in the scheduling time slot of the Trigger in a scheduling mode, the STA cancels the DCF access.
Step 703: if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, the STA recovers the value of a backoff counter before the protection interval in the Trigger access process after the protection interval, and continues DCF access.
Referring to fig. 8, based on the same inventive concept as , an embodiment of the present invention provides APs, which may include a scheduling module 801 and a transmitting module 802.
The scheduling module 801 is configured to schedule at least two Trigger access procedures, and send broadcast messages through the sending module 802 in the process of scheduling Trigger access, where the broadcast message includes a time parameter of a Trigger access procedure under a subscription.
Optionally, in this embodiment of the present invention, the AP further includes a determining module configured to reserve a time parameter for the Trigger access process of rounds, where the determining module is specifically configured to determine the time parameter for the Trigger access process of the next rounds according to the number of access conflicts or traffic in the Trigger access process of the current round, and the time parameter includes a start time of the Trigger access process of the next rounds or a time interval between the Trigger access process of the current round and the Trigger access process of the next rounds.
Optionally, in the embodiment of the present invention, if the number of access conflicts or the traffic volume is greater than the limit of , the start time of the Trigger access process in the lower round is the end time of the Trigger access process in the current round.
Optionally, in this embodiment of the present invention, if the number of access conflicts or the traffic volume is less than or equal to the limit of , a time interval exists between the target start time of the lower round Trigger access process and the end time of the round Trigger access process, where the time interval is used for DCF access of the distributed point coordination function.
Optionally, in the embodiment of the present invention, the Trigger access process in the current round is scheduled by a management frame.
Optionally, in this embodiment of the present invention, the broadcast message sent by the AP is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame for responding to an RTS or a BA frame, a Beacon frame, or a Probe response frame for confirming successful reception of received data, and a signaling part in the data frame.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA mode with collision avoidance, or a hybrid access mode of the two is adopted in the centralized control stage.
Referring to fig. 9, based on the same inventive concept as , an embodiment of the present invention provides STAs, which may include a receiving module 901, a determining module 902, and an operating module 903.
A receiving module 901, configured to receive broadcast message, where the broadcast message includes a time parameter of a Trigger access procedure;
a determining module 902, configured to determine a guard interval in the Trigger access process according to the broadcast information;
an operation module 903, configured to perform DCF access outside a guard interval of the Trigger access procedure.
Optionally, in this embodiment of the present invention, the operation module 903 is used for DCF access, and specifically includes:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and allowing the STA to participate in the Trigger access process.
Optionally, in this embodiment of the present invention, the operation module 903 is specifically configured to terminate the DCF access, and the STA participates in the Trigger access process, specifically:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
Optionally, in this embodiment of the present invention, the operation module 903 is further configured to: if the receiving module 901 does not receive the Trigger frame of the Trigger access process within the guard interval of the Trigger access process, the value of the backoff counter before the guard interval of the Trigger access process is recovered after the guard interval of the Trigger access process, and the DCF access is continued.
Optionally, in this embodiment of the present invention, the time parameter includes a start time of the Trigger access process or a time interval of Trigger access processes of different rounds.
Optionally, in this embodiment of the present invention, the broadcast message is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame for responding to an RTS or a BA frame, a Beacon frame, or a Probe response frame for confirming successful reception of received data, and a signaling portion in the data frame.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA mode with collision avoidance, or a hybrid access mode of the two is adopted in the centralized control stage.
Referring to fig. 10, based on the same inventive concept as , an embodiment of the present invention provides APs comprising a memory 1001 connected to a bus 1000, a processor 1002, and a transceiver 1003.
A memory 1001 for storing instructions required for the processor 1002 to perform tasks;
the processor is configured to execute the instruction stored in the memory 1001, schedule at least two Trigger access procedures, and send broadcast messages through the transceiver 1003 in the Trigger access procedure of the current round of scheduling, where the broadcast message includes a time parameter of a Trigger access procedure under the appointment.
Optionally, in this embodiment of the present invention, the processor 1002 is further configured to reserve a time parameter of a next rounds of Trigger access procedures, specifically, determine the time parameter of the next rounds of Trigger access procedures according to the number of access conflicts or traffic in the current round of Trigger access procedures, where the time parameter includes a start time of the next rounds of Trigger access procedures or a time interval between the current round of Trigger access procedures and the next rounds of Trigger access procedures.
Optionally, in the embodiment of the present invention, if the number of access conflicts or the traffic volume is greater than the limit of , the start time of the Trigger access process in the lower round is the end time of the Trigger access process in the current round.
Optionally, in this embodiment of the present invention, if the number of access conflicts or the traffic volume is less than or equal to the limit of , a time interval exists between the target start time of the lower Trigger access procedure and the end time of the Trigger access procedure in the current round, where the time interval is used for DCF access.
Optionally, in the embodiment of the present invention, the Trigger access process in the current round is scheduled by a management frame.
Optionally, in this embodiment of the present invention, the broadcast message sent by the processor 1002 through the transceiver 1003 is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame or a CTX frame for responding to the RTS, a BA frame for confirming successful reception of received data, a Beacon frame or a Probe response frame, and a signaling part in the data frame.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA mode with collision avoidance, or a hybrid access mode of the two is adopted in the centralized control stage.
Referring to fig. 11, based on the same inventive concept as , an embodiment of the present invention provides STAs, including a memory 1101 connected to a bus 1100, a processor 1102 and a transceiver 1103.
A memory 1101 for storing instructions required for the processor 1102 to perform tasks;
a transceiver 1103 configured to receive a cast message, where the cast message includes a time parameter of a Trigger access procedure;
the processor 1102 is configured to execute the instruction stored in the memory 1101, determine a guard interval of the Trigger access process according to the broadcast information, and perform DCF access outside the guard interval of the Trigger access process.
Optionally, in this embodiment of the present invention, the processor 1102 is used for DCF access, and specifically includes:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and enabling the STA to participate in the Trigger access process.
Optionally, in this embodiment of the present invention, the processor 1102 is specifically configured to terminate the DCF access, and the STA participates in the Trigger access process, specifically:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
Optionally, in this embodiment of the present invention, the processor 1102 is further configured to: if the transceiver 1103 does not receive the Trigger frame in the Trigger access process within the guard interval of the Trigger access process, the value of the backoff counter before the guard interval of the Trigger access process is recovered after the guard interval of the Trigger access process, and the DCF access is continued.
Optionally, in this embodiment of the present invention, the time parameter includes a start time of the Trigger access process or a time interval of Trigger access processes of different rounds.
Optionally, in this embodiment of the present invention, the broadcast message is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a CTS frame for responding to an RTS or a BA frame, a Beacon frame, or a Probe response frame for confirming successful reception of received data, and a signaling portion in the data frame.
Optionally, in the embodiment of the present invention, the Trigger access process is a process for triggering centralized control or scheduling, and an OFDMA mode, a CSMA mode with collision avoidance, or a hybrid access mode of the two is adopted in the centralized control stage.
In the embodiment of the present invention, the AP may schedule at least two Trigger access procedures, and the AP may send broadcast messages in the process of scheduling Trigger access of the current round, where the broadcast message includes a time parameter for reserving Trigger access procedures, so that after receiving the broadcast message, the STA may wait for the Trigger of the AP according to the time parameter included in the broadcast message, that is, the STA knows when the next Trigger access will start, and may wait for access at a correct time.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device is divided into different functional units to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the units or the division of the units may be only logical function divisions, and in practice, there may be another division, for example, a plurality of units or components may be combined or may be integrated into another system, or features may be omitted or not executed.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in places, or may also be distributed on multiple network units.
In addition, the functional units in the embodiments of the present application may be integrated into processing units, or each unit may exist alone physically, or two or more units are integrated into units.
Based on the understanding, the technical solution of the present application, which is essentially or partially contributed to by the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in storage media, which includes several instructions to make computer devices (which may be personal computers, servers, or network devices, etc.) or processors (processors) execute all or part of the steps of the methods described in the embodiments of the present application.
The above embodiments are only used to describe the technical solutions of the present application in detail, but the above embodiments are only used to help understanding the method and the core idea of the present invention, and should not be construed as limiting the present invention. Those skilled in the art should also appreciate that they can easily conceive of various changes and substitutions within the technical scope of the present disclosure.
Claims (42)
1, channel access method, applied to wireless local area network WLAN, comprising:
an Access Point (AP) schedules at least two Trigger access processes, the AP sends broadcast messages in the scheduling Trigger access process of the current round, the broadcast messages contain time parameters for reserving the lower Trigger access process of the round, and the time parameters comprise the starting time of the lower Trigger access process or the time interval between the Trigger access process of the current round and the Trigger access process of the lower rounds.
2. The method according to claim 1, wherein the time parameter of the rounds of Trigger access under the subscription specifically includes:
and the AP determines the time parameter of the lower Trigger access process according to the access conflict number or the traffic in the Trigger access process of the current round.
3. The method of claim 2, wherein if the number of access collisions or the traffic volume is greater than , the start time of the lower Trigger access procedure is the end time of the Trigger access procedure in the current round.
4. The method of claim 2, wherein if the number of access collisions or traffic volume is smaller than or equal to limit, there is a time interval between the target start time of the lower round Trigger access procedure and the end time of the current round Trigger access procedure, and the time interval is used for DCF access.
5. The method according to , wherein the Trigger access procedure of the current round is scheduled by a management frame.
6. The method according to any of claims 1-4, wherein the broadcast message sent by the AP is carried by a control frame, a management frame or a data frame sent by the AP, and comprises a clear-to-send CTS frame for responding to a Request To Send (RTS) or a Block Acknowledgement (BA) frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response frame, and a signaling part in the data frame.
7. The method according to , wherein the Trigger access procedure is a procedure for triggering centralized control or scheduling, and the centralized control stage employs Orthogonal Frequency Division Multiple Access (OFDMA) mode, Carrier Sense Multiple Access (CSMA) mode with collision avoidance, or a hybrid access mode of both.
8, channel access method, applied to wireless local area network WLAN, comprising:
a station STA receives broadcast messages, wherein the broadcast messages contain time parameters for triggering a Trigger access process;
the STA determines a guard interval of a Trigger access process according to the broadcast information;
and the STA performs DCF access outside a guard interval of the Trigger access process.
9. The method of claim 8, wherein the DCF accessing specifically comprises:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, the STA records the value of a backoff counter, the DCF access is suspended, and the STA participates in the Trigger access process.
10. The method of claim 9, wherein the DCF access suspension, and the STA participating in the Trigger access procedure specifically comprises:
if the STA is successfully accessed in a scheduling mode in the scheduling time slot of the Trigger, the STA cancels DCF access and resets the recorded value of the backoff counter;
and if the STA fails to access in a scheduling mode in the scheduling time slot of the Trigger, the STA recovers the value of a backoff counter before the guard interval of the Trigger access process after the guard interval of the Trigger access process, and continues DCF access.
11. The method of claim 9, wherein the method further comprises: if the STA does not receive the Trigger frame of the Trigger access process within the guard interval of the Trigger access process, the STA recovers the value of the backoff counter before the guard interval of the Trigger access process after the guard interval of the Trigger access process, and continues the DCF access.
12. The method of any of claims 8-11, wherein the time parameter comprises a start time of the Trigger access procedure or a time interval of a different round of Trigger access procedures.
13. The method as claimed in , wherein the broadcast message is carried by a control frame, a management frame or a data frame sent by the AP, and comprises a clear-to-send CTS frame for responding to a request to send RTS or a block acknowledgement BA frame for acknowledging successful receipt of received data, a Beacon Beacon frame or a Probe response frame, and a signaling part in the data frame.
14. The method according to of any of claims 8-11, wherein the Trigger access procedure is a procedure for triggering centralized control or scheduling, and wherein the centralized control phase employs Orthogonal Frequency Division Multiple Access (OFDMA) mode, Carrier Sense Multiple Access (CSMA) mode with collision avoidance, or a hybrid access mode of both.
15, kinds of access point AP, characterized by comprising a scheduling module and a sending module, wherein:
the scheduling module is configured to schedule at least two Trigger access procedures, and send broadcast messages through the sending module in a process of scheduling Trigger access for a current round, where the broadcast message includes a time parameter for reserving the Trigger access procedure for a next round, and the time parameter includes a start time of the Trigger access procedure for the next round or a time interval between the Trigger access procedure for the current round and the Trigger access procedure for a next rounds.
16. The AP of claim 15, wherein the AP further comprises a determining module configured to subscribe to a time parameter of a next rounds of Trigger access procedures, and the determining module is specifically configured to determine the time parameter of the next rounds of Trigger access procedures according to the number of access collisions or traffic volume in the current round of Trigger access procedures.
17. The AP of claim 16, wherein if the number of access collisions or traffic volume is greater than , the start time of the lower Trigger access procedure is the end time of the Trigger access procedure in the current round.
18. The AP of claim 16, wherein if the number of access collisions or traffic is less than or equal to limits, there is a time interval between the target start time of the lower round Trigger access procedure and the end time of the current round Trigger access procedure, and the time interval is used for DCF access.
19. The AP of any , wherein the Trigger access procedure of the current round is scheduled by a management frame.
20. The AP of any of claims 15-18, wherein the broadcast message sent by the AP is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a clear-to-send CTS frame for responding to a request to send RTS or a block acknowledgement BA frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response frame, and a signaling portion of the data frame.
21. The AP of any , wherein the Trigger access procedure is a procedure for triggering centralized control or scheduling, and wherein the centralized control stage employs an OFDMA (orthogonal frequency division multiple access) scheme, a CSMA (carrier sense multiple access with collision avoidance) scheme, or a hybrid access scheme of the two.
22, station STA, comprising:
a receiving module, configured to receive broadcast messages, where the broadcast message includes a time parameter for triggering a Trigger access procedure;
a determining module, configured to determine a guard interval in the Trigger access process according to the broadcast information;
and the operation module is used for performing DCF access outside a guard interval of the Trigger access process.
23. The STA of claim 22, wherein the operation module is configured for DCF access, and specifically is configured to:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and allowing the STA to participate in the Trigger access process.
24. The STA of claim 23, wherein the operation module is specifically configured to perform the DCF access suspension, and wherein the STA participates in the Trigger access procedure, and specifically:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
25. The STA of claim 23, wherein the operation module is further to: if the receiving module does not receive the Trigger frame of the Trigger access process within the guard interval of the Trigger access process, the value of a backoff counter before the guard interval of the Trigger access process is recovered after the guard interval of the Trigger access process, and the DCF access is continued.
26. The STA of any , wherein the time parameter comprises a start time of the Trigger access procedure or a time interval of a different round of Trigger access procedure.
27. An STA as claimed in any of claims 22-25, wherein the broadcast message is carried by a control frame, a management frame or a data frame sent by the AP, including a clear-to-send CTS frame for responding to a request to send RTS or a block acknowledgement BA frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response frame, a signaling part in a data frame.
28. An STA as claimed in any , wherein the Trigger access procedure is a procedure used to Trigger centralized control or scheduling, and employs OFDMA, CSMA with collision avoidance, or a hybrid of both, during the centralized control phase.
29, an access point AP, comprising a memory, a processor, and a transceiver connected to a common bus;
the memory to store instructions;
the processor is configured to execute the instruction, schedule at least two Trigger access procedures, and send broadcast messages through the transceiver in scheduling the Trigger access procedure of the current round, where the broadcast message includes a time parameter of a Trigger access procedure under a subscription, and the time parameter includes a start time of the Trigger access procedure of the next round or a time interval between the Trigger access procedure of the current round and the Trigger access procedure of the next rounds.
30. The AP of claim 29, wherein the processor is further configured to reserve a time parameter of a lower rounds of Trigger access procedures, and specifically, determine the time parameter of the lower rounds of Trigger access procedures according to the number of access conflicts or traffic volume in the current round of Trigger access procedures.
31. The AP of claim 30, wherein if the number of access collisions or traffic volume is greater than limit, the start time of the lower Trigger access procedure is the end time of the Trigger access procedure in the current round.
32. The AP of claim 30, wherein if the number of access collisions or traffic is less than or equal to limits, there is a time interval between the target start time of the lower round Trigger access procedure and the end time of the current round Trigger access procedure, and the time interval is used for DCF access.
33. The AP of any , wherein the Trigger access procedure of the current round is scheduled by a management frame.
34. The AP of any , wherein the broadcast message sent by the processor through the transceiver is carried by a control frame, a management frame, or a data frame sent by the AP, and includes a clear-to-send CTS frame for responding to a request to send RTS or a block acknowledgement BA frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response frame, a signaling portion of a data frame.
35. The AP of any , wherein the Trigger access procedure is a procedure for triggering centralized control or scheduling, and wherein the centralized control phase employs an OFDMA (orthogonal frequency division multiple access) scheme, a CSMA (carrier sense multiple access with collision avoidance) scheme, or a hybrid access scheme of the two.
36, station STA, comprising a memory, a processor and a transceiver connected to the same bus;
the memory to store instructions;
the transceiver is configured to receive broadcast messages, where the broadcast message includes a time parameter for triggering a Trigger access procedure;
the processor is used for executing the instruction, determining a guard interval of the Trigger access process according to the broadcast information, and performing DCF access outside the guard interval of the Trigger access process.
37. The STA of claim 36, wherein the processor is configured for DCF access, and specifically:
if the STA finishes the backoff before the guard interval of the Trigger access process, the DCF access is successful;
and if the STA fails to finish backoff before the guard interval of the Trigger access process, recording the value of a backoff counter, stopping DCF access, and enabling the STA to participate in the Trigger access process.
38. The STA of claim 37, wherein the processor is specifically configured to perform the DCF access abort, and wherein the STA is involved in the Trigger access procedure and is specifically configured to:
if the STA is successfully accessed to the Trigger in a scheduling mode within the scheduling time slot of the Trigger, canceling DCF access, and clearing the recorded value of the backoff counter;
and if the STA fails to access the Trigger in a scheduling mode in the scheduling time slot of the Trigger, after the guard interval of the Trigger access process, recovering the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
39. The STA of claim 37, wherein the processor is further to: and if the transceiver does not receive the Trigger frame of the Trigger access process in the guard interval of the Trigger access process, after the guard interval of the Trigger access process, restoring the value of a backoff counter before the guard interval of the Trigger access process, and continuing the DCF access.
40. The STA of any , wherein the time parameter comprises a start time of the Trigger access procedure or a time interval of a different round of Trigger access procedure.
41. The STA of any , wherein the broadcast message is carried by a control frame, a management frame, or a data frame sent by the AP, and comprises a clear-to-send (CTS) frame for responding to a Request To Send (RTS) or a Block Acknowledgement (BA) frame for acknowledging successful receipt of received data, a Beacon frame or a Probe response frame, and a signaling part in the data frame.
42. An STA as claimed in any , wherein the Trigger access procedure is a procedure used to Trigger centralized control or scheduling, and employs OFDMA, CSMA with collision avoidance, or a hybrid of both, during the centralized control phase.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/073222 WO2016131191A1 (en) | 2015-02-17 | 2015-02-17 | Channel access method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107211453A CN107211453A (en) | 2017-09-26 |
CN107211453B true CN107211453B (en) | 2020-01-31 |
Family
ID=56688674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580071168.4A Active CN107211453B (en) | 2015-02-17 | 2015-02-17 | channel access method and channel access device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107211453B (en) |
WO (1) | WO2016131191A1 (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101421981A (en) * | 2006-03-15 | 2009-04-29 | 松下电器产业株式会社 | A distributed wireless medium access control protocol for ad-hoc networks |
CN102413579A (en) * | 2011-11-14 | 2012-04-11 | 工业和信息化部电信传输研究所 | Method for avoiding network congestion in 802.11 competition type data transmission process |
WO2013157868A1 (en) * | 2012-04-18 | 2013-10-24 | 엘지전자 주식회사 | Method for transmitting and receiving signal of station operable in power saving mode in wireless communication system, and device therefor |
WO2014051349A2 (en) * | 2012-09-26 | 2014-04-03 | 엘지전자 주식회사 | Method and apparatus for gaining access in wireless lan system |
CN103875289A (en) * | 2011-08-31 | 2014-06-18 | 高通股份有限公司 | Power save with data fetch time, with end of data indication, and with more data acknowledgement |
CN104320859A (en) * | 2014-11-26 | 2015-01-28 | 中国地质大学(武汉) | Competition and allocation combined MAC access method based on AP control |
CN104335662A (en) * | 2012-02-10 | 2015-02-04 | Lg电子株式会社 | Method and apparatus for accessing channel in wlan system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MX336517B (en) * | 2012-02-05 | 2016-01-22 | Lg Electronics Inc | Method and apparatus for channel access via null data packet frame in wireless lan system. |
US9019874B2 (en) * | 2012-06-27 | 2015-04-28 | Nokia Corporation | Method, apparatus, and computer program product for resolving hidden node in synchronized DCF based channel access |
CN104066145B (en) * | 2013-03-22 | 2017-08-29 | 华为技术有限公司 | OFDMA competing methods and access point |
-
2015
- 2015-02-17 WO PCT/CN2015/073222 patent/WO2016131191A1/en active Application Filing
- 2015-02-17 CN CN201580071168.4A patent/CN107211453B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101421981A (en) * | 2006-03-15 | 2009-04-29 | 松下电器产业株式会社 | A distributed wireless medium access control protocol for ad-hoc networks |
CN103875289A (en) * | 2011-08-31 | 2014-06-18 | 高通股份有限公司 | Power save with data fetch time, with end of data indication, and with more data acknowledgement |
CN102413579A (en) * | 2011-11-14 | 2012-04-11 | 工业和信息化部电信传输研究所 | Method for avoiding network congestion in 802.11 competition type data transmission process |
CN104335662A (en) * | 2012-02-10 | 2015-02-04 | Lg电子株式会社 | Method and apparatus for accessing channel in wlan system |
WO2013157868A1 (en) * | 2012-04-18 | 2013-10-24 | 엘지전자 주식회사 | Method for transmitting and receiving signal of station operable in power saving mode in wireless communication system, and device therefor |
WO2014051349A2 (en) * | 2012-09-26 | 2014-04-03 | 엘지전자 주식회사 | Method and apparatus for gaining access in wireless lan system |
CN104320859A (en) * | 2014-11-26 | 2015-01-28 | 中国地质大学(武汉) | Competition and allocation combined MAC access method based on AP control |
Also Published As
Publication number | Publication date |
---|---|
WO2016131191A1 (en) | 2016-08-25 |
CN107211453A (en) | 2017-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11317439B2 (en) | Access method and apparatus | |
US11638252B2 (en) | Fast wireless local area network communication method and apparatus using multiple transfer rate partitioning and cooperative transmission | |
EP3139680A1 (en) | Channel access method and system, stations, and computer readable storage medium | |
JP4588465B2 (en) | Transmission control method | |
US10827527B2 (en) | Channel contention method and apparatus | |
WO2014134954A1 (en) | Service data transmission processing, transmission method and device | |
CN108432328A (en) | Wireless communication device and terminal installation | |
WO2022033283A1 (en) | Channel contention method and related apparatus | |
CN116981100A (en) | Communication method and device | |
US11246158B2 (en) | Terminal device, communication method, and communication system | |
KR20170062719A (en) | Method and apparatus for channel access for supporting uplink multiple user transmission in high efficiency wireless lan | |
JP5559753B2 (en) | Base station apparatus and radio communication method | |
US20210051586A1 (en) | Access point apparatus, station apparatus, and communication method | |
CN106788910B (en) | Method and device for changing transmission opportunity holder | |
WO2015096029A1 (en) | Method and device for data transmission | |
CN107211453B (en) | channel access method and channel access device | |
WO2016145662A1 (en) | Uplink multi-user access method and apparatus | |
CN106488580B (en) | Competition access method, competition access device, station and competition access system | |
WO2017036258A1 (en) | Contention access method, contention access device, base station and contention access system | |
WO2023083023A1 (en) | Data transmission method and apparatus, storage medium, and program product | |
CN114390597A (en) | Data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |