CN109005065A - A kind of appreciable cluster algorithm of concealed nodes for extensive D2D network - Google Patents

A kind of appreciable cluster algorithm of concealed nodes for extensive D2D network Download PDF

Info

Publication number
CN109005065A
CN109005065A CN201810931318.XA CN201810931318A CN109005065A CN 109005065 A CN109005065 A CN 109005065A CN 201810931318 A CN201810931318 A CN 201810931318A CN 109005065 A CN109005065 A CN 109005065A
Authority
CN
China
Prior art keywords
node
cluster
network
nodes
channel access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810931318.XA
Other languages
Chinese (zh)
Other versions
CN109005065B (en
Inventor
雷晓颖
高仁政
张乐君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yangzhou University
Original Assignee
Yangzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangzhou University filed Critical Yangzhou University
Priority to CN201810931318.XA priority Critical patent/CN109005065B/en
Publication of CN109005065A publication Critical patent/CN109005065A/en
Application granted granted Critical
Publication of CN109005065B publication Critical patent/CN109005065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/46Cluster building
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/02Hybrid access techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/04Scheduled or contention-free access
    • H04W74/06Scheduled or contention-free access using polling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • H04W74/085Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment collision avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update

Abstract

The invention discloses a kind of appreciable cluster algorithms of concealed nodes for extensive D2D network, belong to wireless network concealed nodes technical field, comprising the following steps: select a high-performance node as controller first;Monitor channel obtains the neighbor node of each node of D2D network later;Then controller merges the neighbor node of all nodes, obtains the global view of network topology;Then controller carries out sub-clustering to the node in the global view of network topology;Finally according to sub-clustering as a result, the node in the global view of network topology carries out channel access and data transmission.The present invention is by carrying out sub-clustering to the node in whole network topology, the influence of the drastic conditions and concealed nodes of node competitive channel to network performance can be effectively relieved, furthermore it is at war with channel and transmission to different cluster nodes by polling mode or DCF mode, the collision problem that conflicts caused by concealed nodes is alleviated significantly, the access delay for reducing network improves the performance of network.

Description

A kind of appreciable cluster algorithm of concealed nodes for extensive D2D network
Technical field
The invention belongs to wireless network concealed nodes technical field, especially a kind of hiding for extensive D2D network The appreciable cluster algorithm of node.
Background technique
In the D2D network based on 802.11 wireless local area network technologies, node is based on DCF access-control protocol access letter Road, DCF method are based on access/collision prevention (CSMA/CA) mechanism more than carrier sense.Node first perceives one section of distribution before accessing channel Formula interframe gap (distributed interframe space, DIFS), if listening to channel idle, node is immediately accessed Channel.Otherwise, node starts to move back by randomly selecting backoff counter (backoff counter, BC) from (0, w) Circumvent journey.Here, w represents the contention window size of present node, and the value of w occurs every time since minimum value (CWmin) It is doubled when conflict, until reaching maximum value (CWmax).
Under large-scale D2D network environment, because including a large number of users node in network topology, in communication process The middle conflict collision that high probability can occur, so that the performance of whole network is influenced, specifically, the D2D net of large scale and high density Network is based on DCF access-control protocol there are serious hidden node problem, and network node is needed through contention access channel, by The communication information can be mutually monitored between the broadcast characteristic of wireless network, node, in the process based on DCF contention access channel In, by mutually monitoring the communication information, can effectively avoid that identical BC is selected to cause to transmit collision problem, but mutually hide Node can not listen to the communication information between them, and during accessing channel and transmission data, node can not monitor that The BC of this selection is easy to happen conflict collision, increases the access delay of network, reduce the performance of network.
Summary of the invention
Technical problem solved by the invention is to provide a kind of concealed nodes for extensive D2D network appreciable Cluster algorithm.
The technical solution for realizing the aim of the invention is as follows: a kind of concealed nodes for extensive D2D network can perceive Cluster algorithm, comprising the following steps:
Step 1 selects a high-performance node as controller;
Step 2 passes through monitor channel, the neighbor node of each node of acquisition D2D network;
Step 3, controller merge the neighbor node of all nodes, obtain the global view of network topology;
Step 4, controller carry out sub-clustering to the node in the global view of the network topology;
Step 5, according to the sub-clustering of step 4 as a result, the node in the global view of network topology carries out channel access and number According to transmission.
Compared with prior art, the present invention its remarkable advantage: 1) present invention utilizes the propagation characteristic of wireless network, passes through prison Listen the concealed nodes that can effectively find in network;2) present invention by merge node within the scope of each node-node transmission and Concealed nodes obtain the global view of whole network topology, and carry out sub-clustering to the node in whole network topology, can be effective Alleviate the influence of the drastic conditions and concealed nodes of node competitive channel to network performance;3) to I/H cluster node in the present invention Channel access and transmission are carried out by polling mode, is at war with channel and transmission to O cluster node by 802.11DCF mode, The collision problem that conflicts caused by concealed nodes is alleviated significantly, reduces the access delay of network, improves the performance of network.
Present invention is further described in detail with reference to the accompanying drawing.
Detailed description of the invention
Fig. 1 is flow chart of the present invention for the appreciable cluster algorithm of concealed nodes of extensive D2D network.
Fig. 2 is the network model figure of the network concealed node of D2D.
Fig. 3 is the process schematic for carrying out sub-clustering in the present invention to the node in the global view of network topology.Wherein scheme It (a) is the first cluster result schematic diagram;Scheming (b) is the second cluster result schematic diagram;Scheming (c) is third cluster result schematic diagram.
Fig. 4 is that the result for carrying out sub-clustering to the node in the global view to network topology in the embodiment of the present invention is illustrated Figure.
Fig. 5 is that the node in the embodiment of the present invention in the global view of network topology carries out channel access and transmission process is shown It is intended to.
Specific embodiment
In conjunction with Fig. 1, the present invention is used for the appreciable cluster algorithm of concealed nodes of extensive D2D network, including following step It is rapid:
Step 1 selects a high-performance node as controller.Wherein, high-performance node is wireless router.
Step 2 passes through monitor channel, the neighbor node of each node of acquisition D2D network.The neighbor node of each node Including the node and concealed nodes being located within the scope of the node-node transmission.Wherein, in conjunction with Fig. 2, the concealed nodes for obtaining node are specific Are as follows:
Assuming that obtaining the concealed nodes of node A, node B of the node A into its transmission range sends data frame, and node B exists ACK frame is returned after the SIFS period to be responded, and node C also has received ACK frame in the transmission range of node B, and finds The recipient of ACK frame is node A, but node C does not listen to the frame of node A transmission, then node A and node C hides section each other Point.
Step 3, controller merge the neighbor node of all nodes, obtain the global view of network topology.
Step 4, controller carry out sub-clustering to the node in the global view of network topology, specifically:
Step 4-1, controller randomly selects a node as cluster head from the global view of network topology.
Step 4-2, using cluster head as starting point, sub-clustering is carried out to the node in the global view of network topology by controller. Specifically:
Step 4-2-1, all nodes that can listen to cluster head are denoted as I cluster as the first cluster;
Step 4-2-2, controller search can be listened to but the institute mutually hiding with cluster head by least one node in I cluster There is node, using these nodes as the second cluster, is denoted as H cluster;
Step 4-2-3, controller search can be listened to but mutual with all nodes of I cluster by least one node in H cluster Hiding all nodes are denoted as O cluster using these nodes as third cluster.
Further, it is assumed that the maximum number of O cluster node is M, and I cluster and H cluster node sum are N, then the maximum of O cluster node Relationship between number and I cluster, H cluster knot points are as follows:
Step 5, according to the sub-clustering of step 4 as a result, the node in the global view of network topology carries out channel access and number According to transmission, specifically:
Step 5-1, average division is carried out to BI (beacon interval) period of the 802.11WLAN of D2D network application, obtained Two parts channel access period is denoted as first part's channel access period, second part channel access period respectively.
Step 5-2, in first part's channel access period, I/H cluster node carries out channel access and number by polling mode According to transmission, specifically:
Step 5-2-1, first using cluster head as sender's node;
Step 5-2-2, some node of sender's node by data frame transfer into I/H cluster, the node are denoted as reception Fang Jiedian;
Step 5-2-3, after recipient's node successful data reception frame, to sender's node send ACK frame acknowledgment receive at Function, and its a certain neighbor node is chosen as next sender's node, and ACK frame is written into the MAC Address of the neighbor node Destination address;
Step 5-2-4, after a SIFS period, step 5-2-2,5-2-3 is repeated.
Step 5-3, in the second part channel access period, O cluster node carries out channel access by 802.11 DCF mode And data transmission, specifically:
(1) node that can mutually listen in O cluster node is vied each other by 802.11 DCF mode and carries out channel Access and data transmission;
(2) node that cannot mutually monitor in O cluster node while channel access and data transmission are carried out, specifically: pass through After one DIFS, the node that cannot mutually monitor carries out backoff procedure, has randomly choosed the node of identical BC value, when BC value simultaneously Keep out of the way the node that when being 0, cannot mutually monitor while accessing channel and carries out channel access and data transmission.
The present invention is described in further detail combined with specific embodiments below.
Embodiment
In conjunction with Fig. 1, the present invention is used for the appreciable cluster algorithm of concealed nodes of extensive D2D network, including following interior Hold:
(1) select a high-performance node as controller.Wherein, high-performance node is wireless router.
(2) by monitor channel, the neighbor node of each node of D2D network is obtained.
(3) controller merges the neighbor node of all nodes, obtains the global view of network topology.
(4) Fig. 3 is combined, controller carries out sub-clustering to the node in the global view of network topology: controller is opened up from network A node CH is randomly selected in the global view flutterred0As cluster head;Later with cluster head CH0For starting point, by cluster head CH0It can All nodes listened to are denoted as I cluster as the first cluster, as shown in the square nodes in Fig. 3 (a);Controller search can be with It is listened to by least one node in I cluster but all nodes mutually hiding with cluster head is denoted as using these nodes as the second cluster H cluster, as shown in the triangular nodes in Fig. 3 (b);Controller search can be listened to by least one node in H cluster but with I cluster The mutually hiding all nodes of all nodes are denoted as O cluster using these nodes as third cluster, such as the circular node in Fig. 3 (c) It is shown.The sub-clustering result finally obtained is as shown in figure 4, I cluster node is I0,I1,I2,I3,I4..., H cluster node is H0,H1,H2,H3, H4..., O cluster node is O0,O1,O2,O3,O4…。
(5) average division is carried out to the BI period of the 802.11WLAN of D2D network application, obtains two parts channel access week Phase is denoted as first part's channel access period, second part channel access period respectively.In conjunction with Fig. 5, with leader cluster node CH0, I Cluster node I0、I3, H cluster node H1、H2, O cluster node O0,O1,O2,O3,O4For, the section in the global view of network topology is described Point carries out the process of channel access and data transmission.First part's channel access period, I/H cluster node are accessed by polling method Channel, when the channel access period of I/H cluster node starts, CH0By data frame transfer to the node I for belonging to I cluster0.As node I0 When successful data reception frame, I0To leader cluster node CH0Send ACK frame acknowledgment receive successfully, and select it a neighbours (such as H1) it is used as next sender, by H1MAC Address write-in ACK frame destination address.After waiting SIFS, it is identified down One sending node H1Start to node H2Send data packet.As node H2When successful data reception frame, H2To sending node H1Hair It send ACK frame acknowledgment to receive successfully, and selects its neighbours (such as I3) it is used as next sender, by H1MAC Address write Enter the destination address of ACK frame.Then after a SIFS period, H2One data frame is transferred to node I3.Second part letter Road access cycle, O cluster node fight for channel access by 802.11DCF, and the node that can mutually listen to passes through competitive channel (such as O0And O2) carry out data transmission, the node that cannot mutually monitor can be with parallel transmission (such as O1And O2), by waiting DIFS Afterwards, node carries out backoff procedure, when it is 0 that BC value, which is kept out of the way, node O1And O2Access channel simultaneously carries out data transmission, and is transmitted Afterwards, other nodes of O cluster are based on DCF competitive channel again.

Claims (10)

1. a kind of appreciable cluster algorithm of concealed nodes for extensive D2D network, which is characterized in that including following step It is rapid:
Step 1 selects a high-performance node as controller;
Step 2 passes through monitor channel, the neighbor node of each node of acquisition D2D network;
Step 3, controller merge the neighbor node of all nodes, obtain the global view of network topology;
Step 4, controller carry out sub-clustering to the node in the global view of the network topology;
Step 5, according to the sub-clustering of step 4 as a result, the node in the global view of network topology carries out channel access and data pass It is defeated.
2. the concealed nodes appreciable cluster algorithm according to claim 1 for extensive D2D network, feature exist In high-performance node described in step 1 is wireless router.
3. the concealed nodes appreciable cluster algorithm according to claim 1 for extensive D2D network, feature exist In the neighbor node of each node described in step 2 includes the node and concealed nodes within the scope of the node-node transmission.
4. the concealed nodes appreciable cluster algorithm according to claim 1 or 3 for extensive D2D network, special Sign is, the concealed nodes of node are obtained in the neighbor node of each node for obtaining D2D network specifically:
Assuming that obtaining the concealed nodes of node A, node B of the node A into its transmission range sends data frame, and node B is in SIFS ACK frame is returned after period to be responded, and node C also has received ACK frame in the transmission range of node B, and finds ACK The recipient of frame is node A, but node C does not listen to the frame of node A transmission, then node A and node C concealed nodes each other.
5. the concealed nodes appreciable cluster algorithm according to claim 1 for extensive D2D network, feature exist In, controller described in step 4 carries out sub-clustering to the node in the global view of the network topology, specifically:
Step 4-1, controller randomly selects a node as cluster head from the global view of network topology;
Step 4-2, using the cluster head as starting point, the node in the global view of the network topology is divided by controller Cluster.
6. the concealed nodes appreciable cluster algorithm according to claim 5 for extensive D2D network, feature exist In using the cluster head as starting point described in step 4-2, by controller to the node progress in the global view of the network topology Sub-clustering, specifically:
Step 4-2-1, all nodes that can listen to the cluster head are denoted as I cluster as the first cluster;
Step 4-2-2, all sections that controller search can be listened to by least one node in I cluster but mutually be hidden with cluster head Point is denoted as H cluster using these nodes as the second cluster;
Step 4-2-3, controller search can be listened to by least one node in H cluster but mutually be hidden with all nodes of I cluster All nodes be denoted as O cluster using these nodes as third cluster.
7. the concealed nodes appreciable cluster algorithm according to claim 6 for extensive D2D network, feature exist Relationship between the maximum number and I cluster of, the O cluster node, H cluster knot points are as follows:
Assuming that the maximum number of O cluster node is M, I cluster and H cluster node sum are N, then
8. the concealed nodes appreciable cluster algorithm according to claim 1 for extensive D2D network, feature exist According to the sub-clustering of step 4 as a result, the node in the global view of network topology carries out channel access and data described in step 5 Transmission, specifically:
Step 5-1, average division is carried out to the BI period of the 802.11WLAN of D2D network application, obtains two parts channel access Period is denoted as first part's channel access period, second part channel access period respectively;
Step 5-2, in first part's channel access period, I/H cluster node carries out channel access by polling mode and data pass It is defeated;
Step 5-3, in the second part channel access period, O cluster node carries out channel access and number by 802.11 DCF mode According to transmission.
9. the appreciable cluster algorithm of concealed nodes of extensive D2D network is used for according to claim 5 or 8, it is special Sign is that I/H cluster node described in step 5-2 carries out channel access by polling mode and data are transmitted specifically:
Step 5-2-1, first using cluster head as sender's node;
Step 5-2-2, some node of sender's node by data frame transfer into I/H cluster, the node are denoted as recipient's section Point;
Step 5-2-3, after recipient's node successful data reception frame, ACK frame acknowledgment is sent to sender's node and is received successfully, and Its a certain neighbor node is chosen as next sender's node, and the MAC Address of the neighbor node is written to the target of ACK frame Address;
Step 5-2-4, after a SIFS period, step 5-2-2,5-2-3 is repeated.
10. the concealed nodes appreciable cluster algorithm according to claim 8 for extensive D2D network, feature It is, O cluster node described in step 5-3 carries out channel access by 802.11 DCF mode and data are transmitted, specifically:
(1) node that can mutually listen in O cluster node is vied each other by 802.11 DCF mode and carries out channel access And data transmission;
(2) node that cannot mutually monitor in O cluster node while channel access and data transmission are carried out, specifically: pass through one After DIFS, the node that cannot mutually monitor carries out backoff procedure, the node of identical BC value has been randomly choosed, when BC value is kept out of the way simultaneously When being 0, the node that cannot mutually monitor while accessing channel and carry out channel access and data transmission.
CN201810931318.XA 2018-08-15 2018-08-15 Hidden node-perceptible clustering algorithm for large-scale D2D network Active CN109005065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810931318.XA CN109005065B (en) 2018-08-15 2018-08-15 Hidden node-perceptible clustering algorithm for large-scale D2D network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810931318.XA CN109005065B (en) 2018-08-15 2018-08-15 Hidden node-perceptible clustering algorithm for large-scale D2D network

Publications (2)

Publication Number Publication Date
CN109005065A true CN109005065A (en) 2018-12-14
CN109005065B CN109005065B (en) 2021-05-04

Family

ID=64593416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810931318.XA Active CN109005065B (en) 2018-08-15 2018-08-15 Hidden node-perceptible clustering algorithm for large-scale D2D network

Country Status (1)

Country Link
CN (1) CN109005065B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189468A (en) * 2021-11-02 2022-03-15 云端领航(北京)通信科技股份有限公司 Multi-identification network system routing method based on identification clustering
CN115002019A (en) * 2022-06-22 2022-09-02 中国电信股份有限公司 Hidden node determination method and device, nonvolatile storage medium and electronic equipment
CN115002019B (en) * 2022-06-22 2024-05-14 中国电信股份有限公司 Hidden node determining method and device, nonvolatile storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595314A (en) * 2012-02-14 2012-07-18 北京邮电大学 Position-information-based device-to-device (D2D) clustering multicast method
CN106507316A (en) * 2016-11-02 2017-03-15 西安邮电大学 User's sub-clustering and resource allocation methods under a kind of D2D multicasts scene
EP3200550A1 (en) * 2016-01-29 2017-08-02 Alcatel Lucent Method for sharing resources between mobile devices thanks to a location tracking server
CN108307470A (en) * 2018-05-11 2018-07-20 重庆邮电大学 A kind of network cluster dividing method based on node group relationship degree

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595314A (en) * 2012-02-14 2012-07-18 北京邮电大学 Position-information-based device-to-device (D2D) clustering multicast method
EP3200550A1 (en) * 2016-01-29 2017-08-02 Alcatel Lucent Method for sharing resources between mobile devices thanks to a location tracking server
CN106507316A (en) * 2016-11-02 2017-03-15 西安邮电大学 User's sub-clustering and resource allocation methods under a kind of D2D multicasts scene
CN108307470A (en) * 2018-05-11 2018-07-20 重庆邮电大学 A kind of network cluster dividing method based on node group relationship degree

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIAOYING LEI: "Design of a collision-free backoff method to improve the IEEE 802.11 DCF", 《2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS》 *
石纯子: "D2D通信系统中基于QoS的分簇信道分配算法", 《信号处理》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189468A (en) * 2021-11-02 2022-03-15 云端领航(北京)通信科技股份有限公司 Multi-identification network system routing method based on identification clustering
CN114189468B (en) * 2021-11-02 2024-04-12 云端领航(北京)通信科技股份有限公司 Multi-identification network system routing method based on identification clustering
CN115002019A (en) * 2022-06-22 2022-09-02 中国电信股份有限公司 Hidden node determination method and device, nonvolatile storage medium and electronic equipment
CN115002019B (en) * 2022-06-22 2024-05-14 中国电信股份有限公司 Hidden node determining method and device, nonvolatile storage medium and electronic equipment

Also Published As

Publication number Publication date
CN109005065B (en) 2021-05-04

Similar Documents

Publication Publication Date Title
CN108924945B (en) A kind of cut-in method and device
Li et al. A new backoff algorithm for IEEE 802.11 distributed coordination function
Kanodia et al. Ordered packet scheduling in wireless ad hoc networks: Mechanisms and performance analysis
CN101795498B (en) Data priority-based channel contention access method for wireless sensor network
CN101584234B (en) Method of congestion management in a wireless mesh network, system and station of the wireless mesh network
JP4588465B2 (en) Transmission control method
CN105592564B (en) Adaptive access mechanism based on the estimation of live-vertex number in wireless Mesh netword
Jang et al. Network status detection-based dynamic adaptation of contention window in IEEE 802.11 p
JP7481445B2 (en) Wireless network transmission method, device, communication node, and storage medium
CN105376830B (en) The up-link access method that a kind of channel bonding and orthogonal frequency-time multiple access are combined
CN109005065A (en) A kind of appreciable cluster algorithm of concealed nodes for extensive D2D network
CN104581980A (en) Wireless network collision-avoiding channel access control method based on distance partitions
WO2017041629A1 (en) Active scanning processing method and related device and communication system
Lei et al. Design of a collision-free backoff method to improve the IEEE 802.11 DCF
CN108934081A (en) A kind of wireless vehicle mounted network channel cut-in method
Hsu et al. Achieving ultra energy-efficient and collision-free data collection in wake-up radio enabled mIoT
Lu et al. A dynamic token passing MAC protocol for mobile ad hoc networks
Ho et al. Ieee 802.11/wi-fi medium access control: An overview
Moad et al. Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs
Xu et al. A heuristic approach for low delay distributed MAC using successive interference cancellation in priority-based industrial wireless network
Syed et al. Medium access for underwater acoustic sensor networks
Li et al. Unsaturated traffic oriented spatial clustering multiusers MAC protocol for the next generation WLAN
Liao et al. A distributed adaptive QoS MAC protocol for mobile ad hoc networks
Hussain et al. Dynamic contention window for quality of service in IEEE 802.11 networks
Gangqiang et al. Simulation Research on Underwater Acoustic Network MAC Layer Protocol Attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant