CN109068394A - Channel access method based on queue length and collision risk - Google Patents

Channel access method based on queue length and collision risk Download PDF

Info

Publication number
CN109068394A
CN109068394A CN201810974327.7A CN201810974327A CN109068394A CN 109068394 A CN109068394 A CN 109068394A CN 201810974327 A CN201810974327 A CN 201810974327A CN 109068394 A CN109068394 A CN 109068394A
Authority
CN
China
Prior art keywords
node
data packet
collision risk
data
vertex
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810974327.7A
Other languages
Chinese (zh)
Other versions
CN109068394B (en
Inventor
易辉跃
舒睿俊
刘丹
张武雄
许晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Institute of Microsystem and Information Technology of CAS
Shanghai Research Center for Wireless Communications
Original Assignee
Shanghai Institute of Microsystem and Information Technology of CAS
Shanghai Research Center for Wireless Communications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Institute of Microsystem and Information Technology of CAS, Shanghai Research Center for Wireless Communications filed Critical Shanghai Institute of Microsystem and Information Technology of CAS
Priority to CN201810974327.7A priority Critical patent/CN109068394B/en
Publication of CN109068394A publication Critical patent/CN109068394A/en
Application granted granted Critical
Publication of CN109068394B publication Critical patent/CN109068394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of channel access method based on queue length and collision risk, comprising the following steps: node is preferential to send the small data packet of collision risk before transmitting according to the collision risk of the status predication data packet of node each in queuing message;When receiving node one, which is jumped, has live-vertex in range, sending node transmits queuing message in the form of notification frame, retransmits data after sending successfully.The present invention utilizes node queue's information, reduces conflict caused by concealed terminal, improves network throughput, and reduce propagation delay time.

Description

Channel access method based on queue length and collision risk
Technical field
The present invention relates to Wireless Ad Hoc Networks fields, more particularly to a kind of letter based on queue length and collision risk Road cut-in method.
Background technique
Wireless Mesh netword (Wireless Mesh Networks, WMNs) is made of wireless router and terminal device, WLAN (WLAN) and wireless self-networking (Ad-Hoc) technology have been merged, has been the distributed network of self-organizing, multi-hop.WMNs Not only there is the advantage of high-speed and high capacity relative to traditional wireless network, also there is wide coverage, transmission reliability The advantages such as height and scalability are strong.The various advantage and characteristics of WMNs itself, so that it can be applied not only to Metropolitan Area Network (MAN), Internet of Things Net also can be applied to the fields such as wireless sense network, emergency communication, intelligent transportation, military communication.But WMNs is not at present In real life realize on a large scale deployment and application, in terms of practical application it there is also many technical problems to need to solve Certainly.Core of the channel Intervention mechanism of medium access control (MediaAccess Control, MAC) layer as wireless Mesh netword Heart technology is to limit an important factor for it moves towards application there is also many problems.
MAC layer is the important component of network, is responsible for the physics of node distribution wireless communication resources and control node Layer, directly affects the fairness etc. that channel utilization, network delay, system power dissipation and channel use.It is fixed due to lacking Basis instrument accesses channel, when preempting resources, it is necessary to which self-organization is simultaneously reconfigured when distributed network is added in node.Institute Node is inherently identical, and all must in network without naturally classification or central controller, all functions It must be distributed among the nodes.How under the conditions of limited radio channel resource channel is made full use of, keeps each user high Effect quickly accesses the key task that channel is MAC protocol.
The Typical Representative of distributed channel access is IEEE 802.11DCF (Distributed Coordination Function) agreement has been widely used in the various emulation of Ad-Hoc network at present.Distribution access is more flexible, is saving In the case that dot density is smaller, network traffic load is relatively light, preferable network performance can be obtained using the agreement, thus be applicable in In multi-hop Mesh network.CSMA/CA is the basis of numerous agreements such as 802.11DCF, and hidden node problem is its maximum disadvantage One of.Concealed nodes influence being properly received for data, cause the frequent re-transmission of data, and excessive re-transmission thinks MAC layer Receiving node failure, fails to network layer report link, and network layer reactivates routing procedure, network conflict is caused to add Play, handling capacity drastically reduce.
802.11DCF solves hidden node problem with RTS/CTS mechanism, is most popular association in current wireless network View.Node before sending big data packet by RTS/CTS shake hands channel reservation money.(R is that node sends half as shown in Figure 1 Diameter), node A first sends RTS message to node B before sending data to node B, and node B is received after RTS message if allowing to save Point A sends data and then replys CTS message, includes temporal information, node A and node B needed for subsequent data transmission in RTS/CTS The node that surrounding receives RTS, CTS message keeps silent within the time of transmission data, does not send any message.In heavy traffic RTS/CTS can effectively improve network performance in network, but RTS/CTS itself can shake hands unsuccessfully, together because of hidden node problem When there are problems that exposed node, network performance is promoted limited.802.11DCF solves hidden node problem and is based primarily upon a kind of vacation If, it is believed that all concealed nodes are located in the range of transmission of receiving node.But the difference of communication range and disturbance range can be led Cause RTS/CTS mechanism failure.
Takeda et al. propose it is a kind of based on queue length interaction scheduling scheme to solve hidden node problem.Node is real When exchange queuing message, allow the longest node of queue length within the scope of double bounce to send data.Node is divided into active (active) With inactive (inactive) two states, channel is accessed using CSMA mode.When backoff counter is 0, active node Channel can be accessed and send data, inactive node may only reply.Node exchanges queuing message by data frame and ACK, Remaining node monitor channel updates queuing message.Queuing message includes sending node, receiving node, and sending node one is jumped in range The ID of queue length maximum node in addition to receiving node, current state, queue length.
As shown in Fig. 2, D sends data to E, A (the longest node of A, B, C queue length), D (sender), E are carried The queuing message of (recipient), state switching law are as shown in table 1.It is compared with CSMA, RTS/CTS, the tune based on queue length Degree scheme in the WMNs of heavy traffic handling capacity and in terms of have a biggish advantage, but when number of nodes increases, When transmission rate becomes larger, time delay is obviously increased.
1 state switching law of table
In QECW scheme, queuing message is carried by data frame and ACK and is sent.When network load is larger, poor in timeliness, Therefore the queuing message within the scope of double bounce is easy to appear inconsistent.When switching to active by inactive, node sends short frame The message of Status Change is transferred to other nodes.If the neighbors of queuing message failure and receiving node is active shape State, short frame and data frame all easily clash.As shown in figure 3, A, D, E, I are active node, remaining is inactive node. D knows the queuing message of I by the ACK of F, and D monitors the data frame of E, turns after updating queuing message according to state switching law For active state.A sends data to B, and D does not store the queuing message of A.The double bounce range of D exists simultaneously multiple at this time The concealed nodes that active node, but D stores the queuing message within the scope of E, F double bounce, only A, H, J are only D.If D is sent out Short frame is sent to send data to B to C, A, the data frame transfer time is long, and C will be constantly subjected to interfere before A terminates to send.More than Conflict analysis show in the case that do not obtain receiving node one jump range in queuing message, the hidden node problem of QECW and CSMA is equally serious.Therefore, it is necessary to study the queuing message solution hidden node problem how to store using node.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of channel access side based on queue length and collision risk Method can reduce network conflict.
The technical solution adopted by the present invention to solve the technical problems is: providing a kind of based on queue length and collision risk Channel access method, comprising the following steps:
(1) node is before transmitting according to the collision risk of the status predication data packet of node each in queuing message, preferentially Send the small data packet of collision risk;
(2) when receiving node one, which is jumped, has live-vertex in range, sending node transmits queuing message in the form of notification frame, Data are retransmited after sending successfully.
The step (2) specifically includes following sub-step:
(21) judge whether there is live-vertex in queuing message, if there is performing the next step;Otherwise, step (25) are gone to;
(22) check whether buffer area has live-vertex and notify the data packet of node, if there is judging live-vertex and leading to Know position of the node data packet in buffer area, and performs the next step;Otherwise, step (25) are gone to;
(23) if the data packet of live-vertex is forward, mark position will be exchanged and be the label of live-vertex, and go to step Suddenly (25);If notifying the data packet of node forward, perform the next step;
(24) if sending node is successfully transmitted notification frame and gives notice node, will exchange mark position is the mark for notifying node Number, and notice node is deleted, it goes in next step, otherwise deletes notice node, keep out of the way again;
(25) data are sent according to the concrete condition of exchange flag bit.
The notice node is to record a transparent node for jumping queuing message in range.
The exchange flag bit is used to record the node ID of preferential receipt data packet.
The step (25) specifically: if exchange flag bit is not 0, the data packet tune of flag bit corresponding node will be exchanged To queue head, data are sent;If exchanging flag bit is 0, data are directly transmitted.
Beneficial effect
Due to the adoption of the above technical solution, compared with prior art, the present invention having the following advantages that and actively imitating Fruit: the present invention is suitable for the WMNs of heavy traffic, for reducing network conflict, using node queue's length as the weighing apparatus of channel access Amount standard realizes queuing message interaction by data frame and ACK, can effectively improve network throughput.The present invention passes through analysis Various conflict situations, using the collision risk of the status predication data packet of node each in queuing message, node is according to data packet Collision risk changes the sequence of buffer area data packet, preferential to send the data without concealed nodes direction.
Detailed description of the invention
Fig. 1 is concealed nodes illustraton of model in the prior art;
Fig. 2 is that queuing message notifies schematic diagram in the prior art;
Fig. 3 is the conflict schematic diagram of QECW in the prior art;
Fig. 4 is flow chart of the invention;
Fig. 5 is the form schematic diagram of notification frame in the present invention;
Fig. 6 is the schematic diagram of a specific embodiment conflict avoidance in the present invention.
Specific embodiment
Present invention will be further explained below with reference to specific examples.It should be understood that these embodiments are merely to illustrate the present invention Rather than it limits the scope of the invention.In addition, it should also be understood that, after reading the content taught by the present invention, those skilled in the art Member can make various changes or modifications the present invention, and such equivalent forms equally fall within the application the appended claims and limited Range.
Embodiments of the present invention are related to a kind of channel access method based on queue length and collision risk, including following Step: node is preferential to send punching before transmitting according to the collision risk of the status predication data packet of node each in queuing message The small data packet of prominent risk;When receiving node one, which is jumped, has live-vertex in range, sending node transmits team in the form of notification frame Column information retransmits data after sending successfully.
That is, node real-time exchange queuing message, allows the longest node of queue length within the scope of double bounce to send number According to;Node before transmitting data, by the collision risk of prediction data packet, changes the transmission sequence of same priority data packet, It is preferential to send the small data packet of collision risk.When the collision risk of data packet is the same, using the transmission principle of first in first out.Its In, introducing notice node (abbreviation Inform Node) list records one and jumping queuing message in range is transparent node ID.Fig. 3 In, D has successfully received the ACK of F, and I is active state.ID of the D in Inform Node list records F.In addition, using exchange mark Will position (abbreviation Exchange) records the node ID of preferential receipt data packet.When sending node Exchange flag bit not When being 0, the data packet of Exchange corresponding node is adjusted to queue head before sending data and retransmits data packet by node needs. Specifically as shown in figure 4, executing following steps when node accesses channel:
1. if turning in next step there is active node in queuing message;Otherwise turn step 5;
2. checking whether buffer area has active node and the data packet of InformNode, if there is both judgements data packet to exist Position in buffer area turns in next step;If not turning step 5;
3. if Exchange to be set to the label of active node, turns step 5 the data packet of active node is forward;If The data packet of Inform node is forward, turns in next step;
If Exchange to be set to the label of Inform Node 4. node is successfully transmitted notification frame to InformNode, InformNode is deleted, turns next step, otherwise deletes InformNode, keep out of the way again;
5. if a data packet of Exchange corresponding node is adjusted to queue head, sends number Exchange is not 0 According to;If Exchange is 0, data are sent;
6. node sends failure, Exchange is set 0, terminates process;Node is sent successfully, terminates process.
The format of notification frame is provided with the transmission of notification frame and wants as shown in figure 5, in order to reduce the load of network as far as possible It asks.If node send notification frame failure, by the node ID stored in Inform node delete, node next time access channel when not Notification frame can be retransmited.By taking Fig. 3 as an example, unsuccessfully mean that I has begun transmission data when D sends notification frame, at this time F data packet Collision risk it is maximum.
The present invention is further illustrated below by a specific embodiment.
As shown in fig. 6, D has found that E, I are active node before transmitting data, buffer area has the data packet of E, F.(1) If the data packet of E is forward, D preferentially sends the data of E;(2) if the data packet of F is forward, D sends Inform and is properly received to F, F After reply D.If I can be properly received the reply of F at this time, updates queuing message and switch to inactive state, be just avoided that conflict.D Inform send successfully after preferentially send the data of F.(3) if the Inform of D sends failure, channel is accessed after keeping out of the way SIFS.
It is not difficult to find that present invention can be suitably applied to the WMNs of heavy traffic, for reducing network conflict.By node queue's length As the measurement standard of channel access, queuing message interaction is realized by data frame and ACK, can effectively improve network throughput Amount.But when network load increases, the queue length variation of node is too fast, and the inconsistent number that leads to a conflict of information increases.This Various conflict situations are analyzed in invention, using the collision risk of the status predication data packet of node each in queuing message, node according to The collision risk of data packet changes the sequence of buffer area data packet, preferential to send the data without concealed nodes direction.

Claims (5)

1. a kind of channel access method based on queue length and collision risk, which comprises the following steps:
(1) node is preferential to send before transmitting according to the collision risk of the status predication data packet of node each in queuing message The small data packet of collision risk;
(2) when receiving node one, which is jumped, has live-vertex in range, sending node transmits queuing message in the form of notification frame, sends Data are retransmited after success.
2. the channel access method according to claim 1 based on queue length and collision risk, which is characterized in that described Step (2) specifically includes following sub-step:
(21) judge whether there is live-vertex in queuing message, if there is performing the next step;Otherwise, step (25) are gone to;
(22) check whether buffer area has live-vertex and notify the data packet of node, if there is judging that live-vertex and notice save Position of the point data packet in buffer area, and perform the next step;Otherwise, step (25) are gone to;
(23) if the data packet of live-vertex is forward, mark position will be exchanged and be the label of live-vertex, and go to step (25);If notifying the data packet of node forward, perform the next step;
(24) if sending node is successfully transmitted notification frame and gives notice node, will exchange mark position is the label for notifying node, And notice node is deleted, it goes in next step, otherwise deletes notice node, keep out of the way again;
(25) data are sent according to the concrete condition of exchange flag bit.
3. the channel access method according to claim 1 based on queue length and collision risk, which is characterized in that described Notice node is to record a transparent node for jumping queuing message in range.
4. the channel access method according to claim 1 based on queue length and collision risk, which is characterized in that described Exchange flag bit is used to record the node ID of preferential receipt data packet.
5. the channel access method according to claim 1 based on queue length and collision risk, which is characterized in that described Step (25) specifically: if exchange flag bit is not 0, the data packet for exchanging flag bit corresponding node is adjusted to queue head, Send data;If exchanging flag bit is 0, data are directly transmitted.
CN201810974327.7A 2018-08-24 2018-08-24 Channel access method based on queue length and collision risk Active CN109068394B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810974327.7A CN109068394B (en) 2018-08-24 2018-08-24 Channel access method based on queue length and collision risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810974327.7A CN109068394B (en) 2018-08-24 2018-08-24 Channel access method based on queue length and collision risk

Publications (2)

Publication Number Publication Date
CN109068394A true CN109068394A (en) 2018-12-21
CN109068394B CN109068394B (en) 2021-04-23

Family

ID=64756937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810974327.7A Active CN109068394B (en) 2018-08-24 2018-08-24 Channel access method based on queue length and collision risk

Country Status (1)

Country Link
CN (1) CN109068394B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112398744A (en) * 2019-08-16 2021-02-23 阿里巴巴集团控股有限公司 Network communication method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101982944A (en) * 2010-11-17 2011-03-02 东南大学 Method for underwater acoustic sensor network Aloha protocol
CN102612091A (en) * 2012-03-01 2012-07-25 天津大学 Media access control method based on spatial fairness in underwater sensor network
CN103634913A (en) * 2012-08-22 2014-03-12 上海交通大学 Clustering-based multi-hop multi-channel cognitive wireless sensor network communication method
CN105722234A (en) * 2016-02-05 2016-06-29 北京佰才邦技术有限公司 Method for scheduling resource in unlicensed frequency band, base station and terminal
CN108307439A (en) * 2017-08-17 2018-07-20 上海大学 A kind of self-adoptive retreating method under a large amount of multi-hop wireless nodes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101982944A (en) * 2010-11-17 2011-03-02 东南大学 Method for underwater acoustic sensor network Aloha protocol
CN102612091A (en) * 2012-03-01 2012-07-25 天津大学 Media access control method based on spatial fairness in underwater sensor network
CN103634913A (en) * 2012-08-22 2014-03-12 上海交通大学 Clustering-based multi-hop multi-channel cognitive wireless sensor network communication method
CN105722234A (en) * 2016-02-05 2016-06-29 北京佰才邦技术有限公司 Method for scheduling resource in unlicensed frequency band, base station and terminal
CN108307439A (en) * 2017-08-17 2018-07-20 上海大学 A kind of self-adoptive retreating method under a large amount of multi-hop wireless nodes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杜骏璍: "20160315", 《中国优秀硕士论文全文数据库》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112398744A (en) * 2019-08-16 2021-02-23 阿里巴巴集团控股有限公司 Network communication method and device and electronic equipment

Also Published As

Publication number Publication date
CN109068394B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
Fu et al. The impact of multihop wireless channel on TCP performance
EP1850538B1 (en) Radio communication device, communication route control device, communication route control method, and communication system
Jurdak Wireless ad hoc and sensor networks: A cross-layer design perspective
CN111479306B (en) Q-learning-based flight ad hoc network QoS routing method
CN1886942B (en) Method and system for routing traffic in AD HOC networks
US20060028984A1 (en) Energy efficient medium access control protocol for IEEE 802.11 WLANs
JP2009512334A (en) Method and apparatus for determining link cost for routing in wireless network
Radenkovic et al. Framework for utility driven congestion control in delay tolerant opportunistic networks
CN104009913A (en) Broadcasting method based on distance and energy balance in mobile Ad Hoc network
Kim et al. An AHP-based flexible relay node selection scheme for WBANs
Qiu et al. Maintaining links in the highly dynamic fanet using deep reinforcement learning
CN105530680B (en) A kind of vehicle self-organizing network relay vehicle selection method
US20060120371A1 (en) Coordinated convergecast for AD HOC wireless networks
CN109068394A (en) Channel access method based on queue length and collision risk
Zhao et al. Queueing analysis for medical data transmissions with delay-dependent packet priorities in WBANs
Basarkod et al. On-demand QoS and stability based multicast routing in mobile ad hoc networks
CA2452742C (en) Traffic specifications for polling requests of periodic sources
Abada et al. Improving relay selection scheme for connecting VANET to internet over IEEE 802.11 p
Campos et al. Performance issues of ad hoc routing protocols in a network scenario used for videophone applications
Guo et al. Evaluating the impact of aggregation and RTS/CTS schemes on IEEE 802.11 based Linear Wireless Ad‐Hoc Networks
Hadiwardoyo An overview of qos enhancements for wireless vehicular networks
Abada et al. An efficient mobile gateway selection and discovery based-routing protocol in heterogeneous LTE-VANET networks
Paranjape et al. Intra and inter cluster congestion control technique for mobile wireless sensor networks
Zhao et al. Quality-driven capacity-aware resources optimization design for ubiquitous wireless networks
Wannawilai et al. AODV with Sufficient Intermediary Bandwidth Aware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant