CN114710240A - Link self-adaption method under TDMA point-to-point scene and application - Google Patents

Link self-adaption method under TDMA point-to-point scene and application Download PDF

Info

Publication number
CN114710240A
CN114710240A CN202210627378.9A CN202210627378A CN114710240A CN 114710240 A CN114710240 A CN 114710240A CN 202210627378 A CN202210627378 A CN 202210627378A CN 114710240 A CN114710240 A CN 114710240A
Authority
CN
China
Prior art keywords
node
link
value
configuration information
new configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210627378.9A
Other languages
Chinese (zh)
Other versions
CN114710240B (en
Inventor
黄沛瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sinomatin Technology Shenzhen Co ltd
Original Assignee
Sinomatin Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sinomatin Technology Shenzhen Co ltd filed Critical Sinomatin Technology Shenzhen Co ltd
Priority to CN202210627378.9A priority Critical patent/CN114710240B/en
Publication of CN114710240A publication Critical patent/CN114710240A/en
Application granted granted Critical
Publication of CN114710240B publication Critical patent/CN114710240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • H04L1/0003Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0009Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a link self-adaption method under a TDMA point-to-point scene and application thereof, relating to the technical field of digital information transmission. The method comprises the following steps: the second node calculates the link quality data with the first node and transmits the link quality data back to the first node through a reverse link; and the first node acquires the link quality data, analyzes the link quality data, calculates new configuration information matched with the link quality data, encrypts the new configuration information to obtain encrypted data and sends the encrypted data to the second node, and simultaneously sends the new configuration information to the first node and appoints the new configuration information to take effect at the same time with the second node. The invention ensures the balance of transmission distance and transmission flow, enhances the stability of the link, and enables the system resources to be more effectively utilized and distributed.

Description

Link self-adaption method under TDMA point-to-point scene and application
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a link self-adaption method in a TDMA point-to-point scene and application thereof.
Background
Time division multiple access (tdma) (time division multiple access) is a communication technology for realizing a shared transmission medium or network, belongs to an allocation-based channel scheduling technology, and is widely used in wireless communication networks. Specifically, TDMA divides time into periodic frames (frames) on a broadband wireless carrier, and divides each frame into a plurality of time slots (the frames and the time slots are non-overlapping), and each time slot is allocated to a user equipment as a communication channel. It allows multiple ues to use the same frequency in different time slots (or time slices), each ue transmitting in their own time slice, thus allowing multiple ues to share the same transmission medium (e.g., radio frequency). When the users sharing the transmission medium only have two users, the scenario is a point-to-point scenario. For example, as shown in fig. 1, fig. 1 includes an a node corresponding to a first user and a B node corresponding to a second user, where a camera is disposed corresponding to the a node, and a PC terminal is disposed corresponding to the B node, and in a peer-to-peer scene, after video image data collected by the camera is transmitted to the a node, the a node can send the video image data to the B node, and after receiving the video image data, the B node plays the video image data through the PC terminal. Of course, the a node and the B node may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, portable wearable devices, and the like, as needed.
At present, in a TDMA point-to-point fixed timing scenario, a system link usually adopts a fixed spectrum width and a fixed modulation and demodulation manner in a modulation and demodulation process. On the premise of unchanging the transmitting power, the transmission distance of the link on the space is also fixed due to the adoption of the fixed spectrum width and the fixed modulation and demodulation mode. Generally speaking, a larger spectrum width can support a higher modulation and demodulation mode, and at this time, a link can transmit more signals over a certain time; however, the higher the modulation and demodulation scheme used, the shorter the transmission distance. That is, to obtain a longer transmission distance, a larger transmission traffic is discarded, and to obtain a larger transmission traffic, a shorter transmission distance is required. In order to make system resources (such as time/space/frequency resources) more effectively utilized and allocated under the condition that a system link meets certain performance, the balance between transmission distance and transmission traffic needs to be balanced. How to perform adaptive adjustment on a link so that near-end transmission has a larger transmission flow and far-end transmission has a larger transmission distance, thereby effectively utilizing and allocating system resources is a technical problem which needs to be solved at present.
Disclosure of Invention
The invention aims to: the defects of the prior art are overcome, and a link self-adaption method and application in a TDMA point-to-point scene are provided. The invention can monitor the link state under the scene of point-to-point fixed time sequence, dynamically self-adapt the link configuration parameters according to the link state, and improve the security of link configuration information transmission through data encryption. Therefore, by dynamically adjusting the frequency spectrum width of transmitting and receiving and the modulation and demodulation mode, the balance between the transmission distance and the transmission flow is ensured, the stability of a link is enhanced, and the system resources are more effectively utilized and distributed.
In order to achieve the above object, the present invention provides the following technical solutions.
A link self-adaption method under a TDMA point-to-point scene comprises the following steps:
the second node calculates the link quality data with the first node and transmits the link quality data back to the first node through a reverse link;
the first node obtains the link quality data and then analyzes the link quality data, and new configuration information matched with the link quality data is calculated; the new configuration information comprises bandwidth and modulation and coding strategy information of a link;
and encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the second node, and simultaneously sending the new configuration information to the first node and agreeing to take effect at the same time with the second node.
Further, after receiving the encrypted data information, the second node performs the following operations:
analyzing the encrypted data to obtain new configuration information;
checking the new configuration information;
when the verification of the new configuration information is successful, the second node issues the new configuration information to the second node and takes effect on the new configuration information so as to enable the link configuration parameters of the second node to be consistent with the new link configuration parameters of the first node, and link transmission between the first node and the second node is established based on the new link configuration parameters; the moment when the first node and the second node take effect of the new configuration information is defined as the same IDLE time sequence;
and when the verification of the new configuration information fails, the second node keeps the original link configuration parameters.
Further, when the verification of the new configuration information fails, a link configuration information rollback instruction is sent to the first node, and according to the link configuration information rollback instruction, the first node can terminate the configuration of the new configuration information in an IDLE time sequence and perform configuration rollback operation, so that the link configuration parameters of the first node are the same as the original link configuration parameters of the second node, and link transmission between the first node and the second node is established based on the original link configuration parameters.
Further, the method also comprises the following steps:
monitoring the verification operation of the new configuration information, and counting the times of verification failure;
judging whether the number of times of verification failure exceeds a preset threshold value or not;
and when the current link state exceeds a preset threshold value, judging that the link states of the first node and the second node are abnormal, and performing downshift processing on the link of the first node and the second node.
Further, the link quality data includes a reception power value and a noise floor value;
the first node is configured to: after receiving the link quality data, calculating according to a receiving power value and a background noise value in the link quality data to obtain a signal-to-noise ratio (SNR), wherein the SNR is equal to a difference value between the receiving power value and the background noise value; and comparing the SNR with a preset SNR threshold in a link optimal configuration file based on the SNR, acquiring bandwidth and modulation and coding strategy information matched with the SNR in the link optimal configuration file, and taking the matched bandwidth and modulation and coding strategy information as new configuration information.
Further, the step of calculating the link quality data is as follows:
s110, calculating a receiving power value RSSI;
when the sender is in the sending state, the formula RSSI =10 log is calculated10f((float) RSSIInstantaneous moment of action) Calculating a receiving power value by + VAG + TEMP + ATT; wherein the content of the first and second substances,
f((float) RSSIinstantaneous moment of action) Represents the transmit power as an and (float) RSSIInstantaneous moment of actionA function of the correlation; (float) RSSIInstantaneous moment of actionIndicating return RSSIInstantaneous moment of actionFloating point number of (RSSI)Instantaneous moment of actionRepresenting the instantaneous value of RSSI by the formula RSSIInstantaneous moment of action=sum(I2+Q2) Calculating, wherein sum represents a summation function, I represents an in-phase component, Q represents a quadrature-phase component, and the phase difference between the sum and the I is 90 degrees; VAG represents a preset value dynamically adjusted by FPGA; TEMP represents a preset temperature compensation value; ATT represents a preset fixed compensation value;
s120, calculating a bottom noise value NF;
when the transmitter closes the radio frequency switch to stop transmitting and the receiver is in a receiving state, the formula NF =10 log is calculated10f((float) RSSIInstantaneous moment of action) The base noise value NF was calculated by + VAG + TEMP + ATT.
Further, the link optimal configuration file is set by a system or a user, and the current MCS value, the MCS value increased by the next gear, the bandwidth value increased by the next gear, the SNR threshold switched to the next gear value, the MCS value increased by the previous gear, the bandwidth value increased by the previous gear, and the SNR threshold switched to the previous gear value are recorded in the link optimal configuration file;
when the calculated SNR reaches the SNR threshold value switched to the previous gear value, switching the current bandwidth and the modulation and coding strategy to the previous gear value; and when the calculated SNR reaches an SNR threshold value for switching to the next gear value, switching the current bandwidth and the modulation and coding strategy to the next gear value.
Further, the link quality data also comprises the error rate of Cyclic Redundancy Check (CRC), the second node counts the CRC result of each frame of data in the link at intervals of a preset period, and after the error rate of the CRC is obtained through statistical calculation, the error rate of the CRC is sent to the first node through a reverse link;
the first node is configured to: and judging whether the link quality changes or not based on the error rate of the received CRC, judging that the link quality changes when the error rate of the CRC exceeds a preset standard value, and sending a link configuration adjustment instruction to trigger and calculate new configuration information matched with the link quality data.
Further, when new configuration information matched with the link quality data is calculated, whether CRC errors occur is judged; when CRC is wrong, directly switching the link configuration to the next preset configuration in the link optimal configuration file; and when the CRC has no error, calculating to obtain the SNR according to the receiving power value and the background noise value in the link quality data.
The invention also provides a link self-adaptive system under the TDMA point-to-point scene, which comprises a first node and a second node and is characterized in that: the first node and the second node comprise a filter module, a VGA module, an AD module, an FPGA logic module and an APP module, and are connected through the filter module to perform spatial transmission of data;
the second node is configured to: calculating link quality data with the first node and transmitting the link quality data back to the first node through a reverse link;
the first node is configured to: analyzing after acquiring the link quality data, and calculating new configuration information matched with the link quality data, wherein the new configuration information comprises bandwidth and modulation and coding strategy information of a link; and encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the second node, and simultaneously sending the new configuration information to the first node and agreeing to take effect at the same time with the second node.
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects as examples: the link state under the scene of point-to-point fixed time sequence can be monitored, dynamic self-adaptation of link configuration parameters can be carried out according to the link state, and meanwhile, the safety of link configuration information transmission is improved through data encryption. Therefore, by dynamically adjusting the transmitting and receiving frequency spectrum width and the modulation and demodulation mode, a higher-level modulation and demodulation mode can be selected to realize larger transmission flow when the distance between the nodes is closer, and a lower-level modulation and demodulation mode can be selected to realize longer transmission distance when the distance between the nodes is longer, so that the balance between the transmission distance and the transmission flow is ensured.
On the other hand, dynamic adaptation of link configuration parameters may also enhance the stability of the link: the node equipment can acquire the bandwidth and the modulation and coding strategy of the matched link according to the link quality data so as to maintain the node equipment to work under a normal transmission distance, thereby enhancing the stability of the link.
Drawings
Fig. 1 is a communication example diagram of a TDMA point-to-point scenario in the prior art.
Fig. 2 is a diagram illustrating a node connection according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating a link adaptation method in a TDMA point-to-point scenario according to an embodiment of the present invention.
Fig. 4 is a diagram illustrating an example of logic processing of link adaptive adjustment in a TDMA point-to-point scenario according to an embodiment of the present invention.
Fig. 5 is a diagram illustrating an example of the transmission and reception timings of the a1 node and the a2 node according to an embodiment of the present invention.
Fig. 6 is a schematic data structure diagram of a set link optimization configuration file according to an embodiment of the present invention.
Detailed Description
The link adaptation method in the TDMA point-to-point scenario disclosed in the present invention and the application thereof are described in further detail with reference to the accompanying drawings and specific embodiments. It should be noted that technical features or combinations of technical features described in the following embodiments should not be considered as being isolated, and they may be combined with each other to achieve better technical effects. In the drawings of the embodiments described below, the same reference numerals appearing in the various drawings denote the same features or components, and may be applied to different embodiments. Thus, once an item is defined in one drawing, it need not be further discussed in subsequent drawings.
It should be noted that the structures, proportions, sizes, and other dimensions shown in the drawings and described in the specification are only for the purpose of understanding and reading the present disclosure, and are not intended to limit the scope of the invention, which is defined by the claims, and any modifications of the structures, changes in the proportions and adjustments of the sizes and other dimensions, should be construed as falling within the scope of the invention unless the function and objectives of the invention are affected. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be executed out of order from that described or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present invention.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
Examples
The link dynamic self-adaptive scheme provided by the invention acquires the change information of the link in space by monitoring the link state, and then adjusts the radio frequency configuration parameters according to the change value of the link in space to realize the link dynamic adjustment; meanwhile, data encryption is carried out in the adjusting process so as to ensure data security. Further, a data verification mechanism is provided to ensure the safety and stability of the system.
The present embodiment is described in detail below in conjunction with fig. 3 and 4, based on the point-to-point communication between the a1 node and the a2 node illustrated in fig. 2.
For convenience of description, specific steps of the link adaptation method will be described in detail by taking a unidirectional link between the a1 node and the a2 node as an example.
At this time, the a1 node is the first node as the data sender. As a typical example, the a1 node may include a filter module, a VGA module, an AD module, an FPGA logic module, and an APP module. The filter module is mainly used for filtering out-of-band waveforms. The VGA module is mainly used for adjusting receiving compensation gain and ensuring that the power of a signal entering the AD module is within a preset certain range. The AD module is mainly used for converting an analog signal and a digital signal, and specifically, an AD9363 may be used. The FPGA logic module is used as a core component of the control logic and is used for controlling the logic processing of the whole node equipment. The APP module is mainly used for forwarding and processing data.
The a2 node acts as a data receiver and is the second node. The A2 node and the A1 node are arranged in a isomorphic manner, and can also comprise the filter module, a VGA module, an AD module, an FPGA logic module and an APP module.
Referring to fig. 3, a method for link adaptation in a TDMA point-to-point scenario specifically includes the following steps.
The S100, a2 node calculates link quality data with the a1 node and transmits the link quality data back to the a1 node over the reverse link.
S200, analyzing after the A1 node acquires the link quality data, and calculating new configuration information matched with the link quality data; the new configuration information includes bandwidth and modulation and coding strategy information of the link.
And S300, encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the node A2, and simultaneously sending the new configuration information to the node A1, and agreeing to take effect at the same time with the node A2.
Preferably, when encrypting the new configuration information, the CRC encryption operation is performed on the entire data, and the result is stored in the last two bytes, and the encryption is mainly used for the receiver to determine the correctness of the data. And then, performing AES encryption on the whole first encrypted data obtained by encryption, namely performing second encryption, wherein the second encryption is mainly used for improving the security of data transmission in a wireless space and preventing other people from intercepting the data and cracking the data.
Because the AES encryption needs a preset secret key, the secret key can be stored in the preset file through the configuration file so as to be convenient for changing and modifying the secret key.
Of course, those skilled in the art may also use other encryption operation algorithms or proprietary protocol schemes for encryption as needed, and the specific encryption operation algorithm is not limited herein.
After the step S300, the method may further include the step S400: after receiving the encrypted data information, the node a2 performs the following operations: analyzing the encrypted data to obtain new configuration information; checking the new configuration information; when the verification of the new configuration information is successful, the a2 node issues the new configuration information to itself and takes effect on the new configuration information so that the link configuration parameters of itself are consistent with the new link configuration parameters of the a1 node, and establishes link transmission between the a1 node and the a2 node based on the new link configuration parameters, as shown in fig. 4. And the moment when the first node and the second node take effect of the new configuration information is about to be the same IDLE time sequence.
When the new configuration information check fails, the a2 node maintains the original link configuration parameters.
Preferably, when the verification of the new configuration information fails, the a2 node may further send a link configuration information rollback instruction to the a1 node. At this time, the a1 node can terminate the configuration of the new configuration information and perform a configuration rollback operation in IDLE timing according to the link configuration information rollback instruction, so that the link configuration parameters of the a1 node can be the same as the original link configuration parameters of the a2 node. After performing the configuration rollback operation, the a1 node will correctly link with the a2 node based on the original link configuration parameters, as shown in fig. 4.
Further, if the parsing checking operation of the a2 node fails several times, indicating that the link status is poor, at this time, a link down shift operation may be performed between the a1 node and the a2 node, i.e., to adjust the link configuration parameters to the next preset configuration. In specific implementation, the method can comprise the following steps: monitoring the verification operation of the new configuration information, and counting the times of verification failure; judging whether the number of times of verification failure exceeds a preset threshold value or not; when the preset threshold value is exceeded, the abnormal state of the link between the A1 node and the A2 node is judged, and the downshift processing is performed on the link between the A1 node and the A2 node.
In specific implementation, the preset threshold may be set by default in the system, or may be set individually by the user, which is not limited herein.
In an implementation manner of this embodiment, the link quality data may specifically include a received power value and a noise floor value.
At this time, the a1 node is configured to: after receiving the link quality data, calculating according to a receiving power value and a background noise value in the link quality data to obtain a signal-to-noise ratio (SNR), wherein the SNR is equal to a difference value between the receiving power value and the background noise value; and comparing the SNR with a preset SNR threshold in a link optimal configuration file based on the SNR, acquiring bandwidth and modulation and coding strategy information matched with the SNR in the link optimal configuration file, and taking the matched bandwidth and modulation and coding strategy information as new configuration information.
Specifically, the step of calculating the link quality data may be as follows:
s110, calculating a receiving power value RSSI (received Signal Strength indication).
When the transmitting side is in a transmitting state, the receiving power value RSSI is calculated by the following formula:
RSSI=10*log10f((float) RSSIinstantaneous moment of action) + VAG + TEMP +ATT 。
Wherein f ((float) RSSIInstantaneous moment of action) Represents the transmit power as an and (float) RSSIInstantaneous moment of actionA function of the correlation; (float) RSSIInstantaneous moment of actionThen indicates a return RSSIInstantaneous moment of actionIs floating point number (n).
RSSIInstantaneous moment of actionRepresenting the instantaneous value of RSSI by the formula RSSIInstantaneous moment of action=sum(I2+Q2) And calculating, wherein sum represents a summation function, I represents an in-phase component, and Q represents a quadrature-phase component, and is 90 degrees out of phase with I.
The VAG represents a preset value dynamically adjusted by the FPGA and is mainly used for adjusting the value of an ADC (analog-digital converter) within a certain reasonable range.
TEMP represents a preset temperature compensation value, which is a parameter related to the internal characteristics of the single board.
The ATT represents a preset fixed compensation value, and is a parameter related to the internal characteristics of the single board.
S120, calculating a background noise value NF (noise figure).
When the transmitter closes the radio frequency switch to stop transmitting and the receiver is in a receiving state, the formula NF =10 log is calculated10f((float) RSSIInstantaneous moment of action) The base noise value NF was calculated by + VAG + TEMP + ATT.
The calculation formula of the background noise value NF is the same as that of the received power value RSSI, and the only difference is that the calculation time is different: when calculating the receiving power, it is calculated at the time when the sender is sending; and when the transmitter closes the radio frequency switch to stop transmitting, the receiver calculates the background noise value.
By way of example and not limitation, referring to fig. 5, for the a1 node, starting from the 1 st ms, the fixed timing structure configured is Tx, Rx, IDLE, … …, and the cycle is repeated. For the a2 node, starting from the 1 st ms, the fixed timing structure configured is Rx, Tx, IDLE, … …, and the loop is repeated. Where Tx denotes a transmission timing, Rx denotes a reception timing, and IDLE denotes an IDLE timing (a time reserved for signal transmission).
In fig. 5, the received power calculated at the Tx (transmission) time of the a1 node is RSSI, and the received power calculated at the Rx (reception) time of the a2 node is noise floor NF.
In a TDMA point-to-point fixed timing scenario, each node is configured into a fixed timing structure to ensure synchronization of transceiving. In the timing structure, in addition to transceiving timings (i.e., a receiving timing and a transmitting timing), a reserved IDLE timing (i.e., an IDLE timing) is included for spatial transmission carriers. And the receiving and sending work is not carried out at the IDLE time sequence, so that the method can be used for configuring link parameters. Accordingly, in the embodiment, the link parameter switching is performed on the a1 node and the a2 node simultaneously in the same IDLE time sequence, so that the effective time of the parameters in the two nodes is ensured to be consistent.
Specifically, the a1 node issues the new configuration to the FPGA logic module in the Tx time sequence, the FPGA logic module modulates the new configuration data into the wireless space by setting the AD module, and then issues the new configuration to the FPGA logic module in the next IDLE time sequence of the FPGA logic module, where the link configuration takes effect in the IDLE time sequence.
The a2 node receives a new configuration of the a1 node in Rx timing, and there are several situations.
In the first case, after the a1 node issues a new configuration (at this time, the a1 node will switch to the new configuration in the IDLE sequence), the a2 node fails to resolve the check.
Because the a2 node failed the check, the a2 node will not switch to the new configuration, and the a1 node will switch to the new configuration, which may result in a link loss of synchronization (in the case of a link being broken or a link not broken but data being unresolvable). To prevent the foregoing, when a1 detects that a link is out of synchronization, it may be determined that the link is out of synchronization due to its own new configuration based on the flag bit, and when it is determined that the link is out of synchronization, the a1 node executes a fallback configuration, and a1 will correctly link with a2 after the fallback configuration.
If the A2 node fails to resolve the check multiple times, which indicates that the link status is in a poor condition, a downshift operation may be performed on the link between the A1 node and the A2 node.
The second situation is that after the node a1 issues the new configuration, the node a2 resolves and checks successfully.
At this time, the node a2 will take effect of the new configuration in the IDLE timing after Tx, and the node a1 will also take effect of the new configuration in the same IDLE timing, and after the IDLE timing ends, the node a1 and the node a2 will continue to operate normally in the new configuration.
In this embodiment, a link optimal configuration file is set, and the MCS value and the bandwidth value of each gear, and the SNR threshold value for switching to the next gear and the SNR threshold value for switching to the previous gear are stored in the link optimal configuration file. Specifically, the link optimal configuration file records a current MCS value, an increased MCS value of a next gear, an increased bandwidth value of the next gear, an SNR threshold switched to the next gear value, an increased MCS value of a previous gear, an increased bandwidth value of the previous gear, and an SNR threshold switched to the previous gear value. When the calculated SNR reaches the SNR threshold value switched to the previous gear value, switching the current bandwidth and the modulation and coding strategy to the previous gear value; and when the calculated SNR reaches an SNR threshold value for switching to the next gear value, switching the current bandwidth and the modulation and coding strategy to the next gear value.
In specific implementation, the link optimal configuration file may be set for a system or may be set for a user. As an example of a typical mode, for example, in a constant transmission power, a constant spectrum width and a constant modulation and demodulation mode, the system may calculate optimal configuration data based on an existing theoretical formula, and write the optimal configuration data into a link configuration file with a preset data format. Or, based on the actual test data imported by the user, the system performs statistical analysis to obtain the optimal configuration data, and writes the optimal configuration data into the configuration file with the preset data format.
Preferably, the link optimal configuration file is in a table form to form a look-up table of link optimal configuration data, as shown in fig. 6. The look-up table is indexed by the current MCS value, and the look-up table stores the next-gear increased MCS value (corresponding to the next increased MCS value in fig. 6), the next-gear increased bandwidth value (corresponding to the next increased bandwidth value in fig. 6), the SNR threshold switched to the next-gear value (corresponding to the SNR threshold switched to the next value in fig. 6), the previous-gear increased MCS value (corresponding to the previous increased MCS value in fig. 6), the previous-gear increased bandwidth value (corresponding to the previous increased bandwidth value in fig. 6), and the SNR threshold switched to the previous-gear value (corresponding to the SNR threshold switched to the previous value in fig. 6).
Obtaining a corresponding MCS value increased by a next gear, a bandwidth value increased by the next gear, an SNR threshold switched to the next gear value, an MCS value increased by a previous gear, a bandwidth value increased by the previous gear and an SNR threshold switched to the previous gear value according to a current MCS value of a link; and comparing the SNR obtained by calculation with the corresponding SNR threshold value switched to the next gear value and the SNR threshold value switched to the previous gear value, and judging whether to perform upshifting (adjusting the link configuration parameters to be the preset configuration of the previous gear) or downshifting (adjusting the link configuration parameters to be the preset configuration of the next gear). The configuration adjustment method based on the lookup table is easy to implement and low in complexity.
In another implementation manner of this embodiment, the link quality data may further include an error rate of a Cyclic Redundancy Check (CRC), the a2 node counts the CRC result of each frame of data in the link at preset intervals, and after obtaining the error rate of the CRC according to the statistical calculation, sends the error rate of the CRC to the a1 node through the reverse link.
Every millisecond in the link is a frame of data, and for each frame of data, a CRC check is added to the data part to indicate whether the frame of data is correct. Preferably, the a2 node side counts the CRC result of each frame of data every 1 second, calculates the error rate of the CRC, and transmits the statistical result to the a1 node through the reverse link. The error rate of the CRC can be used to characterize the current link quality for determining whether the link configuration needs to be adjusted.
Specifically, the a1 node is configured to: and judging whether the link quality changes or not based on the error rate of the received CRC, judging that the link quality changes when the error rate of the CRC exceeds a preset standard value, and sending a link configuration adjustment instruction to trigger and calculate new configuration information matched with the link quality data.
At this time, when calculating new configuration information matched with the aforementioned link quality data, it may be determined whether CRC is erroneous.
And when the CRC has an error, directly switching the link configuration to the next preset configuration in the link optimal configuration file.
When the CRC fails, step S400 is executed to calculate a signal-to-noise ratio SNR according to the receiving power value and the background noise value in the link quality data; then, based on the SNR, after comparing with the SNR threshold in a preset link optimal configuration file, obtaining the bandwidth and modulation and coding strategy information matched with the SNR in the link optimal configuration file, and taking the matched bandwidth and modulation and coding strategy information as new configuration information.
According to the technical scheme, after the signal-to-noise ratio is calculated by monitoring the receiving power and the background noise value of the link, the matched bandwidth and the modulation and coding strategy are selected according to the signal-to-noise ratio, and the nodes on two sides agree the parameters which are matched and take effect at the same time point, so that the dynamic self-adaption of the link is realized.
It should be noted that the foregoing embodiment is described by taking a communication scenario in which the a1 node is used as a sender and the a2 node is used as a receiver as an example, but those skilled in the art will appreciate that the foregoing technical solution may also be used in a point-to-point communication scenario in which the a2 node is used as a sender and the a1 node is used as a receiver, where the a2 node is used as a first node and the a1 node is used as a second node.
The invention further provides a link self-adaption system in the TDMA point-to-point scene.
The system comprises a first node and a second node, wherein the first node and the second node comprise a filter module, a VGA module, an AD module, an FPGA logic module and an APP module. And the first node and the second node are connected through the filter module and then perform spatial transmission of data.
The second node is configured to: link quality data is calculated with the first node and transmitted back to the first node over the reverse link.
The first node is configured to: analyzing after acquiring the link quality data, and calculating new configuration information matched with the link quality data, wherein the new configuration information comprises bandwidth and modulation and coding strategy information of a link; and encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the second node, and simultaneously sending the new configuration information to the first node and agreeing to take effect at the same time with the second node.
The second node is further configured to: after the encrypted data information is received, analyzing the encrypted data to obtain new configuration information; checking the new configuration information; when the verification of the new configuration information is successful, the second node issues the new configuration information to the second node and takes effect on the new configuration information so as to enable the link configuration parameters of the second node to be consistent with the new link configuration parameters of the first node, and link transmission between the first node and the second node is established based on the new link configuration parameters; the moment when the first node and the second node take effect of the new configuration information is defined as the same IDLE time sequence; and when the verification of the new configuration information fails, the second node keeps the original link configuration parameters.
Preferably, when the verification of the new configuration information fails, the second node may send a link configuration information rollback instruction to the first node, and according to the link configuration information rollback instruction, the first node may terminate the configuration of the new configuration information in an IDLE time sequence and perform a configuration rollback operation, so that a link configuration parameter of the first node is the same as an original link configuration parameter of the second node, and establish link transmission between the first node and the second node based on the original link configuration parameter.
The system may further include a node verification monitoring unit configured to: monitoring the verification operation of the new configuration information, and counting the times of verification failure; judging whether the times of verification failure exceed a preset threshold value or not; and when the link state exceeds a preset threshold value, judging that the link states of the first node and the second node are abnormal, and performing downshift processing on the links of the first node and the second node.
Other technical features are referred to in the previous embodiments and are not described herein.
In the foregoing description, the disclosure of the present invention is not intended to limit itself to these aspects. Rather, the various components may be selectively and operatively combined in any number within the intended scope of the present disclosure. The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. In addition, terms like "comprising," "including," and "having" should be interpreted as inclusive or open-ended, rather than exclusive or closed-ended, by default, unless explicitly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. Common terms found in dictionaries should not be interpreted too ideally or too realistically in the context of related art documents unless the present disclosure expressly limits them to that. Any changes and modifications of the present invention based on the above disclosure may be made by those of ordinary skill in the art and shall fall within the scope of the appended claims.

Claims (10)

1. A link self-adapting method under a TDMA point-to-point scene is characterized by comprising the following steps:
the second node calculates the link quality data with the first node and transmits the link quality data back to the first node through a reverse link;
the first node acquires the link quality data and analyzes the link quality data, and calculates new configuration information matched with the link quality data; the new configuration information comprises bandwidth and modulation and coding strategy information of a link;
and encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the second node, and simultaneously sending the new configuration information to the first node and agreeing to take effect at the same time with the second node.
2. The link adaptation method according to claim 1, wherein the second node, after receiving the encrypted data message, performs the following operations:
analyzing the encrypted data to obtain new configuration information;
checking the new configuration information;
when the verification of the new configuration information is successful, the second node issues the new configuration information to the second node and takes effect on the new configuration information so as to enable the link configuration parameters of the second node to be consistent with the new link configuration parameters of the first node, and link transmission between the first node and the second node is established based on the new link configuration parameters; the moment when the first node and the second node take effect of the new configuration information is defined as the same IDLE time sequence;
and when the verification of the new configuration information fails, the second node keeps the original link configuration parameters.
3. The link adaptation method according to claim 2, characterized in that: and when the verification of the new configuration information fails, sending a link configuration information backspacing instruction to the first node, wherein according to the link configuration information backspacing instruction, the first node can terminate the configuration of the new configuration information in an IDLE time sequence and perform configuration backspacing operation, so that the link configuration parameters of the first node are the same as the original link configuration parameters of the second node, and link transmission between the first node and the second node is established based on the original link configuration parameters.
4. The link adaptation method according to claim 3, further comprising the steps of:
monitoring the verification operation of the new configuration information, and counting the times of verification failure;
judging whether the number of times of verification failure exceeds a preset threshold value or not;
and when the current link state exceeds a preset threshold value, judging that the link states of the first node and the second node are abnormal, and performing downshift processing on the link of the first node and the second node.
5. The link adaptation method according to any one of claims 1-4, characterized in that: the link quality data comprises a received power value and a background noise value;
the first node is configured to: after receiving the link quality data, calculating according to a receiving power value and a background noise value in the link quality data to obtain a signal-to-noise ratio (SNR), wherein the SNR is equal to a difference value between the receiving power value and the background noise value; and comparing the SNR with a preset SNR threshold in a link optimal configuration file based on the SNR, acquiring bandwidth and modulation and coding strategy information matched with the SNR in the link optimal configuration file, and taking the matched bandwidth and modulation and coding strategy information as new configuration information.
6. The link adaptation method according to claim 5, wherein the step of calculating the link quality data is as follows:
s110, calculating a receiving power value RSSI;
when the sender is in the sending state, the RSSI =10 × log is calculated10f((float) RSSIInstantaneous moment of action) Calculating a receiving power value by + VAG + TEMP + ATT; wherein, the first and the second end of the pipe are connected with each other,
f((float) RSSIinstantaneous moment of action) Represents the transmit power as an and (float) RSSIInstantaneous momentA function of the correlation; (float) RSSIInstantaneous moment of actionIndicating return RSSIInstantaneous moment of actionFloating point number of (RSSI)Instantaneous momentRepresenting the instantaneous value of RSSI by the formula RSSIInstantaneous moment of action=sum(I2+Q2) Calculating, wherein sum represents a summation function, I represents an in-phase component, Q represents a quadrature-phase component, and the phase difference between the sum and the I is 90 degrees; VAG represents a preset value dynamically adjusted by FPGA; TEMP represents a preset temperature compensation value; ATT represents a preset fixed compensation value;
s120, calculating a bottom noise value NF;
when the transmitter closes the radio frequency switch to stop transmitting and the receiver is in a receiving state, the formula NF =10 log is calculated10f((float) RSSIInstantaneous moment of action) The base noise value NF was calculated by + VAG + TEMP + ATT.
7. The link adaptation method according to claim 5, wherein: the link optimal configuration file is set by a system or a user, and the current MCS value, the MCS value increased by the next gear, the bandwidth value increased by the next gear, the SNR threshold value switched to the next gear value, the MCS value increased by the previous gear, the bandwidth value increased by the previous gear and the SNR threshold value switched to the previous gear value are recorded in the link optimal configuration file;
when the calculated SNR reaches the SNR threshold value switched to the previous gear value, switching the current bandwidth and the modulation and coding strategy to the previous gear value; and when the calculated SNR reaches an SNR threshold value for switching to the next gear value, switching the current bandwidth and the modulation and coding strategy to the next gear value.
8. The link adaptation method of claim 5, wherein: the link quality data also comprises the error rate of Cyclic Redundancy Check (CRC), the second node counts the CRC result of each frame of data in the link at intervals of a preset period, and after the error rate of the CRC is obtained according to the statistical calculation, the error rate of the CRC is sent to the first node through a reverse link;
the first node is configured to: and judging whether the link quality changes or not based on the error rate of the received CRC, judging that the link quality changes when the error rate of the CRC exceeds a preset standard value, and sending a link configuration adjustment instruction to trigger and calculate new configuration information matched with the link quality data.
9. The link adaptation method according to claim 8, wherein: when calculating new configuration information matched with the link quality data, judging whether CRC has errors; when CRC is wrong, directly switching the link configuration to the next preset configuration in the link optimal configuration file; and when the CRC has no error, calculating to obtain the SNR according to the receiving power value and the background noise value in the link quality data.
10. A link adaptation system in a TDMA point-to-point scenario, comprising a first node and a second node, characterized in that: the first node and the second node comprise a filter module, a VGA module, an AD module, an FPGA logic module and an APP module, and are connected through the filter module to perform spatial transmission of data;
the second node is configured to: calculating link quality data with the first node, and transmitting the link quality data back to the first node through a reverse link;
the first node is configured to: analyzing after acquiring the link quality data, and calculating new configuration information matched with the link quality data, wherein the new configuration information comprises bandwidth and modulation and coding strategy information of a link; and encrypting the new configuration information to obtain encrypted data and sending the encrypted data to the second node, and simultaneously sending the new configuration information to the first node and agreeing to take effect at the same time with the second node.
CN202210627378.9A 2022-06-06 2022-06-06 Link self-adaption method under TDMA point-to-point scene and application Active CN114710240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210627378.9A CN114710240B (en) 2022-06-06 2022-06-06 Link self-adaption method under TDMA point-to-point scene and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210627378.9A CN114710240B (en) 2022-06-06 2022-06-06 Link self-adaption method under TDMA point-to-point scene and application

Publications (2)

Publication Number Publication Date
CN114710240A true CN114710240A (en) 2022-07-05
CN114710240B CN114710240B (en) 2022-09-20

Family

ID=82178061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210627378.9A Active CN114710240B (en) 2022-06-06 2022-06-06 Link self-adaption method under TDMA point-to-point scene and application

Country Status (1)

Country Link
CN (1) CN114710240B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577324A (en) * 2015-12-22 2016-05-11 京信通信技术(广州)有限公司 Self-adaptive adjustment method and system of communication link
CN108667564A (en) * 2018-03-22 2018-10-16 西安电子科技大学 A kind of adaptive link MCS method for handover control of on-line study
US20180337452A1 (en) * 2017-05-19 2018-11-22 Starry, Inc. Pointing Algorithm for Endpoint Nodes
CN109756301A (en) * 2019-01-11 2019-05-14 珠海泰芯半导体有限公司 The selection method of wireless communication transmissions bandwidth and modulation system
WO2019155249A1 (en) * 2018-02-06 2019-08-15 Telefonaktiebolaget Lm Ericsson (Publ) Enhanced link adaptation
CN112752170A (en) * 2019-10-29 2021-05-04 中兴通讯股份有限公司 Parameter adjusting method, device, system and storage medium
CN113992314A (en) * 2021-10-25 2022-01-28 京信网络系统股份有限公司 Link self-adaptive adjusting method, device, system and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577324A (en) * 2015-12-22 2016-05-11 京信通信技术(广州)有限公司 Self-adaptive adjustment method and system of communication link
US20180337452A1 (en) * 2017-05-19 2018-11-22 Starry, Inc. Pointing Algorithm for Endpoint Nodes
WO2019155249A1 (en) * 2018-02-06 2019-08-15 Telefonaktiebolaget Lm Ericsson (Publ) Enhanced link adaptation
CN108667564A (en) * 2018-03-22 2018-10-16 西安电子科技大学 A kind of adaptive link MCS method for handover control of on-line study
CN109756301A (en) * 2019-01-11 2019-05-14 珠海泰芯半导体有限公司 The selection method of wireless communication transmissions bandwidth and modulation system
CN112752170A (en) * 2019-10-29 2021-05-04 中兴通讯股份有限公司 Parameter adjusting method, device, system and storage medium
CN113992314A (en) * 2021-10-25 2022-01-28 京信网络系统股份有限公司 Link self-adaptive adjusting method, device, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王茜等: "链路自适应技术在LTE中的应用", 《电子设计工程》 *

Also Published As

Publication number Publication date
CN114710240B (en) 2022-09-20

Similar Documents

Publication Publication Date Title
JP6312881B2 (en) Uplink power control based on preamble for LTE
US8565350B2 (en) Methods for detection of failure and recovery in a radio link
US9112696B2 (en) Radio communication apparatus and a method of transmitting a retransmission packet
US8797907B2 (en) Increasing throughput by adaptively changing PDU size in wireless networks under low SNR conditions
CN115190626A (en) Method and device for link recovery
TW201412165A (en) Device-to-device (D2D) link adaptation
US9258731B2 (en) Load-dependent transmission in communication networks
KR20050016440A (en) Link adaptation
KR102436334B1 (en) Techniques for wireless transmission under changing channel conditions
US11601167B2 (en) Method and device for power adjustment in UE and base station
WO2008119891A1 (en) Improved link adaptation method
US10673558B2 (en) Configuring transmission parameters in a cellular system
WO2022061622A1 (en) Communication method, communication device, electronic device, and computer readable storage medium
JP6538207B2 (en) Outer loop link adaptation using prediction of interference generated by CSI-RS
JP2004222260A (en) Link adaption process, wireless communication system and receiver
US8452301B2 (en) Method and apparatus for selecting a coding format
JP2004297231A (en) Mobile communication system, radio base station apparatus and power control method used for them
CN114710240B (en) Link self-adaption method under TDMA point-to-point scene and application
EP1263158A1 (en) Fractional repetition coding
CN117256115A (en) Method, communication device and infrastructure equipment
Lu Designing Wireless Networks for Delay-Sensitive Internet of Things
KR20220166778A (en) Method for HARQ transmission
CN117280727A (en) Information reporting method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant