CN116981012A - Low-power consumption communication protocol design method suitable for fire-fighting detection equipment - Google Patents

Low-power consumption communication protocol design method suitable for fire-fighting detection equipment Download PDF

Info

Publication number
CN116981012A
CN116981012A CN202310982821.9A CN202310982821A CN116981012A CN 116981012 A CN116981012 A CN 116981012A CN 202310982821 A CN202310982821 A CN 202310982821A CN 116981012 A CN116981012 A CN 116981012A
Authority
CN
China
Prior art keywords
data
node
equipment
slave node
slave
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310982821.9A
Other languages
Chinese (zh)
Other versions
CN116981012B (en
Inventor
韩任隆
王洪德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yingkou Tiancheng Fire Equipment Co ltd
Original Assignee
Yingkou Tiancheng Fire Equipment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yingkou Tiancheng Fire Equipment Co ltd filed Critical Yingkou Tiancheng Fire Equipment Co ltd
Priority to CN202310982821.9A priority Critical patent/CN116981012B/en
Publication of CN116981012A publication Critical patent/CN116981012A/en
Application granted granted Critical
Publication of CN116981012B publication Critical patent/CN116981012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a low-power consumption communication protocol design method suitable for fire-fighting detection equipment, the communication protocol adopts a master-slave architecture, a host is used as a master node, the fire-fighting detection equipment and a relay equipment are used as slave nodes, the master node and the slave nodes are in wireless communication connection, all the master node and the slave nodes are respectively provided with only one unique address, the master node and the slave nodes are firstly reasonably arranged according to the site, and then a fixed link transmission path is optimally designed and formulated according to the site layout condition so as to form a transmission linked list, and the corresponding relation of uplink data or downlink data among the equipment is appointed, so that the transmission path is unique and simplest; the frame structure of the data frame transmitted between the master node and the slave node comprises a data range, a transmitting direction, a destination address, a source address, a slave node equipment type, a byte number, data 1, data 2 … … data n, a slave node equipment identification code H, a slave node equipment identification code L, a secret key and a checksum. According to the invention, by designing the bidirectional communication mode between the master node and the slave node, the effective bidirectional communication between the master node and the slave node can be realized with the minimum communication frequency under the condition of low power consumption.

Description

Low-power consumption communication protocol design method suitable for fire-fighting detection equipment
Technical Field
The invention relates to a low-power consumption communication protocol design method suitable for fire-fighting detection equipment, and belongs to the technical field of wireless communication.
Background
Wireless networks refer to networks that enable interconnection of various communication devices without wiring. Wireless network coverage techniques cover a wide range of networks, including both global voice and data networks that allow users to establish long-range wireless connections, and infrared and radio frequency techniques that are optimized for short-range wireless connections. Wireless networks are commonly integrated with telecommunications networks and do not require cables to interconnect between nodes.
The wireless internet of things generally comprises a master node, a relay node and a slave node, wherein the master node realizes specific functions through two-way communication of data.
In the wireless internet of things network, the slave node is used for collecting equipment data and storing and waiting to send, the wireless module is in a sleep state most of the time, but wakes up automatically at intervals, whether a wake-up signal exists outside is detected, if the wake-up signal is detected, the slave node is waken up and waits for a next instruction, relevant operation is executed, and if the wake-up signal does not exist, the slave node enters the sleep state. The method works in a main node query mode, and the real-time performance is limited to a certain extent. If the master node queries more frequently, the battery life of the slave node is reduced.
Disclosure of Invention
The invention provides a low-power consumption communication protocol design method suitable for fire-fighting detection equipment, which enables the master node and the slave node to realize effective bidirectional communication with minimum communication frequency under the condition of low power consumption by designing a bidirectional communication mode between the master node and the slave node.
The invention is implemented by the following technical scheme:
the low-power consumption communication protocol design method suitable for fire-fighting detection equipment adopts a master-slave architecture, a host is used as a master node, the fire-fighting detection equipment and a relay equipment are used as slave nodes, the master node and the slave nodes are in wireless communication connection, all the master node and the slave nodes are respectively provided with only one unique address, the master node and the slave nodes are firstly reasonably arranged according to the site, then a fixed link transmission path is optimally designed and formulated according to the site layout condition to form a transmission chain table, and the corresponding relation of uplink data or downlink data among the equipment is appointed, so that the transmission path is unique and simplest; the frame structure of the data frame transmitted between the master node and the slave node comprises a data range, a transmitting direction, a destination address, a source address, a slave node equipment type, a byte number, data 1, data 2 … … data n, a slave node equipment identification code H, a slave node equipment identification code L, a secret key and a checksum.
Further, the data frame structure is as follows,
(Code) name of the name Definition of the definition Description of the invention
BYTE0 Data range B1H is effective in the slave node, the relay node and the master node; B3H is that there are relay node and master-slave node The effect is achieved; L2H is effective in the range of the relay node; l is the relay layer number 1-8. This field is used to specify the data validity range.
BYTE1 Transmission direction And D5H, uplink data transmission, namely, data transmission to the master node. And D7H, carrying out downlink data transmission, namely, transmitting the data to the slave node. This field is used to specify the transmission direction of the data.
BYTE2 Destination address 0~255 This field specifies the receptionAn address of the data.
BYTE3 Source address 1~255 This field is used to specify the source address from which this data is sent.
BYTE4 Slave node device Type(s) 1, a fire alarm controller 2, a smoke detector 3, a temperature sensor 4, a smoke temperature composite detector 5, a manual fire alarm button 6: input module 7, input/output module 8, fire hydrant button 9, fire sound and light alarm … … This field is used to specify the device type of the source address.
BYTE5 Number of bytes 1~64 This field is used to specify the number of bytes of the data portion in the data frame.
BYTE6 Data 1 51H, information is sent out. And 61H, the information is correctly received, and the completion is confirmed. And 62H, information receiving errors and application retransmission. Data 1 of the present frame.
BYTE7 Data 2 0~255 Data 2 of the present frame.
………… ………… 0~255 Data … … of the present frame.
BYTE(n+6) Slave node device Identification code H 0~255 The slave node device identification code is 16 bits high.
BYTE(n+7) Slave node device Identification code L 0~255 The slave node equipment identification code is used for identifying whether the slave node equipment is local network equipment or not, and is composed of The master node gives.
BYTE(n+8) Key(s) 0~255 The data encryption process is used for decoding the data of the receiving party. Encryption paradigm And the odd BYTEs of BYTE 0-BYTE (n+1) are enclosed.
BYTE(n+9) Checksum 0~255 And the method is used for judging the validity of the data. Tired from BYTE0 to BYTE (n+2) The lower 8-bit value is summed.
Further, in BYTE0 corresponding to the data range, the range identification data is used for judging whether the data frame received by the current device needs to be processed, so as to realize data filtering.
Further, in BYTE1 corresponding to the transmission direction, the direction identification data is used to determine whether to transmit a data frame to the next-stage device along the uplink direction or the downlink direction.
Further, the uplink process of the data frame is as follows: the slave node fire-fighting detection equipment sends out a data frame according to the frame structure in the data sending window period, at the moment, all the relay equipment and the host computer receive the data frame, and whether the host computer processes the data frame is judged by checking a transmission chain table; if the host needs to process the data frame, judging the integrity of the data frame, and then sending a confirmation data frame to the slave node fire detection equipment by the host to finish the point-to-point transmission of the data frame once; if the host computer does not need to process the data frame, it is judged that a certain relay device needs to process the data frame by checking the transmission chain table, and whether the data frame is sent to the next relay device or the host computer is judged according to the table lookup until the data frame is transmitted to the host computer, at the moment, the host computer sends a confirmation data frame to the slave node fire-fighting detection device, and the relay transmission of the data frame is completed.
Further, the downlink process of the data frame is as follows: the host computer sends out the wake-up command to fire-fighting detection equipment and relay equipment first, then send out the data frame according to the frame structure, at this time, all fire-fighting detection equipment and relay equipment receive this data frame, but only fire-fighting detection equipment or relay equipment with designated address can execute and respond to the command by checking the transmission chain table.
Further, all the slave nodes need to initiate data communication orderly and actively according to the time node and the period given by the master node.
The invention has the beneficial effects that:
the invention designs a special communication protocol and a data frame structure aiming at the communication requirement of fire-fighting detection equipment, so that the path of the data transmission process is clear;
the data is transmitted between the master node and the slave node in a fixed link mode, and the path is clear, unique and simplest;
after the relay node confirms the data with the slave node, the relay node is responsible for forwarding the received data to the next node, and the slave node does not need to wait for the confirmation data of the master node.
Drawings
Fig. 1 is a schematic diagram of a wireless network according to an embodiment of the present invention.
Description of the embodiments
A low-power consumption communication protocol design method suitable for fire-fighting detection equipment adopts a master-slave architecture, a host is used as a master node, the fire-fighting detection equipment and a relay equipment are used as slave nodes, the master node and the slave nodes are in wireless communication connection, all the master node and the slave nodes are respectively provided with only one unique address, the master node and the slave nodes are firstly reasonably arranged according to the site, then a fixed link transmission path is optimally designed and formulated according to the site layout condition to form a transmission chain table, and the corresponding relation of uplink data or downlink data among the equipment is appointed, so that the transmission path is unique and simplest.
The frame structure of the data frame transmitted between the master node and the slave node comprises a data range, a transmitting direction, a destination address, a source address, a slave node equipment type, a byte number, data 1, data 2 … … data n, a slave node equipment identification code H, a slave node equipment identification code L, a secret key and a checksum. The specific frame structure is shown in table 1 below.
TABLE 1
(Code) Name of the name Definition of the definition Description of the invention
BYTE0 Data range B1H is effective in the slave node, the relay node and the master node; B3H is in the range of the relay node and the master-slave node The effect is achieved; L2H is effective in the range of the relay node;l is the relay layer number 1-8. This field is used to specify the data validity range.
BYTE1 Transmission direction And D5H, uplink data transmission, namely, data transmission to the master node. D7H, data downlink transmission, namely data sending to slave node And (5) a dot. This field is used to specify the transmission direction of the data.
BYTE2 Destination address 0~255 This field is used to specify the address of the received data.
BYTE3 Source address 1~255 This field is used to specify the source address from which this data is sent.
BYTE4 Slave node device type 1, a fire alarm controller 2, a smoke detector 3, a temperature sensor 4, a smoke temperature composite detector 5 and a manual fire alarm button Button 6, input module 7, input/output module 8, hydrant button 9, fire sound and light alarm … … This field is used to specify the device type of the source address.
BYTE5 Number of bytes 1~64 This field is used to specify the number of bytes of the data portion in the data frame.
BYTE6 Data 1 51H, information is sent out. And 61H, the information is correctly received, and the completion is confirmed. And 62H, information receiving errors and application retransmission. Data 1 of the present frame.
BYTE7 Data 2 0~255 Data 2 of the present frame.
………… ………… 0~255 Data … … of the present frame.
BYTE(n+6) Slave node device identification Code H 0~255 The slave node device identification code is 16 bits high.
BYTE(n+7) Slave node device identification Code L 0~255 The slave node equipment identification code is used for identifying whether the slave node equipment is local network equipment or not, and is composed of The master node gives.
BYTE(n+8) Key(s) 0~255 The data encryption process is used for decoding the data of the receiving party. Encryption paradigm Enclose BYTE0~ BYTE (n+1)Odd bytes.
BYTE(n+9) Checksum 0~255 And the method is used for judging the validity of the data. Tired from BYTE0 to BYTE (n+2) The lower 8-bit value is summed.
In table 1, in BYTE0 corresponding to the data range, the range identification data is used to determine whether the data frame received by the current device needs to be processed, so as to implement data filtering. In BYTE1 corresponding to the sending direction, the direction identification data is used for determining whether to send a data frame to the next-stage device along the uplink direction or the downlink direction.
The range identification types include: 1. broadcasting mode: the host can communicate information to all slave nodes in this way; 2. relay scheme: this approach includes both uplink and downlink transmissions.
Examples
The wireless network embodiment shown in fig. 1 includes a master node, a slave node, and a relay node. The wireless network comprises 1 master node, 12 layers can be set, each layer line can comprise slave nodes and relay nodes, and 128 devices can be set for the total slave nodes. The data are mutually transmitted between the master node and the slave node equipment, the transmission can be carried out through a relay node or directly, and the relay node has a data forwarding function. The master node and the relay node internally store a data link list, thereby determining a data transmission path.
Continuing to show in fig. 1, according to the data link list stored in the main node and the relay node, determining that the data transmission path of the wireless network is No. 8-7-4-1. When the No. 8 slave node sends a group of data to the No. 1 master node, the No. 1, 4 and No. 7 nodes can simultaneously receive the data, the No. 7 relay node sends a group of data with the data range being the relay node to the master node according to the internal storage data linked list, and the No. 1 and No. 4 relay nodes do not do data processing according to the internal storage data linked list; when the node No. 4 receives the node No. 7 data, a group of data is sent to the main node according to the internal storage data linked list, and the node No. 7 data is not processed. And after the primary node 1 receives the data, completing the transmission of a group of data. The data transmission path is optimal and no repeated data forwarding exists, so that the high efficiency and stability of protocol execution are realized.
Examples
Continuing to refer to fig. 1, taking the example that the slave node No. 10 sends information to the master node No. 1 through the relay node No. 4, and the master node and the relay node are already set to store the data linked list therein, to describe a data transceiving flow. The fire alarm system comprises a fire alarm controller, a fire alarm control system and a fire alarm control system, wherein a fire alarm controller is arranged on a master node 1, a wireless relay device is arranged on a relay node 4, and a manual fire alarm button is arranged on a slave node 10.
The first step: the originating node (slave node No. 10) sends out a frame of data. An alarm message sent from the slave node 10 to the host, for example: b1 D5 00 0A 05 02 51 01 12 34 AA D9, according to table 1, the alarm information contains contents that data are valid in the slave node, the relay node and the master node, the data are transmitted up, the destination address is 00, the source address is 0A, the slave node device type manual fire alarm button has a byte number of 02, the data 1 is 51, the data 2 is 01, the slave node device code H is 12, the slave node device code L is 34, the key AA, and the checksum is D9.
And a second step of: and the No. 1 master node and the No. 4 relay node simultaneously receive the data frame sent by the No. 10 slave node, the No. 4 relay node forwards the data frame according to the determined data transmission path, and other relay nodes do not process the data frame. The relay node No. 4 forwards one frame of uplink data to the master node No. 1, for example: b3 D5 00 0A 05 02 51 01 12 34 AA D8. According to table 1, the alarm information contains the contents that data are valid in the range of the relay node and the master-slave node, the data are transmitted up, the destination address is 00, the source address is 0A, the slave node device type manual fire alarm button is 02, the byte number is 51, the data 1 is 01, the slave node device code H is 12, the slave node device code L is 34, the key AA, and the checksum is D8.
And a third step of: and after receiving the data frame, the No. 1 master node determines valid and effective data through data verification, and then sends out a frame of confirmation completion information. Examples: b3 And D7 01 00 09 02 61 01 12 34 AA E8, the fire alarm controller of the master node 1 sends the fire alarm controller of the slave node 10 to a manual alarm button of the slave node 10 to receive confirmation completion information. According to table 1, the alarm information contains the contents that data are valid in the range of the relay node and the master-slave node, the data are transmitted in a downlink mode, the destination address is 01, the source address is 00, the slave node equipment type is a fire sound-light alarm, the byte number is 02, the data 1 is 61, the data 2 is 01, the slave node equipment code H is 12, the slave node equipment code L is 34, the secret key AA and the checksum is E8.
Fourth step: and forwarding the data by the No. 4 relay node according to the determined data transmission path, wherein other relay nodes do not process the data. The relay node No. 4 forwards one frame of downlink data of the slave node No. 10, for example: b1 D7 01 00 09 02 61 01 12 34 AA E6. According to table 1, the alarm information contains contents that data are valid in the slave node, the relay node and the master node, the data are transmitted in a downlink, the destination address is 01, the source address is 00, the slave node equipment type is a fire sound and light alarm, the byte number is 02, the data 1 is 61, the data 2 is 01, the slave node equipment code H is 12, the slave node equipment code L is 34, the secret key AA and the checksum is E6.
Fifth step: and after the No. 10 slave node fire acousto-optic alarm receives the data, the data transmission process is completed once.

Claims (7)

1. The utility model provides a low-power consumption communication protocol design method suitable for fire control detection class equipment, communication protocol adopts principal and subordinate's framework, and the host computer is as master node, fire control detection class equipment and relay equipment are as the slave node, wireless communication connection between master node and the slave node, its characterized in that: all the master nodes and the slave nodes are respectively provided with only one unique address, the master nodes and the slave nodes are firstly reasonably arranged according to the site, and then the fixed link transmission paths are optimally designed and formulated according to the site layout condition to form a transmission chain table, and the corresponding relation of uplink data or downlink data among all the devices is designated, so that the transmission paths are unique and the simplest; the frame structure of the data frame transmitted between the master node and the slave node comprises a data range, a transmitting direction, a destination address, a source address, a slave node equipment type, a byte number, data 1, data 2 … … data n, a slave node equipment identification code H, a slave node equipment identification code L, a secret key and a checksum.
2. The method for designing a low power consumption communication protocol suitable for fire detection equipment according to claim 1, wherein the method comprises the following steps: the data frame structure is as follows,
(Code) name of the name Definition of the definition Description of the invention BYTE0 Data range B1H is effective in the slave node, the relay node and the master node; B3H is that there are relay node and master-slave node The effect is achieved; L2H is effective in the range of the relay node; l is the relay layer number 1-8. This field is used to specify the data validity range. BYTE1 Transmission direction And D5H, uplink data transmission, namely, data transmission to the master node. And D7H, carrying out downlink data transmission, namely, transmitting the data to the slave node. This field is used to specify the transmission direction of the data. BYTE2 Destination address 0~255 This field is used to specify the address of the received data. BYTE3 Source address 1~255 This field is used to specify the source address from which this data is sent. BYTE4 Slave node device type 1, a fire alarm controller 2, a smoke detector 3, a temperature sensor 4, a smoke temperature composite detector 5 and a manual fire alarm button 6 input module 7 input/output module 8 fire hydrant button 9 fire sound and light alarm … … This field is used to specify the device type of the source address. BYTE5 Number of bytes 1~64 This field is used to specify the number of bytes of the data portion in the data frame. BYTE6 Data 1 51H, information is sent out. And 61H, the information is correctly received, and the completion is confirmed. And 62H, information receiving errors and application retransmission. Data 1 of the present frame. BYTE7 Data 2 0~255 Data 2 of the present frame. ………… ………… 0~255 Data … … of the present frame. BYTE(n+6) Slave node device identification code H 0~255 The slave node device identification code is 16 bits high. BYTE(n+7) Slave node device identification code L 0~255 The slave node equipment identification code is used for identifying whether the slave node equipment is local network equipment or not, and the slave node equipment identification code is used for identifying whether the slave node equipment is local network equipment or not by the master node Dot assignment. BYTE(n+8) Key(s) 0~255 The data encryption process is used for decoding the data of the receiving party. Encryption range Is an odd BYTE of BYTE0 to BYTE (n+1). BYTE(n+9) Checksum 0~255 And the method is used for judging the validity of the data. Accumulation from BYTE0 to BYTE (n+2) And a lower 8-bit value.
3. The method for designing a low power consumption communication protocol suitable for fire detection equipment according to claim 2, wherein the method comprises the following steps: in BYTE0 corresponding to the data range, the range identification data is used for judging whether the data frame received by the current device needs to be processed or not, so as to realize data filtering.
4. The method for designing a low power consumption communication protocol suitable for fire detection equipment according to claim 2, wherein the method comprises the following steps: in BYTE1 corresponding to the sending direction, the direction identification data is used for determining whether to send a data frame to the next-stage device along the uplink direction or the downlink direction.
5. The method for designing a low power consumption communication protocol suitable for fire detection equipment as claimed in claim 1, wherein the uplink process of the data frame is as follows: the slave node fire-fighting detection equipment sends out a data frame according to the frame structure in the data sending window period, at the moment, all the relay equipment and the host computer receive the data frame, and whether the host computer processes the data frame is judged by checking a transmission chain table; if the host needs to process the data frame, judging the integrity of the data frame, and then sending a confirmation data frame to the slave node fire detection equipment by the host to finish the point-to-point transmission of the data frame once; if the host computer does not need to process the data frame, it is judged that a certain relay device needs to process the data frame by checking the transmission chain table, and whether the data frame is sent to the next relay device or the host computer is judged according to the table lookup until the data frame is transmitted to the host computer, at the moment, the host computer sends a confirmation data frame to the slave node fire-fighting detection device, and the relay transmission of the data frame is completed.
6. The method for designing a low power consumption communication protocol suitable for fire detection equipment as claimed in claim 1, wherein the downlink process of the data frame is as follows: the host computer sends out the wake-up command to fire-fighting detection equipment and relay equipment first, then send out the data frame according to the frame structure, at this time, all fire-fighting detection equipment and relay equipment receive this data frame, but only fire-fighting detection equipment or relay equipment with designated address can execute and respond to the command by checking the transmission chain table.
7. The method for designing a low power consumption communication protocol suitable for fire detection equipment according to claim 1, wherein the method comprises the following steps: all slave nodes need to initiate data communication orderly and actively according to the time nodes and the period given by the master node.
CN202310982821.9A 2023-08-07 2023-08-07 Low-power consumption communication protocol design method suitable for fire-fighting detection equipment Active CN116981012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310982821.9A CN116981012B (en) 2023-08-07 2023-08-07 Low-power consumption communication protocol design method suitable for fire-fighting detection equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310982821.9A CN116981012B (en) 2023-08-07 2023-08-07 Low-power consumption communication protocol design method suitable for fire-fighting detection equipment

Publications (2)

Publication Number Publication Date
CN116981012A true CN116981012A (en) 2023-10-31
CN116981012B CN116981012B (en) 2024-04-26

Family

ID=88484766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310982821.9A Active CN116981012B (en) 2023-08-07 2023-08-07 Low-power consumption communication protocol design method suitable for fire-fighting detection equipment

Country Status (1)

Country Link
CN (1) CN116981012B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003218894A (en) * 2002-01-22 2003-07-31 Mitsubishi Electric Corp Network system and network constituting method
CN101751761A (en) * 2009-12-30 2010-06-23 河南新天科技有限公司 Efficient wireless meter reading method for automatic network router
KR20130003922A (en) * 2011-07-01 2013-01-09 삼성전자주식회사 Method for controlling data relay and apparatus for the same
CN103281321A (en) * 2013-05-24 2013-09-04 航天东方红卫星有限公司 Satellite-borne FlexRay bus dynamic segment communication method
CN104639552A (en) * 2015-02-13 2015-05-20 李明 Linked network wireless high-speed communication protocol
CN105957319A (en) * 2016-04-27 2016-09-21 深圳三富通讯有限公司 Micropower wireless meter reading method
CN112153063A (en) * 2020-09-28 2020-12-29 杭州浅海科技有限责任公司 Communication protocol suitable for inductive coupling transmission
CN114554581A (en) * 2022-02-21 2022-05-27 营口天成消防设备有限公司 Method for realizing networking communication of low-power-consumption wireless equipment for fire fighting

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003218894A (en) * 2002-01-22 2003-07-31 Mitsubishi Electric Corp Network system and network constituting method
CN101751761A (en) * 2009-12-30 2010-06-23 河南新天科技有限公司 Efficient wireless meter reading method for automatic network router
KR20130003922A (en) * 2011-07-01 2013-01-09 삼성전자주식회사 Method for controlling data relay and apparatus for the same
CN103281321A (en) * 2013-05-24 2013-09-04 航天东方红卫星有限公司 Satellite-borne FlexRay bus dynamic segment communication method
CN104639552A (en) * 2015-02-13 2015-05-20 李明 Linked network wireless high-speed communication protocol
CN105957319A (en) * 2016-04-27 2016-09-21 深圳三富通讯有限公司 Micropower wireless meter reading method
CN112153063A (en) * 2020-09-28 2020-12-29 杭州浅海科技有限责任公司 Communication protocol suitable for inductive coupling transmission
CN114554581A (en) * 2022-02-21 2022-05-27 营口天成消防设备有限公司 Method for realizing networking communication of low-power-consumption wireless equipment for fire fighting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高绍斌等: "一种点对多点红外通信协议设计与实现", 《电视技术》, vol. 37, no. 21, 15 November 2013 (2013-11-15) *

Also Published As

Publication number Publication date
CN116981012B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
CN101751761B (en) Efficient wireless meter reading method for automatic network router
CN105792305A (en) Method for designing ultralow-power wireless data transmission network
US7336958B2 (en) Data transmission path establishing method, radio communication network system, and sensor network system
RU2010120572A (en) ROUTE SELECTION IN WIRELESS NETWORKS
WO2012035715A1 (en) Wireless communication device, wireless communication system, and wireless communication method
CN101977429B (en) Micropower wireless communication network system and implementing method thereof
KR101168357B1 (en) A sensor network
US7782766B2 (en) Data collection system and data collection method
CN103228066A (en) Intelligent security system based on wireless sensor network
CN105119726A (en) Wireless sensor network node rapid awakening method and apparatus thereof
CN102065508B (en) Wireless bridge forwarding equipment and method
WO2020249191A1 (en) A method of waking up a mesh node in a wireless mesh network as well as a related mesh node and a computer program product
CN116981012B (en) Low-power consumption communication protocol design method suitable for fire-fighting detection equipment
CN107071873B (en) Coordinator of tree sensor network ad hoc network
CN110460535A (en) Concurrent data transfer method between Internet of Things awareness apparatus
CN104954148A (en) Control method and device of node equipment and router
CN113132988B (en) Wireless networking link access method of street lamp controller based on token verification
KR102164717B1 (en) LoRa Based Multi-Hop Communication System
CN103687080A (en) A Zigbee dynamic networking method
CN112995043A (en) Information processing method and device in wireless mesh network and electronic equipment
CN104869156A (en) System and method for remotely transmitting information
JP2010011156A (en) Wireless telemeter system
CN106878447B (en) Data acquisition system based on ZigBee communication
CN113347684B (en) Internet of things communication method and equipment with multi-stage relay networking capability
CN104639530A (en) Nebula network communication protocol, method and protocol package

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant